-
-
Notifications
You must be signed in to change notification settings - Fork 12
Add audicence in the policy condition #87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Did anybody has a solution to this? Thank you |
I have the mental note to do it at some point in time in a forked repo / on my own! Will keep you updated :) |
@pintxxo What about this: https://registry.terraform.io/modules/blueprismo/github-oidc-provider/aws/latest? :) |
@blueprismo can you make a PR with your changes for audiences, and hopefully maintainers can merge it soon? |
@nikola197 Done in here: #90 hope some maintainers will merge it |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
Friendly ping |
This issue has been automatically closed because it has not had recent activity since being marked as stale. |
Bug Report
When I try to set up a simple OIDC provisioning, the policy document only considerates the condition for the
token.githubusercontent.com:sub
and does not include the*:aud
as explicitly stated in the doc (https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services#configuring-the-role-and-trust-policy)Steps to Reproduce:
Just apply anywhere the role
Expected Result:
Actual Result:
The text was updated successfully, but these errors were encountered: