Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add support for additional assume_role_policy statements #203

Merged
merged 2 commits into from
Oct 1, 2021

Conversation

pjungels-paraport
Copy link
Contributor

@pjungels-paraport pjungels-paraport commented Sep 28, 2021

Description

Add support for additional assume_role_policy statements on the aws_iam_role via a new variable, assume_role_policy_statements.

Motivation and Context

Fixes #196

Breaking Changes

None

How Has This Been Tested?

  • I have tested and validated these changes using one or more of the provided examples/* projects
    Added assume_role_policy_statements to the complete example. The observed assume_role_policy statements on the aws_iam_role is as expected. As this is a new variable, it should have no impact on the existing code.

@antonbabenko antonbabenko merged commit 90ec6a1 into terraform-aws-modules:master Oct 1, 2021
@antonbabenko
Copy link
Member

Thank you, @pjungels-paraport !

v2.19.0 has been just released.

@github-actions
Copy link

github-actions bot commented Nov 9, 2022

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 9, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Provide additional flexibility for assume_role_policy
2 participants