-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for wildcard operator - Repositories must be specified in the organization/repository format. #60
Labels
bug 🐛
Something isn't working.
Comments
This is untested, but I do get terraform plan to successfully build a plan:
|
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Thanks for putting together this create module.
I am running into the following issue. GitHub supports wildcards so the github org and repo is not tied down to specific repos and branches.
Whilst the below works it's restrictive as it is entirely acceptable to use wildcards especially when additional repos are created by developers but then does not allow for scale.
When changing to this:
the variables.tf on these lines validation rejects the wildcard:
Please take this issue to support for wildcard operator, in the meantime I am going to have to revert back to writing the terraform code.
Thank you for taking this request into consideration.
Supporting documentation:
https://docs.github.com/en/actions/security-for-github-actions/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#:~:text=a%20value%2C%20it-,defaults%20to%20a%20wildcard%20(*).,-(Optional)%20For%20GitHub
https://repost.aws/questions/QUPqSGcz54SI-CTgAJ2jlHmg/issue-with-assuming-role-in-aws-using-github-actions-not-authorized-to-perform-sts-error
The text was updated successfully, but these errors were encountered: