forked from cloudposse/terraform-aws-iam-role
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathvariables.tf
57 lines (48 loc) · 1.65 KB
/
variables.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
variable "use_fullname" {
type = bool
default = true
description = "Set 'true' to use `namespace-stage-name` for ecr repository name, else `name`"
}
variable "principals" {
type = map(list(string))
description = "Map of service name as key and a list of ARNs to allow assuming the role as value (e.g. map(`AWS`, list(`arn:aws:iam:::role/admin`)))"
default = {}
}
variable "policy_documents" {
type = list(string)
description = "List of JSON IAM policy documents"
default = []
}
variable "policy_document_count" {
type = number
description = "Number of policy documents (length of policy_documents list)"
default = 1
}
variable "max_session_duration" {
type = number
default = 3600
description = "The maximum session duration (in seconds) for the role. Can have a value from 1 hour to 12 hours"
}
variable "permissions_boundary" {
type = string
default = ""
description = "ARN of the policy that is used to set the permissions boundary for the role"
}
variable "role_description" {
type = string
description = "The description of the IAM role that is visible in the IAM role manager"
}
variable "policy_description" {
type = string
description = "The description of the IAM policy that is visible in the IAM policy manager"
}
variable "assume_role_actions" {
type = list(string)
default = ["sts:AssumeRole", "sts:TagSession"]
description = "The IAM action to be granted by the AssumeRole policy"
}
variable "instance_profile_enabled" {
type = bool
default = false
description = "Create EC2 Instance Profile for the role"
}