@@ -29,7 +29,7 @@ Terraform 0.11. Pin module version to `~> v1.0`. Submit pull-requests to `terraf
29
29
``` hcl
30
30
module "iam_account" {
31
31
source = "terraform-aws-modules/iam/aws//modules/iam-account"
32
- version = "~> 2 .0"
32
+ version = "~> 3 .0"
33
33
34
34
account_alias = "awesome-company"
35
35
@@ -41,8 +41,8 @@ module "iam_account" {
41
41
` iam-assumable-role ` :
42
42
``` hcl
43
43
module "iam_assumable_role" {
44
- source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role"
45
- version = "~> 2 .0"
44
+ source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role"
45
+ version = "~> 3 .0"
46
46
47
47
trusted_role_arns = [
48
48
"arn:aws:iam::307990089504:root",
@@ -58,14 +58,15 @@ module "iam_assumable_role" {
58
58
"arn:aws:iam::aws:policy/AmazonCognitoReadOnly",
59
59
"arn:aws:iam::aws:policy/AlexaForBusinessFullAccess",
60
60
]
61
+ number_of_custom_role_policy_arns = 2
61
62
}
62
63
```
63
64
64
65
` iam-assumable-role-with-oidc ` :
65
66
``` hcl
66
67
module "iam_assumable_role_with_oidc" {
67
- source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
68
- version = "~> 2 .0"
68
+ source = "terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
69
+ version = "~> 3 .0"
69
70
70
71
create_role = true
71
72
@@ -80,14 +81,15 @@ module "iam_assumable_role_with_oidc" {
80
81
role_policy_arns = [
81
82
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy",
82
83
]
84
+ number_of_role_policy_arns = 1
83
85
}
84
86
```
85
87
86
88
` iam-assumable-roles ` :
87
89
``` hcl
88
90
module "iam_assumable_roles" {
89
91
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles"
90
- version = "~> 2 .0"
92
+ version = "~> 3 .0"
91
93
92
94
trusted_role_arns = [
93
95
"arn:aws:iam::307990089504:root",
@@ -108,7 +110,7 @@ module "iam_assumable_roles" {
108
110
``` hcl
109
111
module "iam_assumable_roles_with_saml" {
110
112
source = "terraform-aws-modules/iam/aws//modules/iam-assumable-roles-with-saml"
111
- version = "~> 2 .0"
113
+ version = "~> 3 .0"
112
114
113
115
create_admin_role = true
114
116
@@ -125,7 +127,7 @@ module "iam_assumable_roles_with_saml" {
125
127
``` hcl
126
128
module "iam_user" {
127
129
source = "terraform-aws-modules/iam/aws//modules/iam-user"
128
- version = "~> 2 .0"
130
+ version = "~> 3 .0"
129
131
130
132
name = "vasya.pupkin"
131
133
force_destroy = true
@@ -140,7 +142,7 @@ module "iam_user" {
140
142
``` hcl
141
143
module "iam_policy" {
142
144
source = "terraform-aws-modules/iam/aws//modules/iam-policy"
143
- version = "~> 2 .0"
145
+ version = "~> 3 .0"
144
146
145
147
name = "example"
146
148
path = "/"
167
169
``` hcl
168
170
module "iam_group_with_assumable_roles_policy" {
169
171
source = "terraform-aws-modules/iam/aws//modules/iam-group-with-assumable-roles-policy"
170
- version = "~> 2 .0"
172
+ version = "~> 3 .0"
171
173
172
174
name = "production-readonly"
173
175
@@ -186,7 +188,7 @@ module "iam_group_with_assumable_roles_policy" {
186
188
``` hcl
187
189
module "iam_group_with_policies" {
188
190
source = "terraform-aws-modules/iam/aws//modules/iam-group-with-policies"
189
- version = "~> 2 .0"
191
+ version = "~> 3 .0"
190
192
191
193
name = "superadmins"
192
194
0 commit comments