You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@@ -67,23 +67,23 @@ Terragrunt will call the `sts assume-role` API on your behalf and expose the cre
67
67
68
68
## Leveraging OIDC role assumption
69
69
70
-
In addition, you can combine the `--iam-role` flag with the [`--iam-web-identity-token`](/docs/reference/cli/commands/run#iam-web-identity-token) to use the `AssumeRoleWithWebIdentity` API instead of the `AssumeRole` API.
70
+
In addition, you can combine the `--iam-assume-role` flag with the [`--iam-assume-role-web-identity-token`](/docs/reference/cli/commands/run#iam-assume-role-web-identity-token) to use the `AssumeRoleWithWebIdentity` API instead of the `AssumeRole` API.
71
71
72
72
This is especially convenient in the context of CI/CD pipelines, as it's generally a best practice to assume roles there via OIDC.
73
73
74
-
Configuring OIDC role assumption largely works like the `--iam-role` flag, with the addition of the `--iam-web-identity-token` flag. One special aspect of the `--iam-web-identity-token` flag is that it can use both a token, and the path to a file containing the token.
74
+
Configuring OIDC role assumption largely works like the `--iam-assume-role` flag, with the addition of the `--iam-assume-role-web-identity-token` flag. One special aspect of the `--iam-assume-role-web-identity-token` flag is that it can use both a token, and the path to a file containing the token.
Copy file name to clipboardExpand all lines: docs-starlight/src/content/docs/04-reference/01-hcl/03-attributes.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -177,7 +177,7 @@ explicitly redefined in the current's module `terragrunt.hcl` file.
177
177
178
178
The `iam_role` attribute can be used to specify an IAM role that Terragrunt should assume before invoking OpenTofu/Terraform.
179
179
180
-
The precedence is as follows: `--iam-role` command line option → `TG_IAM_ASSUME_ROLE` env variable →
180
+
The precedence is as follows: `--iam-assume-role` command line option → `TG_IAM_ASSUME_ROLE` env variable →
181
181
`iam_role` attribute of the `terragrunt.hcl` file in the module directory → `iam_role` attribute of the included
182
182
`terragrunt.hcl`.
183
183
@@ -222,7 +222,7 @@ The precedence is as follows: `--iam-assume-role-session-name` command line opti
222
222
223
223
The `iam_web_identity_token` attribute can be used along with `iam_role` to assume a role using AssumeRoleWithWebIdentity. `iam_web_identity_token` can be set to either the token value (typically using `get_env()`), or the path to a file on disk.
224
224
225
-
The precedence is as follows: `--iam-web-identity-token` command line option → `TG_IAM_ASSUME_ROLE_WEB_IDENTITY_TOKEN` env variable →
225
+
The precedence is as follows: `--iam-assume-role-web-identity-token` command line option → `TG_IAM_ASSUME_ROLE_WEB_IDENTITY_TOKEN` env variable →
226
226
`iam_web_identity_token` attribute of the `terragrunt.hcl` file in the module directory → `iam_web_identity_token` attribute of the included
0 commit comments