You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_allow_self_assume_role"></a> [allow\_self\_assume\_role](#input\_allow\_self\_assume\_role)| Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)|`bool`|`false`| no |
41
42
| <aname="input_aws_account_id"></a> [aws\_account\_id](#input\_aws\_account\_id)| The AWS account ID where the OIDC provider lives, leave empty to use the account for the AWS provider |`string`|`""`| no |
42
43
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create a role |`bool`|`false`| no |
43
44
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`false`| no |
description="Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)"
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
32
33
|[aws_iam_policy_document.assume_role_with_saml](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
34
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
33
35
34
36
## Inputs
35
37
36
38
| Name | Description | Type | Default | Required |
| <aname="input_allow_self_assume_role"></a> [allow\_self\_assume\_role](#input\_allow\_self\_assume\_role)| Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)|`bool`|`false`| no |
38
41
| <aname="input_aws_saml_endpoint"></a> [aws\_saml\_endpoint](#input\_aws\_saml\_endpoint)| AWS SAML Endpoint |`string`|`"https://signin.aws.amazon.com/saml"`| no |
39
42
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create a role |`bool`|`false`| no |
40
43
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`false`| no |
description="Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)"
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
35
36
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
36
37
|[aws_iam_policy_document.assume_role_with_mfa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
38
+
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
37
39
38
40
## Inputs
39
41
40
42
| Name | Description | Type | Default | Required |
| <aname="input_admin_role_policy_arn"></a> [admin\_role\_policy\_arn](#input\_admin\_role\_policy\_arn)| Policy ARN to use for admin role |`string`|`"arn:aws:iam::aws:policy/AdministratorAccess"`| no |
45
+
| <aname="input_allow_self_assume_role"></a> [allow\_self\_assume\_role](#input\_allow\_self\_assume\_role)| Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)|`bool`|`false`| no |
43
46
| <aname="input_attach_admin_policy"></a> [attach\_admin\_policy](#input\_attach\_admin\_policy)| Whether to attach an admin policy to a role |`bool`|`false`| no |
44
47
| <aname="input_attach_poweruser_policy"></a> [attach\_poweruser\_policy](#input\_attach\_poweruser\_policy)| Whether to attach a poweruser policy to a role |`bool`|`false`| no |
45
48
| <aname="input_attach_readonly_policy"></a> [attach\_readonly\_policy](#input\_attach\_readonly\_policy)| Whether to attach a readonly policy to a role |`bool`|`false`| no |
description="Determines whether to allow the role to be [assume itself](https://aws.amazon.com/blogs/security/announcing-an-update-to-iam-role-trust-policy-behavior/)"
0 commit comments