Skip to content

Commit f0e65a7

Browse files
fix: Add required S3 PutObjectTagging permission to Velero IRSA policy (#517)
Co-authored-by: Bryant Biggs <[email protected]>
1 parent c15f9dd commit f0e65a7

File tree

33 files changed

+106
-88
lines changed

33 files changed

+106
-88
lines changed

.github/workflows/pre-commit.yml

+19-2
Original file line numberDiff line numberDiff line change
@@ -7,8 +7,8 @@ on:
77
- master
88

99
env:
10-
TERRAFORM_DOCS_VERSION: v0.16.0
11-
TFLINT_VERSION: v0.50.3
10+
TERRAFORM_DOCS_VERSION: v0.19.0
11+
TFLINT_VERSION: v0.53.0
1212

1313
jobs:
1414
collectInputs:
@@ -75,10 +75,27 @@ jobs:
7575
# https://github.com/orgs/community/discussions/25678#discussioncomment-5242449
7676
- name: Delete huge unnecessary tools folder
7777
run: |
78+
df -h
7879
rm -rf /opt/hostedtoolcache/CodeQL
7980
rm -rf /opt/hostedtoolcache/Java_Temurin-Hotspot_jdk
8081
rm -rf /opt/hostedtoolcache/Ruby
8182
rm -rf /opt/hostedtoolcache/go
83+
# And a little bit more
84+
sudo apt-get -qq remove -y 'azure-.*'
85+
sudo apt-get -qq remove -y 'cpp-.*'
86+
sudo apt-get -qq remove -y 'dotnet-runtime-.*'
87+
sudo apt-get -qq remove -y 'google-.*'
88+
sudo apt-get -qq remove -y 'libclang-.*'
89+
sudo apt-get -qq remove -y 'libllvm.*'
90+
sudo apt-get -qq remove -y 'llvm-.*'
91+
sudo apt-get -qq remove -y 'mysql-.*'
92+
sudo apt-get -qq remove -y 'postgresql-.*'
93+
sudo apt-get -qq remove -y 'php.*'
94+
sudo apt-get -qq remove -y 'temurin-.*'
95+
sudo apt-get -qq remove -y kubectl firefox powershell mono-devel
96+
sudo apt-get -qq autoremove -y
97+
sudo apt-get -qq clean
98+
df -h
8299
83100
- name: Checkout
84101
uses: actions/checkout@v4

.pre-commit-config.yaml

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
repos:
22
- repo: https://github.com/antonbabenko/pre-commit-terraform
3-
rev: v1.92.0
3+
rev: v1.96.1
44
hooks:
55
- id: terraform_fmt
66
- id: terraform_wrapper_module_for_each

examples/iam-account/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -46,4 +46,4 @@ No inputs.
4646
|------|-------------|
4747
| <a name="output_caller_identity_account_id"></a> [caller\_identity\_account\_id](#output\_caller\_identity\_account\_id) | The ID of the AWS account |
4848
| <a name="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
49-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
49+
<!-- END_TF_DOCS -->

examples/iam-assumable-role-with-oidc/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -51,4 +51,4 @@ No inputs.
5151
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
5252
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
5353
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
54-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
54+
<!-- END_TF_DOCS -->

examples/iam-assumable-role-with-saml/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -54,4 +54,4 @@ No inputs.
5454
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
5555
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
5656
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
57-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
57+
<!-- END_TF_DOCS -->

examples/iam-assumable-role/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ $ terraform apply
1616

1717
Run `terraform destroy` when you don't need these resources.
1818

19-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
19+
<!-- BEGIN_TF_DOCS -->
2020
## Requirements
2121

2222
| Name | Version |
@@ -61,4 +61,4 @@ No inputs.
6161
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
6262
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
6363
| <a name="output_role_requires_mfa"></a> [role\_requires\_mfa](#output\_role\_requires\_mfa) | Whether admin IAM role requires MFA |
64-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
64+
<!-- END_TF_DOCS -->

examples/iam-assumable-roles-with-saml/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -64,4 +64,4 @@ No inputs.
6464
| <a name="output_readonly_iam_role_name"></a> [readonly\_iam\_role\_name](#output\_readonly\_iam\_role\_name) | Name of readonly IAM role |
6565
| <a name="output_readonly_iam_role_path"></a> [readonly\_iam\_role\_path](#output\_readonly\_iam\_role\_path) | Path of readonly IAM role |
6666
| <a name="output_readonly_iam_role_unique_id"></a> [readonly\_iam\_role\_unique\_id](#output\_readonly\_iam\_role\_unique\_id) | Unique ID of IAM role |
67-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
67+
<!-- END_TF_DOCS -->

examples/iam-assumable-roles/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -60,4 +60,4 @@ No inputs.
6060
| <a name="output_readonly_iam_role_path"></a> [readonly\_iam\_role\_path](#output\_readonly\_iam\_role\_path) | Path of readonly IAM role |
6161
| <a name="output_readonly_iam_role_requires_mfa"></a> [readonly\_iam\_role\_requires\_mfa](#output\_readonly\_iam\_role\_requires\_mfa) | Whether readonly IAM role requires MFA |
6262
| <a name="output_readonly_iam_role_unique_id"></a> [readonly\_iam\_role\_unique\_id](#output\_readonly\_iam\_role\_unique\_id) | Unique ID of IAM role |
63-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
63+
<!-- END_TF_DOCS -->

examples/iam-eks-role/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -59,4 +59,4 @@ No inputs.
5959
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
6060
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
6161
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
62-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
62+
<!-- END_TF_DOCS -->

examples/iam-github-oidc/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ $ terraform apply
1717

1818
Run `terraform destroy` when you don't need these resources.
1919

20-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
20+
<!-- BEGIN_TF_DOCS -->
2121
## Requirements
2222

2323
| Name | Version |
@@ -60,4 +60,4 @@ No inputs.
6060
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
6161
| <a name="output_provider_arn"></a> [provider\_arn](#output\_provider\_arn) | The ARN assigned by AWS for this provider |
6262
| <a name="output_provider_url"></a> [provider\_url](#output\_provider\_url) | The URL of the identity provider. Corresponds to the iss claim |
63-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
63+
<!-- END_TF_DOCS -->

examples/iam-group-complete/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ $ terraform apply
1616

1717
Run `terraform destroy` when you don't need these resources.
1818

19-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
19+
<!-- BEGIN_TF_DOCS -->
2020
## Requirements
2121

2222
| Name | Version |
@@ -51,4 +51,4 @@ No inputs.
5151
| <a name="output_assumable_roles"></a> [assumable\_roles](#output\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
5252
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
5353
| <a name="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn) | Assume role policy ARN for IAM group |
54-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
54+
<!-- END_TF_DOCS -->

examples/iam-group-with-assumable-roles-policy/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -61,4 +61,4 @@ No inputs.
6161
| <a name="output_iam_account_id"></a> [iam\_account\_id](#output\_iam\_account\_id) | IAM AWS account id (this code is managing resources in this account) |
6262
| <a name="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn) | Assume role policy ARN for IAM group |
6363
| <a name="output_production_account_id"></a> [production\_account\_id](#output\_production\_account\_id) | Production AWS account id |
64-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
64+
<!-- END_TF_DOCS -->

examples/iam-group-with-policies/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -55,4 +55,4 @@ No inputs.
5555
| <a name="output_group_name"></a> [group\_name](#output\_group\_name) | IAM group name |
5656
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
5757
| <a name="output_iam_account_id"></a> [iam\_account\_id](#output\_iam\_account\_id) | IAM AWS account id |
58-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
58+
<!-- END_TF_DOCS -->

examples/iam-policy/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -56,4 +56,4 @@ No inputs.
5656
| <a name="output_name"></a> [name](#output\_name) | The name of the policy |
5757
| <a name="output_path"></a> [path](#output\_path) | The path of the policy in IAM |
5858
| <a name="output_policy"></a> [policy](#output\_policy) | The policy document |
59-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
59+
<!-- END_TF_DOCS -->

examples/iam-read-only-policy/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -56,4 +56,4 @@ No inputs.
5656
| <a name="output_name"></a> [name](#output\_name) | The name of the policy |
5757
| <a name="output_path"></a> [path](#output\_path) | The path of the policy in IAM |
5858
| <a name="output_policy"></a> [policy](#output\_policy) | The policy document |
59-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
59+
<!-- END_TF_DOCS -->

examples/iam-role-for-service-accounts-eks/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ $ terraform apply
1414

1515
Run `terraform destroy` when you don't need these resources.
1616

17-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
17+
<!-- BEGIN_TF_DOCS -->
1818
## Requirements
1919

2020
| Name | Version |
@@ -78,4 +78,4 @@ No inputs.
7878
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
7979
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
8080
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
81-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
81+
<!-- END_TF_DOCS -->

examples/iam-user/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ $ terraform apply
1515

1616
Run `terraform destroy` when you don't need these resources.
1717

18-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
18+
<!-- BEGIN_TF_DOCS -->
1919
## Requirements
2020

2121
| Name | Version |
@@ -70,4 +70,4 @@ No inputs.
7070
| <a name="output_keybase_secret_key_pgp_message"></a> [keybase\_secret\_key\_pgp\_message](#output\_keybase\_secret\_key\_pgp\_message) | Encrypted access secret key |
7171
| <a name="output_pgp_key"></a> [pgp\_key](#output\_pgp\_key) | PGP key used to encrypt sensitive data for this user (if empty - secrets are not encrypted) |
7272
| <a name="output_policy_arns"></a> [policy\_arns](#output\_policy\_arns) | The list of ARNs of policies directly assigned to the IAM user |
73-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
73+
<!-- END_TF_DOCS -->

modules/iam-account/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ module.iam_account.aws_iam_account_alias.this: Refreshing state... (ID: this)
2121
Import successful!
2222
```
2323

24-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
24+
<!-- BEGIN_TF_DOCS -->
2525
## Requirements
2626

2727
| Name | Version |
@@ -72,4 +72,4 @@ No modules.
7272
| <a name="output_caller_identity_arn"></a> [caller\_identity\_arn](#output\_caller\_identity\_arn) | The AWS ARN associated with the calling entity |
7373
| <a name="output_caller_identity_user_id"></a> [caller\_identity\_user\_id](#output\_caller\_identity\_user\_id) | The unique identifier of the calling entity |
7474
| <a name="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
75-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
75+
<!-- END_TF_DOCS -->

modules/iam-assumable-role-with-oidc/README.md

+2-2
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ Creates single IAM role which can be assumed by trusted resources using OpenID C
66

77
This module supports IAM Roles for kubernetes service accounts as described in the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
88

9-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
9+
<!-- BEGIN_TF_DOCS -->
1010
## Requirements
1111

1212
| Name | Version |
@@ -69,4 +69,4 @@ No modules.
6969
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
7070
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
7171
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
72-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
72+
<!-- END_TF_DOCS -->

modules/iam-assumable-role-with-saml/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -5,7 +5,7 @@ Creates single IAM role which can be assumed by trusted resources using SAML Fed
55
[Creating IAM SAML Identity Providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html)
66
[Enabling SAML 2.0 Federated Users to Access the AWS Management Console](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-saml.html)
77

8-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
8+
<!-- BEGIN_TF_DOCS -->
99
## Requirements
1010

1111
| Name | Version |
@@ -52,7 +52,7 @@ No modules.
5252
| <a name="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn) | Permissions boundary ARN to use for IAM role | `string` | `""` | no |
5353
| <a name="input_role_policy_arns"></a> [role\_policy\_arns](#input\_role\_policy\_arns) | List of ARNs of IAM policies to attach to IAM role | `list(string)` | `[]` | no |
5454
| <a name="input_tags"></a> [tags](#input\_tags) | A map of tags to add to IAM role resources | `map(string)` | `{}` | no |
55-
| <a name="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions) | Additional role actions | `list(string)` | <pre>[<br> "sts:AssumeRoleWithSAML",<br> "sts:TagSession"<br>]</pre> | no |
55+
| <a name="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions) | Additional role actions | `list(string)` | <pre>[<br/> "sts:AssumeRoleWithSAML",<br/> "sts:TagSession"<br/>]</pre> | no |
5656

5757
## Outputs
5858

@@ -62,4 +62,4 @@ No modules.
6262
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
6363
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
6464
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
65-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
65+
<!-- END_TF_DOCS -->

modules/iam-assumable-role/README.md

+4-4
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ Creates single IAM role which can be assumed by trusted resources.
44

55
Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-arns) - typically, AWS accounts and users.
66

7-
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
7+
<!-- BEGIN_TF_DOCS -->
88
## Requirements
99

1010
| Name | Version |
@@ -67,10 +67,10 @@ No modules.
6767
| <a name="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn) | Permissions boundary ARN to use for IAM role | `string` | `""` | no |
6868
| <a name="input_role_requires_mfa"></a> [role\_requires\_mfa](#input\_role\_requires\_mfa) | Whether role requires MFA | `bool` | `true` | no |
6969
| <a name="input_role_requires_session_name"></a> [role\_requires\_session\_name](#input\_role\_requires\_session\_name) | Determines if the role-session-name variable is needed when assuming a role(https://aws.amazon.com/blogs/security/easily-control-naming-individual-iam-role-sessions/) | `bool` | `false` | no |
70-
| <a name="input_role_session_name"></a> [role\_session\_name](#input\_role\_session\_name) | role\_session\_name for roles which require this parameter when being assumed. By default, you need to set your own username as role\_session\_name | `list(string)` | <pre>[<br> "${aws:username}"<br>]</pre> | no |
70+
| <a name="input_role_session_name"></a> [role\_session\_name](#input\_role\_session\_name) | role\_session\_name for roles which require this parameter when being assumed. By default, you need to set your own username as role\_session\_name | `list(string)` | <pre>[<br/> "${aws:username}"<br/>]</pre> | no |
7171
| <a name="input_role_sts_externalid"></a> [role\_sts\_externalid](#input\_role\_sts\_externalid) | STS ExternalId condition values to use with a role (when MFA is not required) | `any` | `[]` | no |
7272
| <a name="input_tags"></a> [tags](#input\_tags) | A map of tags to add to IAM role resources | `map(string)` | `{}` | no |
73-
| <a name="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions) | Additional trusted role actions | `list(string)` | <pre>[<br> "sts:AssumeRole",<br> "sts:TagSession"<br>]</pre> | no |
73+
| <a name="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions) | Additional trusted role actions | `list(string)` | <pre>[<br/> "sts:AssumeRole",<br/> "sts:TagSession"<br/>]</pre> | no |
7474
| <a name="input_trusted_role_arns"></a> [trusted\_role\_arns](#input\_trusted\_role\_arns) | ARNs of AWS entities who can assume these roles | `list(string)` | `[]` | no |
7575
| <a name="input_trusted_role_services"></a> [trusted\_role\_services](#input\_trusted\_role\_services) | AWS Services that can assume these roles | `list(string)` | `[]` | no |
7676

@@ -88,4 +88,4 @@ No modules.
8888
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
8989
| <a name="output_role_requires_mfa"></a> [role\_requires\_mfa](#output\_role\_requires\_mfa) | Whether IAM role requires MFA |
9090
| <a name="output_role_sts_externalid"></a> [role\_sts\_externalid](#output\_role\_sts\_externalid) | STS ExternalId condition value to use with a role |
91-
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
91+
<!-- END_TF_DOCS -->

0 commit comments

Comments
 (0)