You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# This IAM Matrix should have a name with the stack name and an iamRole
18
-
# with access to deploy AWS resources in you account. The easiest method is attaching AdministratorAccess Policy to role.
15
+
# This IAM Matrix should have a name with the stack name, awsAccountID, and iamRole
16
+
# with access to deploy AWS resources in you account. The easiest method is attaching AdministratorAccess Policy to role
19
17
# See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for details on implementing OIDC with Github Actions
# This IAM Matrix should have a name with the stack name, awsAccountID, and iamRole
11
+
# with access to deploy AWS resources in you account. The easiest method is attaching AdministratorAccess Policy to role
12
+
# See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for details on implementing OIDC with Github Actions
# This IAM Matrix should have a name with the stack name and an iamRole
13
+
# This IAM Matrix should have a name with the stack name, awsAccountID, and iamRole
14
14
# with access to deploy AWS resources in you account. The easiest method is attaching AdministratorAccess Policy to role
15
15
# See https://docs.github.com/en/actions/deployment/security-hardening-your-deployments/configuring-openid-connect-in-amazon-web-services for details on implementing OIDC with Github Actions
0 commit comments