You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_description"></a> [description](#input\_description)| Description of the role being created |`string`| n/a | yes |
580
580
| <aname="input_name"></a> [name](#input\_name)| Name of the role to create |`string`| n/a | yes |
581
-
| <aname="input_repository"></a> [repository](#input\_repository)| Repository to be allowed in the OIDC federation mapping |`string`| n/a | yes |
582
581
| <aname="input_tags"></a> [tags](#input\_tags)| Tags to apply resoures created by this module |`map(string)`| n/a | yes |
583
582
| <aname="input_account_id"></a> [account\_id](#input\_account\_id)| The AWS account ID to create the role in |`string`|`null`| no |
584
583
| <aname="input_additional_audiences"></a> [additional\_audiences](#input\_additional\_audiences)| Additional audiences to be allowed in the OIDC federation mapping |`list(string)`|`[]`| no |
@@ -598,12 +597,11 @@ No modules.
598
597
| <aname="input_read_write_max_session_duration"></a> [read\_write\_max\_session\_duration](#input\_read\_write\_max\_session\_duration)| The maximum session duration (in seconds) that you want to set for the specified role |`number`|`null`| no |
599
598
| <aname="input_read_write_policy_arns"></a> [read\_write\_policy\_arns](#input\_read\_write\_policy\_arns)| List of IAM policy ARNs to attach to the read-write role |`list(string)`|`[]`| no |
600
599
| <aname="input_region"></a> [region](#input\_region)| The region in which the role will be used (defaulting to the provider region) |`string`|`null`| no |
601
-
| <aname="input_repository_uuid"></a> [repository\_uuid](#input\_repository\_uuid)| Repository UUID. You can get it in the repository settings in the OpenID connect provider. |`string`|`null`| no |
600
+
| <aname="input_repositories"></a> [repositories](#input\_repositories)| A collection of repositories to to bind the permissions |`list(string)`|`[]`| no |
601
+
| <aname="input_repository"></a> [repository](#input\_repository)| Repository to be allowed in the OIDC federation mapping |`string`|`null`| no |
602
602
| <aname="input_role_path"></a> [role\_path](#input\_role\_path)| Path under which to create IAM role. |`string`|`null`| no |
603
603
| <aname="input_shared_repositories"></a> [shared\_repositories](#input\_shared\_repositories)| List of repositories to provide read access to the remote state |`list(string)`|`[]`| no |
604
604
| <aname="input_tf_state_suffix"></a> [tf\_state\_suffix](#input\_tf\_state\_suffix)| A suffix for the terraform statefile, e.g. <repo>-<tf\_state\_suffix>.tfstate |`string`|`""`| no |
605
-
| <aname="input_workspace_name"></a> [workspace\_name](#input\_workspace\_name)| The name of the workspace. |`string`|`null`| no |
606
-
| <aname="input_workspace_uuid"></a> [workspace\_uuid](#input\_workspace\_uuid)| Workspace UUID. You can get it in the repository settings in the OpenID connect provider. Don't include the brackets and make sure it is lower cased. |`string`|`null`| no |
0 commit comments