@@ -3,32 +3,33 @@ module "wrapper" {
3
3
4
4
for_each = var. items
5
5
6
- trusted_role_actions = try (each. value . trusted_role_actions , var. defaults . trusted_role_actions , [ " sts:AssumeRole " , " sts:TagSession " ] )
7
- trusted_role_arns = try (each. value . trusted_role_arns , var. defaults . trusted_role_arns , [] )
8
- trusted_role_services = try (each. value . trusted_role_services , var. defaults . trusted_role_services , [] )
9
- mfa_age = try (each. value . mfa_age , var. defaults . mfa_age , 86400 )
10
- max_session_duration = try (each. value . max_session_duration , var. defaults . max_session_duration , 3600 )
11
- create_role = try (each. value . create_role , var. defaults . create_role , false )
6
+ admin_role_policy_arn = try (each. value . admin_role_policy_arn , var. defaults . admin_role_policy_arn , " arn:aws:iam::aws:policy/AdministratorAccess " )
7
+ allow_self_assume_role = try (each. value . allow_self_assume_role , var. defaults . allow_self_assume_role , false )
8
+ attach_admin_policy = try (each. value . attach_admin_policy , var. defaults . attach_admin_policy , false )
9
+ attach_poweruser_policy = try (each. value . attach_poweruser_policy , var. defaults . attach_poweruser_policy , false )
10
+ attach_readonly_policy = try (each. value . attach_readonly_policy , var. defaults . attach_readonly_policy , false )
11
+ create_custom_role_trust_policy = try (each. value . create_custom_role_trust_policy , var. defaults . create_custom_role_trust_policy , false )
12
12
create_instance_profile = try (each. value . create_instance_profile , var. defaults . create_instance_profile , false )
13
- role_name = try (each. value . role_name , var. defaults . role_name , null )
14
- role_name_prefix = try (each. value . role_name_prefix , var. defaults . role_name_prefix , null )
15
- role_path = try (each. value . role_path , var. defaults . role_path , " /" )
16
- role_requires_mfa = try (each. value . role_requires_mfa , var. defaults . role_requires_mfa , true )
17
- role_permissions_boundary_arn = try (each. value . role_permissions_boundary_arn , var. defaults . role_permissions_boundary_arn , " " )
18
- tags = try (each. value . tags , var. defaults . tags , {})
13
+ create_role = try (each. value . create_role , var. defaults . create_role , false )
19
14
custom_role_policy_arns = try (each. value . custom_role_policy_arns , var. defaults . custom_role_policy_arns , [])
20
15
custom_role_trust_policy = try (each. value . custom_role_trust_policy , var. defaults . custom_role_trust_policy , " " )
16
+ force_detach_policies = try (each. value . force_detach_policies , var. defaults . force_detach_policies , false )
17
+ max_session_duration = try (each. value . max_session_duration , var. defaults . max_session_duration , 3600 )
18
+ mfa_age = try (each. value . mfa_age , var. defaults . mfa_age , 86400 )
21
19
number_of_custom_role_policy_arns = try (each. value . number_of_custom_role_policy_arns , var. defaults . number_of_custom_role_policy_arns , null )
22
- admin_role_policy_arn = try (each. value . admin_role_policy_arn , var. defaults . admin_role_policy_arn , " arn:aws:iam::aws:policy/AdministratorAccess" )
23
20
poweruser_role_policy_arn = try (each. value . poweruser_role_policy_arn , var. defaults . poweruser_role_policy_arn , " arn:aws:iam::aws:policy/PowerUserAccess" )
24
21
readonly_role_policy_arn = try (each. value . readonly_role_policy_arn , var. defaults . readonly_role_policy_arn , " arn:aws:iam::aws:policy/ReadOnlyAccess" )
25
- attach_admin_policy = try (each. value . attach_admin_policy , var. defaults . attach_admin_policy , false )
26
- attach_poweruser_policy = try (each. value . attach_poweruser_policy , var. defaults . attach_poweruser_policy , false )
27
- attach_readonly_policy = try (each. value . attach_readonly_policy , var. defaults . attach_readonly_policy , false )
28
- force_detach_policies = try (each. value . force_detach_policies , var. defaults . force_detach_policies , false )
29
22
role_description = try (each. value . role_description , var. defaults . role_description , " " )
30
- role_sts_externalid = try (each. value . role_sts_externalid , var. defaults . role_sts_externalid , [])
31
- allow_self_assume_role = try (each. value . allow_self_assume_role , var. defaults . allow_self_assume_role , false )
23
+ role_name = try (each. value . role_name , var. defaults . role_name , null )
24
+ role_name_prefix = try (each. value . role_name_prefix , var. defaults . role_name_prefix , null )
25
+ role_path = try (each. value . role_path , var. defaults . role_path , " /" )
26
+ role_permissions_boundary_arn = try (each. value . role_permissions_boundary_arn , var. defaults . role_permissions_boundary_arn , " " )
27
+ role_requires_mfa = try (each. value . role_requires_mfa , var. defaults . role_requires_mfa , true )
32
28
role_requires_session_name = try (each. value . role_requires_session_name , var. defaults . role_requires_session_name , false )
33
29
role_session_name = try (each. value . role_session_name , var. defaults . role_session_name , [" $${aws:username}" ])
30
+ role_sts_externalid = try (each. value . role_sts_externalid , var. defaults . role_sts_externalid , [])
31
+ tags = try (each. value . tags , var. defaults . tags , {})
32
+ trusted_role_actions = try (each. value . trusted_role_actions , var. defaults . trusted_role_actions , [" sts:AssumeRole" , " sts:TagSession" ])
33
+ trusted_role_arns = try (each. value . trusted_role_arns , var. defaults . trusted_role_arns , [])
34
+ trusted_role_services = try (each. value . trusted_role_services , var. defaults . trusted_role_services , [])
34
35
}
0 commit comments