File tree Expand file tree Collapse file tree 3 files changed +5
-4
lines changed
iam-assumable-role-with-oidc Expand file tree Collapse file tree 3 files changed +5
-4
lines changed Original file line number Diff line number Diff line change 1
1
repos :
2
2
- repo : git://github.com/antonbabenko/pre-commit-terraform
3
- rev : v1.43 .0
3
+ rev : v1.44 .0
4
4
hooks :
5
5
- id : terraform_fmt
6
+ - id : terraform_validate
6
7
- id : terraform_docs
7
8
- id : terraform_tflint
8
9
args :
20
21
- ' --args=--only=terraform_standard_module_structure'
21
22
- ' --args=--only=terraform_workspace_remote'
22
23
- repo : git://github.com/pre-commit/pre-commit-hooks
23
- rev : v3.2 .0
24
+ rev : v3.3 .0
24
25
hooks :
25
26
- id : check-merge-conflict
Original file line number Diff line number Diff line change @@ -28,7 +28,7 @@ This module supports IAM Roles for kubernetes service accounts as described in t
28
28
| create\_ role | Whether to create a role | ` bool ` | ` false ` | no |
29
29
| force\_ detach\_ policies | Whether policies should be detached from this role when destroying | ` bool ` | ` false ` | no |
30
30
| max\_ session\_ duration | Maximum CLI/API session duration in seconds between 3600 and 43200 | ` number ` | ` 3600 ` | no |
31
- | number\_ of\_ role\_ policy\_ arns | Number of custom policies passed to variable role\_ policy \_ arns | ` number ` | ` 0 ` | no |
31
+ | number\_ of\_ role\_ policy\_ arns | Number of IAM policies to attach to IAM role | ` number ` | ` 0 ` | no |
32
32
| oidc\_ fully\_ qualified\_ subjects | The fully qualified OIDC subjects to be added to the role policy | ` set(string) ` | ` [] ` | no |
33
33
| oidc\_ subjects\_ with\_ wildcards | The OIDC subject using wildcards to be added to the role policy | ` set(string) ` | ` [] ` | no |
34
34
| provider\_ url | URL of the OIDC Provider. Use provider\_ urls to specify several URLs. | ` string ` | ` "" ` | no |
Original file line number Diff line number Diff line change @@ -32,7 +32,7 @@ Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/U
32
32
| force\_ detach\_ policies | Whether policies should be detached from this role when destroying | ` bool ` | ` false ` | no |
33
33
| max\_ session\_ duration | Maximum CLI/API session duration in seconds between 3600 and 43200 | ` number ` | ` 3600 ` | no |
34
34
| mfa\_ age | Max age of valid MFA (in seconds) for roles which require MFA | ` number ` | ` 86400 ` | no |
35
- | number\_ of\_ custom\_ role\_ policy\_ arns | Number of custom policies passed to variable custom \_ role \_ policy \_ arns | ` number ` | ` 0 ` | no |
35
+ | number\_ of\_ custom\_ role\_ policy\_ arns | Number of IAM policies to attach to IAM role | ` number ` | ` 0 ` | no |
36
36
| poweruser\_ role\_ policy\_ arn | Policy ARN to use for poweruser role | ` string ` | ` "arn:aws:iam::aws:policy/PowerUserAccess" ` | no |
37
37
| readonly\_ role\_ policy\_ arn | Policy ARN to use for readonly role | ` string ` | ` "arn:aws:iam::aws:policy/ReadOnlyAccess" ` | no |
38
38
| role\_ description | IAM Role description | ` string ` | ` "" ` | no |
You can’t perform that action at this time.
0 commit comments