You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/iam-assumable-role-with-oidc/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -4,7 +4,7 @@ Creates single IAM role which can be assumed by trusted resources using OpenID C
4
4
5
5
[Creating IAM OIDC Identity Providers](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_create_oidc.html)
6
6
7
-
This module supports IAM Roles for kubernetes service accounts as described in the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
7
+
This module supports IAM Roles for kubernetes service accounts as described in the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
8
8
9
9
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
33
32
|[aws_iam_policy_document.assume_role_with_saml](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
34
-
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
36
35
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
37
36
|[aws_iam_policy_document.assume_role_with_mfa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
38
-
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
39
37
40
38
## Inputs
41
39
@@ -58,6 +56,7 @@ No modules.
58
56
| <aname="input_readonly_role_policy_arn"></a> [readonly\_role\_policy\_arn](#input\_readonly\_role\_policy\_arn)| Policy ARN to use for readonly role |`string`|`"arn:aws:iam::aws:policy/ReadOnlyAccess"`| no |
59
57
| <aname="input_role_description"></a> [role\_description](#input\_role\_description)| IAM Role description |`string`|`""`| no |
60
58
| <aname="input_role_name"></a> [role\_name](#input\_role\_name)| IAM role name |`string`|`""`| no |
59
+
| <aname="input_role_name_prefix"></a> [role\_name\_prefix](#input\_role\_name\_prefix)| IAM role name prefix |`string`|`null`| no |
61
60
| <aname="input_role_path"></a> [role\_path](#input\_role\_path)| Path of IAM role |`string`|`"/"`| no |
62
61
| <aname="input_role_permissions_boundary_arn"></a> [role\_permissions\_boundary\_arn](#input\_role\_permissions\_boundary\_arn)| Permissions boundary ARN to use for IAM role |`string`|`""`| no |
63
62
| <aname="input_role_requires_mfa"></a> [role\_requires\_mfa](#input\_role\_requires\_mfa)| Whether role requires MFA |`bool`|`true`| no |
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
38
37
|[aws_iam_policy_document.assume_role_with_saml](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
39
-
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
0 commit comments