You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/ecs-task-role/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -73,11 +73,11 @@ module "task_role" {
73
73
| <aname="input_enable_ssm_core_policy"></a> [enable\_ssm\_core\_policy](#input\_enable\_ssm\_core\_policy)| Enable to attach AmazonSSMManagedInstanceCore to task role |`bool`|`true`| no |
74
74
| <aname="input_path"></a> [path](#input\_path)| The path to the IAM role |`string`|`"/"`| no |
75
75
| <aname="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn)| The permissions boundary of the IAM role |`string`|`""`| no |
76
-
| <aname="input_readable_s3_arns"></a> [readable\_s3\_arns](#input\_readable\_s3\_arns)| The list of S3 ARN that can be read from |`list(string)`| <pre>[<br> "arn:aws:s3:::*"<br>]</pre> | no |
77
-
| <aname="input_sendable_ses_arns"></a> [sendable\_ses\_arns](#input\_sendable\_ses\_arns)| The list of SES domain identity ARN that can be sent from |`list(string)`| <pre>[<br> "arn:aws:ses:*:*:*"<br>]</pre> | no |
76
+
| <aname="input_readable_s3_arns"></a> [readable\_s3\_arns](#input\_readable\_s3\_arns)| The list of S3 ARN that can be read from |`list(string)`| <pre>[<br/> "arn:aws:s3:::*"<br/>]</pre> | no |
77
+
| <aname="input_sendable_ses_arns"></a> [sendable\_ses\_arns](#input\_sendable\_ses\_arns)| The list of SES domain identity ARN that can be sent from |`list(string)`| <pre>[<br/> "arn:aws:ses:*:*:*"<br/>]</pre> | no |
78
78
| <aname="input_tags"></a> [tags](#input\_tags)| The list of tags to apply to the IAM role |`map(string)`|`{}`| no |
79
-
| <aname="input_writable_log_group_arns"></a> [writable\_log\_group\_arns](#input\_writable\_log\_group\_arns)| The list of Log group ARN that can be written to |`list(string)`| <pre>[<br> "arn:aws:logs:::*"<br>]</pre> | no |
80
-
| <aname="input_writable_s3_arns"></a> [writable\_s3\_arns](#input\_writable\_s3\_arns)| The list of S3 ARN that can be written to |`list(string)`| <pre>[<br> "arn:aws:s3:::*"<br>]</pre> | no |
79
+
| <aname="input_writable_log_group_arns"></a> [writable\_log\_group\_arns](#input\_writable\_log\_group\_arns)| The list of Log group ARN that can be written to |`list(string)`| <pre>[<br/> "arn:aws:logs:::*"<br/>]</pre> | no |
80
+
| <aname="input_writable_s3_arns"></a> [writable\_s3\_arns](#input\_writable\_s3\_arns)| The list of S3 ARN that can be written to |`list(string)`| <pre>[<br/> "arn:aws:s3:::*"<br/>]</pre> | no |
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
55
52
|[aws_iam_policy_document.custom](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -61,12 +58,20 @@ No modules.
61
58
| <aname="input_name"></a> [name](#input\_name)| The name of the IAM role |`string`| n/a | yes |
62
59
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
63
60
| <aname="input_description"></a> [description](#input\_description)| The description of the IAM role |`string`|`null`| no |
61
+
| <aname="input_enable_pull_ecr_images"></a> [enable\_pull\_ecr\_images](#input\_enable\_pull\_ecr\_images)| Controls if the task execution role will be permitted to pull ECR private repositories |`bool`|`false`| no |
62
+
| <aname="input_enable_read_secrets"></a> [enable\_read\_secrets](#input\_enable\_read\_secrets)| Controls if the task execution role will be permitted to get/read SecretsManager secrets |`bool`|`false`| no |
63
+
| <aname="input_enable_read_ssm_params"></a> [enable\_read\_ssm\_params](#input\_enable\_read\_ssm\_params)| Controls if the task execution role will be permitted to get/read SSM parameters |`bool`|`false`| no |
64
+
| <aname="input_enable_write_log_streams"></a> [enable\_write\_log\_streams](#input\_enable\_write\_log\_streams)| Controls if the task execution role will be permitted to put/write CloudWatch log streams |`bool`|`false`| no |
64
65
| <aname="input_path"></a> [path](#input\_path)| The path to the IAM role |`string`|`"/"`| no |
65
66
| <aname="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn)| The permissions boundary of the IAM role |`string`|`null`| no |
66
67
| <aname="input_policy_arns"></a> [policy\_arns](#input\_policy\_arns)| The list of IAM policy ARN be attached to IAM role |`map(string)`|`{}`| no |
68
+
| <aname="input_pullable_ecr_images"></a> [pullable\_ecr\_images](#input\_pullable\_ecr\_images)| List of ECR private repositories the task execution role will be permitted to pull |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
69
+
| <aname="input_readable_secrets"></a> [readable\_secrets](#input\_readable\_secrets)| List of SecretsManager secret ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:secretsmanager:*:*:secret:*"<br/>]</pre> | no |
70
+
| <aname="input_readable_ssm_params"></a> [readable\_ssm\_params](#input\_readable\_ssm\_params)| List of SSM parameter ARNs the task execution role will be permitted to get/read |`list(string)`| <pre>[<br/> "arn:aws:ssm:*:*:parameter/*"<br/>]</pre> | no |
67
71
| <aname="input_statements"></a> [statements](#input\_statements)| A map of IAM policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) for custom permission usage |`any`|`{}`| no |
68
72
| <aname="input_tags"></a> [tags](#input\_tags)| TheA map of tags to add to all resources |`map(string)`|`{}`| no |
69
73
| <aname="input_use_name_prefix"></a> [use\_name\_prefix](#input\_use\_name\_prefix)| Determines whether the IAM role name is used as a prefix |`bool`|`true`| no |
74
+
| <aname="input_writable_log_streams"></a> [writable\_log\_streams](#input\_writable\_log\_streams)| List of CloudWatch log streams the task execution role will be permitted to put/write |`list(string)`| <pre>[<br/> "*"<br/>]</pre> | no |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
56
59
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
@@ -65,6 +68,7 @@ No modules.
65
68
| <aname="input_name"></a> [name](#input\_name)| The name of the IAM role |`string`| n/a | yes |
66
69
| <aname="input_create"></a> [create](#input\_create)| Determines whether resources will be created (affects all resources) |`bool`|`true`| no |
67
70
| <aname="input_description"></a> [description](#input\_description)| The description of the IAM role |`string`|`null`| no |
71
+
| <aname="input_enable_execute_command"></a> [enable\_execute\_command](#input\_enable\_execute\_command)| Specifies whether to enable Amazon ECS Exec for the tasks within the service |`bool`|`false`| no |
68
72
| <aname="input_path"></a> [path](#input\_path)| The path to the IAM role |`string`|`"/"`| no |
69
73
| <aname="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn)| The permissions boundary of the IAM role |`string`|`null`| no |
70
74
| <aname="input_policy_arns"></a> [policy\_arns](#input\_policy\_arns)| The list of IAM policy ARN be attached to IAM role |`map(string)`|`{}`| no |
0 commit comments