Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/launchbynttdata/tf-aws-module_collection-iam_assumable_role
https://github.com/launchbynttdata/tf-aws-module_collection-iam_assumable_role
aws collection terraform
Last synced: 5 days ago
JSON representation
- Host: GitHub
- URL: https://github.com/launchbynttdata/tf-aws-module_collection-iam_assumable_role
- Owner: launchbynttdata
- License: apache-2.0
- Created: 2024-05-02T20:57:04.000Z (8 months ago)
- Default Branch: main
- Last Pushed: 2024-08-28T19:17:43.000Z (4 months ago)
- Last Synced: 2024-11-09T06:07:25.040Z (2 months ago)
- Topics: aws, collection, terraform
- Language: HCL
- Size: 110 KB
- Stars: 0
- Watchers: 0
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Codeowners: CODEOWNERS
Awesome Lists containing this project
README
## Requirements
| Name | Version |
|------|---------|
| [terraform](#requirement\_terraform) | >= 1.5.0, <= 1.5.5 |
| [aws](#requirement\_aws) | ~> 5.0 |## Providers
No providers.
## Modules
| Name | Source | Version |
|------|--------|---------|
| [iam\_policies](#module\_iam\_policies) | terraform.registry.launch.nttdata.com/module_collection/iam_policy/aws | ~>1.0 |
| [iam\_role](#module\_iam\_role) | terraform-aws-modules/iam/aws//modules/iam-assumable-role | ~> 5.44 |
| [resource\_names](#module\_resource\_names) | terraform.registry.launch.nttdata.com/module_library/resource_name/launch | ~> 1.0 |## Resources
No resources.
## Inputs
| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| [logical\_product\_family](#input\_logical\_product\_family) | Logical product family that the resource belongs to. | `string` | `"platform"` | no |
| [logical\_product\_service](#input\_logical\_product\_service) | Logical product service that the resource belongs to. | `string` | `"service"` | no |
| [environment](#input\_environment) | Environment in which the resource should be provisioned like dev, qa, prod etc. | `string` | `"dev"` | no |
| [environment\_number](#input\_environment\_number) | The environment count for the respective environment. Defaults to 000. Increments in value of 1 | `string` | `"000"` | no |
| [region](#input\_region) | AWS Region in which the infra needs to be provisioned | `string` | `"us-east-2"` | no |
| [resource\_number](#input\_resource\_number) | The resource count for the respective resource. Defaults to 000. Increments in value of 1 | `string` | `"000"` | no |
| [resource\_names\_map](#input\_resource\_names\_map) | A map of key to resource\_name that will be used by tf-aws-module\_collection-iam\_assumable\_role module to generate resource names |map(object(|
{
name = string
max_length = optional(number, 60)
}
)){| no |
"iam_policy": {
"max_length": 60,
"name": "plcy"
},
"iam_role": {
"max_length": 60,
"name": "role"
}
}
| [assume\_iam\_role\_policies](#input\_assume\_iam\_role\_policies) | Custom policies to attach to the assumable role. Must be provided as a list of valid JSON documents. | `list(string)` | `[]` | no |
| [role\_sts\_externalid](#input\_role\_sts\_externalid) | STS ExternalId condition values to use with this role. | `list(string)` | `[]` | no |
| [trusted\_role\_arns](#input\_trusted\_role\_arns) | ARNs of AWS entities who can assume this role. | `list(string)` | `[]` | no |
| [trusted\_role\_services](#input\_trusted\_role\_services) | Names of AWS Services that can assume this role. | `list(string)` | `[]` | no |
| [allow\_self\_assume\_role](#input\_allow\_self\_assume\_role) | Determines whether to allow the role to be assume itself. | `bool` | `false` | no |
| [tags](#input\_tags) | A map of tags to add to the resources created by the module. | `map(string)` | `{}` | no |## Outputs
| Name | Description |
|------|-------------|
| [assumable\_iam\_role](#output\_assumable\_iam\_role) | Cross-account assumable IAM Role ARN |
| [assumable\_iam\_role\_name](#output\_assumable\_iam\_role\_name) | Cross-account assumable IAM Role name |
| [policy\_arns](#output\_policy\_arns) | ARNs of the attached IAM policies |