You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: examples/iam-account/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ $ terraform apply
14
14
15
15
Run `terraform destroy` when you don't need these resources.
16
16
17
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
17
+
<!--BEGIN_TF_DOCS-->
18
18
## Requirements
19
19
20
20
| Name | Version |
@@ -46,4 +46,4 @@ No inputs.
46
46
|------|-------------|
47
47
| <aname="output_caller_identity_account_id"></a> [caller\_identity\_account\_id](#output\_caller\_identity\_account\_id)| The ID of the AWS account |
48
48
| <aname="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords)| Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
Copy file name to clipboardExpand all lines: examples/iam-assumable-roles-with-saml/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ $ terraform apply
14
14
15
15
Run `terraform destroy` when you don't need these resources.
16
16
17
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
17
+
<!--BEGIN_TF_DOCS-->
18
18
## Requirements
19
19
20
20
| Name | Version |
@@ -64,4 +64,4 @@ No inputs.
64
64
| <aname="output_readonly_iam_role_name"></a> [readonly\_iam\_role\_name](#output\_readonly\_iam\_role\_name)| Name of readonly IAM role |
65
65
| <aname="output_readonly_iam_role_path"></a> [readonly\_iam\_role\_path](#output\_readonly\_iam\_role\_path)| Path of readonly IAM role |
66
66
| <aname="output_readonly_iam_role_unique_id"></a> [readonly\_iam\_role\_unique\_id](#output\_readonly\_iam\_role\_unique\_id)| Unique ID of IAM role |
Copy file name to clipboardExpand all lines: examples/iam-assumable-roles/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ $ terraform apply
14
14
15
15
Run `terraform destroy` when you don't need these resources.
16
16
17
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
17
+
<!--BEGIN_TF_DOCS-->
18
18
## Requirements
19
19
20
20
| Name | Version |
@@ -60,4 +60,4 @@ No inputs.
60
60
| <aname="output_readonly_iam_role_path"></a> [readonly\_iam\_role\_path](#output\_readonly\_iam\_role\_path)| Path of readonly IAM role |
61
61
| <aname="output_readonly_iam_role_requires_mfa"></a> [readonly\_iam\_role\_requires\_mfa](#output\_readonly\_iam\_role\_requires\_mfa)| Whether readonly IAM role requires MFA |
62
62
| <aname="output_readonly_iam_role_unique_id"></a> [readonly\_iam\_role\_unique\_id](#output\_readonly\_iam\_role\_unique\_id)| Unique ID of IAM role |
Copy file name to clipboardExpand all lines: examples/iam-group-complete/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ $ terraform apply
16
16
17
17
Run `terraform destroy` when you don't need these resources.
18
18
19
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
19
+
<!--BEGIN_TF_DOCS-->
20
20
## Requirements
21
21
22
22
| Name | Version |
@@ -51,4 +51,4 @@ No inputs.
51
51
| <aname="output_assumable_roles"></a> [assumable\_roles](#output\_assumable\_roles)| List of ARNs of IAM roles which members of IAM group can assume |
52
52
| <aname="output_group_users"></a> [group\_users](#output\_group\_users)| List of IAM users in IAM group |
53
53
| <aname="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn)| Assume role policy ARN for IAM group |
Copy file name to clipboardExpand all lines: examples/iam-group-with-assumable-roles-policy/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -14,7 +14,7 @@ $ terraform apply
14
14
15
15
Run `terraform destroy` when you don't need these resources.
16
16
17
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
17
+
<!--BEGIN_TF_DOCS-->
18
18
## Requirements
19
19
20
20
| Name | Version |
@@ -61,4 +61,4 @@ No inputs.
61
61
| <aname="output_iam_account_id"></a> [iam\_account\_id](#output\_iam\_account\_id)| IAM AWS account id (this code is managing resources in this account) |
62
62
| <aname="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn)| Assume role policy ARN for IAM group |
63
63
| <aname="output_production_account_id"></a> [production\_account\_id](#output\_production\_account\_id)| Production AWS account id |
| <aname="output_pgp_key"></a> [pgp\_key](#output\_pgp\_key)| PGP key used to encrypt sensitive data for this user (if empty - secrets are not encrypted) |
72
72
| <aname="output_policy_arns"></a> [policy\_arns](#output\_policy\_arns)| The list of ARNs of policies directly assigned to the IAM user |
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
24
+
<!--BEGIN_TF_DOCS-->
25
25
## Requirements
26
26
27
27
| Name | Version |
@@ -72,4 +72,4 @@ No modules.
72
72
| <aname="output_caller_identity_arn"></a> [caller\_identity\_arn](#output\_caller\_identity\_arn)| The AWS ARN associated with the calling entity |
73
73
| <aname="output_caller_identity_user_id"></a> [caller\_identity\_user\_id](#output\_caller\_identity\_user\_id)| The unique identifier of the calling entity |
74
74
| <aname="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords)| Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
Copy file name to clipboardExpand all lines: modules/iam-assumable-role-with-oidc/README.md
+2-2
Original file line number
Diff line number
Diff line change
@@ -6,7 +6,7 @@ Creates single IAM role which can be assumed by trusted resources using OpenID C
6
6
7
7
This module supports IAM Roles for kubernetes service accounts as described in the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
8
8
9
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
9
+
<!--BEGIN_TF_DOCS-->
10
10
## Requirements
11
11
12
12
| Name | Version |
@@ -69,4 +69,4 @@ No modules.
69
69
| <aname="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name)| Name of IAM role |
70
70
| <aname="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path)| Path of IAM role |
71
71
| <aname="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id)| Unique ID of IAM role |
Copy file name to clipboardExpand all lines: modules/iam-assumable-role-with-saml/README.md
+3-3
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ Creates single IAM role which can be assumed by trusted resources using SAML Fed
5
5
[Creating IAM SAML Identity Providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_saml.html)
6
6
[Enabling SAML 2.0 Federated Users to Access the AWS Management Console](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-saml.html)
7
7
8
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
8
+
<!--BEGIN_TF_DOCS-->
9
9
## Requirements
10
10
11
11
| Name | Version |
@@ -52,7 +52,7 @@ No modules.
52
52
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`""`| no |
53
53
| <aname="input_role_policy_arns"></a> [role\_policy\_arns](#input\_role\_policy\_arns)| List of ARNs of IAM policies to attach to IAM role |`list(string)`|`[]`| no |
54
54
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to IAM role resources |`map(string)`|`{}`| no |
55
-
| <aname="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions)| Additional role actions |`list(string)`| <pre>[<br> "sts:AssumeRoleWithSAML",<br> "sts:TagSession"<br>]</pre> | no |
55
+
| <aname="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions)| Additional role actions |`list(string)`| <pre>[<br/> "sts:AssumeRoleWithSAML",<br/> "sts:TagSession"<br/>]</pre> | no |
56
56
57
57
## Outputs
58
58
@@ -62,4 +62,4 @@ No modules.
62
62
| <aname="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name)| Name of IAM role |
63
63
| <aname="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path)| Path of IAM role |
64
64
| <aname="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id)| Unique ID of IAM role |
Copy file name to clipboardExpand all lines: modules/iam-assumable-role/README.md
+4-4
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ Creates single IAM role which can be assumed by trusted resources.
4
4
5
5
Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-arns) - typically, AWS accounts and users.
6
6
7
-
<!--BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK-->
7
+
<!--BEGIN_TF_DOCS-->
8
8
## Requirements
9
9
10
10
| Name | Version |
@@ -67,10 +67,10 @@ No modules.
67
67
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`""`| no |
68
68
| <aname="input_role_requires_mfa"></a> [role\_requires\_mfa](#input\_role\_requires\_mfa)| Whether role requires MFA |`bool`|`true`| no |
69
69
| <aname="input_role_requires_session_name"></a> [role\_requires\_session\_name](#input\_role\_requires\_session\_name)| Determines if the role-session-name variable is needed when assuming a role(https://aws.amazon.com/blogs/security/easily-control-naming-individual-iam-role-sessions/)|`bool`|`false`| no |
70
-
| <aname="input_role_session_name"></a> [role\_session\_name](#input\_role\_session\_name)| role\_session\_name for roles which require this parameter when being assumed. By default, you need to set your own username as role\_session\_name |`list(string)`| <pre>[<br> "${aws:username}"<br>]</pre> | no |
70
+
| <aname="input_role_session_name"></a> [role\_session\_name](#input\_role\_session\_name)| role\_session\_name for roles which require this parameter when being assumed. By default, you need to set your own username as role\_session\_name |`list(string)`| <pre>[<br/> "${aws:username}"<br/>]</pre> | no |
71
71
| <aname="input_role_sts_externalid"></a> [role\_sts\_externalid](#input\_role\_sts\_externalid)| STS ExternalId condition values to use with a role (when MFA is not required) |`any`|`[]`| no |
72
72
| <aname="input_tags"></a> [tags](#input\_tags)| A map of tags to add to IAM role resources |`map(string)`|`{}`| no |
73
-
| <aname="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions)| Additional trusted role actions |`list(string)`| <pre>[<br> "sts:AssumeRole",<br> "sts:TagSession"<br>]</pre> | no |
73
+
| <aname="input_trusted_role_actions"></a> [trusted\_role\_actions](#input\_trusted\_role\_actions)| Additional trusted role actions |`list(string)`| <pre>[<br/> "sts:AssumeRole",<br/> "sts:TagSession"<br/>]</pre> | no |
74
74
| <aname="input_trusted_role_arns"></a> [trusted\_role\_arns](#input\_trusted\_role\_arns)| ARNs of AWS entities who can assume these roles |`list(string)`|`[]`| no |
75
75
| <aname="input_trusted_role_services"></a> [trusted\_role\_services](#input\_trusted\_role\_services)| AWS Services that can assume these roles |`list(string)`|`[]`| no |
76
76
@@ -88,4 +88,4 @@ No modules.
88
88
| <aname="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id)| Unique ID of IAM role |
89
89
| <aname="output_role_requires_mfa"></a> [role\_requires\_mfa](#output\_role\_requires\_mfa)| Whether IAM role requires MFA |
90
90
| <aname="output_role_sts_externalid"></a> [role\_sts\_externalid](#output\_role\_sts\_externalid)| STS ExternalId condition value to use with a role |
0 commit comments