- 
          
 - 
                Notifications
    
You must be signed in to change notification settings  - Fork 1.1k
 
          fix: Use the aws_service_principal data source to retrieve the correct service principal for IRSA policies
          #628
        
          New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
…ect service principal for IRSA policies
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
        
          
                examples/iam-oidc-provider/README.md
              
                Outdated
          
        
      | - Creates an IAM role that trust the IAM GitHub OIDC provider | ||
| - GitHub reference: https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services | ||
| - AWS IAM role reference: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-idp_oidc.html#idp_oidc_Create_GitHub | ||
| - GitHub reference: <https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services> | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we use same links like in other places in the docs?
| - GitHub reference: <https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services> | |
| - [GitHub reference](https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services) | 
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
probably - I think this was the auto-formatting of whatever I setup on my editor 😅. let me take another pass to double check
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
While I have your attention here... please check your email :)
## [6.2.3](v6.2.2...v6.2.3) (2025-10-29) ### Bug Fixes * Use the `aws_service_principal` data source to retrieve the correct service principal for IRSA policies ([#628](#628)) ([673fb44](673fb44))
| 
           This PR is included in version 6.2.3 🎉  | 
    
Description
aws_service_principaldata source to retrieve the correct service principal for IRSA policiesTwo separate commits - one for each change listed above
Motivation and Context
Breaking Changes
How Has This Been Tested?
examples/*to demonstrate and validate my change(s)examples/*projectspre-commit run -aon my pull request