-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add CIDR limitation to OIDC IAM Role #422
Comments
This issue has been automatically marked as stale because it has been open 30 days |
This issue was automatically closed because of stale in 10 days |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Is your request related to a new offering from AWS?
Is this functionality available in the AWS provider for Terraform? See CHANGELOG.md, too.
Is your request related to a problem? Please describe.
We want to secure our Terraform deployment pipelines which already use OIDC on a self-hosted GitHub Actions runner. We want to be able to limit the CIDR from which this role can be used.
Describe the solution you'd like.
In the module declaration, I want to be able to pass a CIDR list like this:
Describe alternatives you've considered.
Doing this through the console:
Additional context
The text was updated successfully, but these errors were encountered: