This Terraform module manages OpenID Connect (OIDC) integration between GitHub Actions and AWS.
The module is strict on the claim checks to avoid that creating an OpenID connect integration opens your AWS account to any GitHub repo. However this strictness is not taking all the risk away. Ensure you familiarize yourself with OpenID Connect and the docs provided by GitHub and AWS. As always think about minimizing the privileges.
The module can manage the following:
- The OpenID Connect identity provider for GitHub in your AWS account (via a submodule).
- A role and assume role policy to check to check OIDC claims.
The module provides an option for creating an OpenID connect provider. Using the internal provider
module to create the OpenID Connect provider. This configuration will create the provider and output the ARN. This output can be passed to other instances of the module to setup roles for repositories on the same provider. Alternative you can create the OpenID connect provider via the resource aws_iam_openid_connect_provider or in case you have an existing one look-up via the data source aws_iam_openid_connect_provider.
The module creates a role with an assume role policy to check the OIDC claims for the given repo. Be default the policy is set to only allow actions running on the main branch and deny pull request actions. You can choose based on your need one (or more) of the default conditions to check. Additionally, a list of conditions can be provided. The role can only be assumed when all conditions evaluate to true. The following default conditions can be set.
allow_main
: Allow GitHub Actions only running on the main branch.allow_environment
: Allow GitHub Actions only for environments, by settinggithub_environments
you can limit to a dedicated environment.deny_pull_request
: Denies assuming the role for a pull request.allow_all
: Allow GitHub Actions for any claim for the repository. Be careful, this allows forks as well to assume the role!
In case there is not OpenID Connect provider already created in the AWS account, create one via the submodule.
module "oidc_provider" {
source = "github.com/philips-labs/terraform-aws-github-oidc/?ref=<version>//modules/provider"
}
Nest you ca pass the output the one or multiple instances of the module.
module "oidc_repo_s3" {
source = "github.com/philips-labs/terraform-aws-github-oidc?ref=<version>"
openid_connect_provider_arn = module.oidc_provider.openid_connect_provider.arn
repo = var.repo_s3
role_name = "repo-s3"
# optional
# override default conditions
default_conditions = ["allow_main"]
# add extra conditions, will be merged with the default_conditions
conditions = [{
test = "StringLike"
variable = "token.actions.githubusercontent.com:sub"
values = ["repo:my-org/my-repo:pull_request"]
}]
}
Check out the example for a full example of using the module.
Name | Version |
---|---|
terraform | >= 1 |
aws | >= 3 |
Name | Version |
---|---|
aws | >= 3 |
random | n/a |
No modules.
Name | Type |
---|---|
aws_iam_role.main | resource |
aws_iam_role_policy_attachment.custom | resource |
random_string.random | resource |
aws_iam_policy_document.github_actions_assume_role_policy | data source |
Name | Description | Type | Default | Required |
---|---|---|---|---|
account_ids | Root users of these Accounts (id) would be given the permissions to assume the role created by this module. | list(string) |
[] |
no |
custom_principal_arns | List of IAM principals ARNs able to assume the role created by this module. | list(string) |
[] |
no |
conditions | (Optional) Additonal conditions for checking the OIDC claim. | list(object({ |
[] |
no |
default_conditions | (Optional) Default condtions to apply, at least one of the following is madatory: 'allow_main', 'allow_environment', 'deny_pull_request' and 'allow_all'. | list(string) |
[ |
no |
github_environments | (Optional) Allow GitHub action to deploy to all (default) or to one of the environments in the list. | list(string) |
[ |
no |
openid_connect_provider_arn | Set the openid connect provider ARN when the provider is not managed by the module. | string |
n/a | yes |
repo | (Optional) GitHub repository to grant access to assume a role via OIDC. When the repo is set, a role will be created. | string |
null |
no |
role_max_session_duration | Maximum session duration (in seconds) that you want to set for the specified role. | number |
null |
no |
role_name | (Optional) role name of the created role, if not provided the namespace will be used. |
string |
null |
no |
role_path | (Optional) Path for the created role, requires repo is set. |
string |
"/github-actions/" |
no |
role_permissions_boundary | (Optional) Boundary for the created role, requires repo is set. |
string |
null |
no |
role_policy_arns | List of ARNs of IAM policies to attach to IAM role | list(string) |
[] |
no |
Name | Description |
---|---|
conditions | The assume conditions added to the role. |
role | The crated role that can be assumed for the configured repository. |
We welcome contribution, please checkout the contribution guide. Be-aware we use pre commit hooks to update the docs.
Releases are create automated from the main branch using conventional commit messages.
For question you can reach out to one of the maintainers.