This repo is a companion to our blog post: Set Up a Terraform Pipeline with GitHub Actions and GitHub OIDC for AWS.
The bootstrap environment is where we configure the IAM Role that our GitHub action will use.
The prod environment is where we set up our Terraform state backend and provision some example infrastructure, in this case an AWS SSM-enabled bastion instance.
The github-oidc-role creates the IAM Role that our GitHub action will use.
The ssm-bastion sets up a bastion instance that you can access with AWS Session Manager.
The module also includes a tunnel
script you can use to port forward to local host via the bastion.
Sym helps developers solve painful access management problems with standard infrastructure tools.
Check out Sym's GitHub Actions Quickstart for an example of how to set up a temporary access flow for Okta using GitHub Actions.