Skip to content

Latest commit

 

History

History
64 lines (46 loc) · 2.92 KB

File metadata and controls

64 lines (46 loc) · 2.92 KB

Individual IAM assumable roles example

Configuration in this directory creates several individual IAM roles which can be assumed from a defined list of IAM ARNs.

The main difference between iam-assumable-role and iam-assumable-roles examples is that the former creates just a single role.

Usage

To run this example you need to execute:

$ terraform init
$ terraform plan
$ terraform apply

Run terraform destroy when you don't need these resources.

Requirements

Name Version
terraform >= 1.0
aws >= 4.0

Providers

Name Version
aws >= 4.0

Modules

Name Source Version
iam_assumable_role_admin ../../modules/iam-assumable-role n/a
iam_assumable_role_custom ../../modules/iam-assumable-role n/a
iam_assumable_role_custom_trust_policy ../../modules/iam-assumable-role n/a
iam_assumable_role_inline_policy ../../modules/iam-assumable-role n/a
iam_assumable_role_sts ../../modules/iam-assumable-role n/a
iam_policy ../../modules/iam-policy n/a

Resources

Name Type
aws_iam_policy_document.custom_trust_policy data source

Inputs

No inputs.

Outputs

Name Description
iam_instance_profile_id IAM Instance profile's ID.
iam_role_arn ARN of IAM role
iam_role_name Name of IAM role
iam_role_path Path of IAM role
iam_role_unique_id Unique ID of IAM role
role_requires_mfa Whether admin IAM role requires MFA