iam-assume-role

anthunt/iam-assume-role/aws

Terraform Module HCL AWS ⏱ stale 5y 4mo

Managing AWS IAM Assume Role for terraform

Install

module "iam-assume-role" {
source = "anthunt/iam-assume-role/aws"
version = "0.0.1"
}
⭐ Source on GitHub 📦 Registry page

README

Managing AWS IAM Assume Role [ terraform-aws-iam-assume-role ] ![Codacy Badge](https://app.codacy.com/gh/anthunt/terraform-aws-iam-assume-role?utm_source=github.com&utm_medium=referral&utm_content=anthunt/terraform-aws-iam-assume-role&utm_campaign=Badge_Grade) [toc] 1. tfvars Sample > ``terraform > aws = { > "region" = "AWS Region ID" > "profile" = "AWS CLI Profile Name from ~/.aws/credentials or config" > } > > assumeRoles = { > > ASSUME-ROLE-NAME-01 = { > description = "Sample Assume Role for 01" > "trusted_arns" = [ > "arn:aws:iam::[Assume Account ID]:root" > ] > "attach_policy_arns" = [ > "Managed Policy ARN 01", > "Managed Policy ARN 02", > ... > ] > "inline_policies" = {} > } # End Of ASSUME-ROLE-NAME-01 > > ASSUME-ROLE-NAME-02 = { > description = null > "trusted_arns" = [ > "arn:aws

Inputs (2)

NameTypeDescriptionDefault
awsobject({ region = str required
assumeRolesmap(object({ descripti required

Outputs (2)

caller_info
assume_role_info

Resources (3)

aws_iam_roleaws_iam_role_policyaws_iam_role_policy_attachment

Details

FrameworkTerraform Module
LanguageHCL
Version0.0.1
Cloud AWS
★ Stars1
Forks1
Total downloads6.0k
Inputs2
Outputs2
Resources3
LicenseApache-2.0
Namespaceanthunt
Updated