You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
34
35
|[aws_iam_policy_document.assume_role_with_oidc](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
36
+
|[aws_iam_policy_document.inline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
35
37
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
36
38
37
39
## Inputs
@@ -42,6 +44,7 @@ No modules.
42
44
| <aname="input_aws_account_id"></a> [aws\_account\_id](#input\_aws\_account\_id)| The AWS account ID where the OIDC provider lives, leave empty to use the account for the AWS provider |`string`|`""`| no |
43
45
| <aname="input_create_role"></a> [create\_role](#input\_create\_role)| Whether to create a role |`bool`|`false`| no |
44
46
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`false`| no |
47
+
| <aname="input_inline_policy_statements"></a> [inline\_policy\_statements](#input\_inline\_policy\_statements)| List of inline policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) to attach to IAM role as an inline policy |`any`|`[]`| no |
45
48
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`3600`| no |
46
49
| <aname="input_number_of_role_policy_arns"></a> [number\_of\_role\_policy\_arns](#input\_number\_of\_role\_policy\_arns)| Number of IAM policies to attach to IAM role |`number`|`null`| no |
47
50
| <aname="input_oidc_fully_qualified_audiences"></a> [oidc\_fully\_qualified\_audiences](#input\_oidc\_fully\_qualified\_audiences)| The audience to be added to the role policy. Set to sts.amazonaws.com for cross-account assumable role. Leave empty otherwise. |`set(string)`|`[]`| no |
description="List of inline policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) to attach to IAM role as an inline policy"
81
+
type=any
82
+
default=[]
83
+
}
84
+
79
85
variable"oidc_fully_qualified_subjects" {
80
86
description="The fully qualified OIDC subjects to be added to the role policy"
|[aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity)| data source |
36
37
|[aws_iam_policy_document.assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
37
38
|[aws_iam_policy_document.assume_role_with_mfa](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
39
+
|[aws_iam_policy_document.inline](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document)| data source |
38
40
|[aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition)| data source |
39
41
40
42
## Inputs
@@ -52,6 +54,7 @@ No modules.
52
54
| <aname="input_custom_role_policy_arns"></a> [custom\_role\_policy\_arns](#input\_custom\_role\_policy\_arns)| List of ARNs of IAM policies to attach to IAM role |`list(string)`|`[]`| no |
53
55
| <aname="input_custom_role_trust_policy"></a> [custom\_role\_trust\_policy](#input\_custom\_role\_trust\_policy)| A custom role trust policy. (Only valid if create\_custom\_role\_trust\_policy = true) |`string`|`""`| no |
54
56
| <aname="input_force_detach_policies"></a> [force\_detach\_policies](#input\_force\_detach\_policies)| Whether policies should be detached from this role when destroying |`bool`|`false`| no |
57
+
| <aname="input_inline_policy_statements"></a> [inline\_policy\_statements](#input\_inline\_policy\_statements)| List of inline policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) to attach to IAM role as an inline policy |`any`|`[]`| no |
55
58
| <aname="input_max_session_duration"></a> [max\_session\_duration](#input\_max\_session\_duration)| Maximum CLI/API session duration in seconds between 3600 and 43200 |`number`|`3600`| no |
56
59
| <aname="input_mfa_age"></a> [mfa\_age](#input\_mfa\_age)| Max age of valid MFA (in seconds) for roles which require MFA |`number`|`86400`| no |
57
60
| <aname="input_number_of_custom_role_policy_arns"></a> [number\_of\_custom\_role\_policy\_arns](#input\_number\_of\_custom\_role\_policy\_arns)| Number of IAM policies to attach to IAM role |`number`|`null`| no |
description="List of inline policy [statements](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document#statement) to attach to IAM role as an inline policy"
0 commit comments