Description
Allow specifying any arbitrary requiredClaims (key value pairs) when defining an OIDC custom resource as part of kyma alpha authorize repository command, for example
kyma alpha authorize repository --client-id foo --cluster-wide --clusterrole cluster-admin --repository otters/kyma-demo --required-claim ref=refs/heads/main --required-claim workflow=push
Reasons
Cluster administrators may want to restrict access to the cluster based on more oidc token claims (not only the repository)
Attachments
https://docs.github.com/en/actions/concepts/security/openid-connect#understanding-the-oidc-token