Skip to content

Commit e2c9d0b

Browse files
authored
Include TagSession privilege for assumed roles. (#189)
Add privileges to be compatible with GitHub AWS Auth action
1 parent 0b249fa commit e2c9d0b

File tree

2 files changed

+5
-5
lines changed

2 files changed

+5
-5
lines changed

aws-iam-group-assume-role/main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ data "aws_iam_policy_document" "assume-role" {
2626
statement {
2727
sid = "assume0"
2828
resources = local.account_arns
29-
actions = ["sts:AssumeRole"]
29+
actions = ["sts:AssumeRole", "sts:TagSession"]
3030
}
3131
}
3232

aws-iam-role-crossacct/main.tf

+4-4
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ data "aws_iam_policy_document" "assume-role" {
66
type = "AWS"
77
identifiers = ["arn:aws:iam::${statement.value}:root"]
88
}
9-
actions = ["sts:AssumeRole"]
9+
actions = ["sts:AssumeRole", "sts:TagSession"]
1010
}
1111
}
1212

@@ -17,7 +17,7 @@ data "aws_iam_policy_document" "assume-role" {
1717
type = "AWS"
1818
identifiers = ["arn:aws:iam::${statement.value}:root"]
1919
}
20-
actions = ["sts:AssumeRole"]
20+
actions = ["sts:AssumeRole", "sts:TagSession"]
2121
}
2222
}
2323

@@ -29,7 +29,7 @@ data "aws_iam_policy_document" "assume-role" {
2929
identifiers = [statement.value]
3030
}
3131

32-
actions = ["sts:AssumeRoleWithSAML"]
32+
actions = ["sts:AssumeRoleWithSAML", "sts:TagSession"]
3333

3434
condition {
3535
test = "StringEquals"
@@ -49,7 +49,7 @@ data "aws_iam_policy_document" "assume-role" {
4949
identifiers = [oidc.value["idp_arn"]]
5050
}
5151

52-
actions = ["sts:AssumeRoleWithWebIdentity"]
52+
actions = ["sts:AssumeRoleWithWebIdentity", "sts:TagSession"]
5353
condition {
5454
test = "StringEquals"
5555
variable = "${oidc.value["provider"]}:aud"

0 commit comments

Comments
 (0)