Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
terraform-aws-iam
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Container Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Terraform Modules
terraform-aws-iam
Commits
151356a8
Unverified
Commit
151356a8
authored
Oct 30, 2020
by
Anton Babenko
Committed by
GitHub
Oct 30, 2020
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
docs: Updated examples in README (#105)
parent
c77256d2
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
13 additions
and
11 deletions
+13
-11
README.md
README.md
+13
-11
No files found.
README.md
View file @
151356a8
...
@@ -29,7 +29,7 @@ Terraform 0.11. Pin module version to `~> v1.0`. Submit pull-requests to `terraf
...
@@ -29,7 +29,7 @@ Terraform 0.11. Pin module version to `~> v1.0`. Submit pull-requests to `terraf
```
hcl
```
hcl
module
"iam_account"
{
module
"iam_account"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-account"
source
=
"terraform-aws-modules/iam/aws//modules/iam-account"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
account_alias
=
"awesome-company"
account_alias
=
"awesome-company"
...
@@ -41,8 +41,8 @@ module "iam_account" {
...
@@ -41,8 +41,8 @@ module "iam_account" {
`iam-assumable-role`
:
`iam-assumable-role`
:
```
hcl
```
hcl
module
"iam_assumable_role"
{
module
"iam_assumable_role"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-role"
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-role"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
trusted_role_arns
=
[
trusted_role_arns
=
[
"arn:aws:iam::307990089504:root"
,
"arn:aws:iam::307990089504:root"
,
...
@@ -58,14 +58,15 @@ module "iam_assumable_role" {
...
@@ -58,14 +58,15 @@ module "iam_assumable_role" {
"arn:aws:iam::aws:policy/AmazonCognitoReadOnly"
,
"arn:aws:iam::aws:policy/AmazonCognitoReadOnly"
,
"arn:aws:iam::aws:policy/AlexaForBusinessFullAccess"
,
"arn:aws:iam::aws:policy/AlexaForBusinessFullAccess"
,
]
]
number_of_custom_role_policy_arns
=
2
}
}
```
```
`iam-assumable-role-with-oidc`
:
`iam-assumable-role-with-oidc`
:
```
hcl
```
hcl
module
"iam_assumable_role_with_oidc"
{
module
"iam_assumable_role_with_oidc"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-role-with-oidc"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
create_role
=
true
create_role
=
true
...
@@ -80,6 +81,7 @@ module "iam_assumable_role_with_oidc" {
...
@@ -80,6 +81,7 @@ module "iam_assumable_role_with_oidc" {
role_policy_arns
=
[
role_policy_arns
=
[
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
,
"arn:aws:iam::aws:policy/AmazonEKS_CNI_Policy"
,
]
]
number_of_role_policy_arns
=
1
}
}
```
```
...
@@ -87,7 +89,7 @@ module "iam_assumable_role_with_oidc" {
...
@@ -87,7 +89,7 @@ module "iam_assumable_role_with_oidc" {
```
hcl
```
hcl
module
"iam_assumable_roles"
{
module
"iam_assumable_roles"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-roles"
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-roles"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
trusted_role_arns
=
[
trusted_role_arns
=
[
"arn:aws:iam::307990089504:root"
,
"arn:aws:iam::307990089504:root"
,
...
@@ -108,7 +110,7 @@ module "iam_assumable_roles" {
...
@@ -108,7 +110,7 @@ module "iam_assumable_roles" {
```
hcl
```
hcl
module
"iam_assumable_roles_with_saml"
{
module
"iam_assumable_roles_with_saml"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-roles-with-saml"
source
=
"terraform-aws-modules/iam/aws//modules/iam-assumable-roles-with-saml"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
create_admin_role
=
true
create_admin_role
=
true
...
@@ -125,7 +127,7 @@ module "iam_assumable_roles_with_saml" {
...
@@ -125,7 +127,7 @@ module "iam_assumable_roles_with_saml" {
```
hcl
```
hcl
module
"iam_user"
{
module
"iam_user"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-user"
source
=
"terraform-aws-modules/iam/aws//modules/iam-user"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
name
=
"vasya.pupkin"
name
=
"vasya.pupkin"
force_destroy
=
true
force_destroy
=
true
...
@@ -140,7 +142,7 @@ module "iam_user" {
...
@@ -140,7 +142,7 @@ module "iam_user" {
```
hcl
```
hcl
module
"iam_policy"
{
module
"iam_policy"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-policy"
source
=
"terraform-aws-modules/iam/aws//modules/iam-policy"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
name
=
"example"
name
=
"example"
path
=
"/"
path
=
"/"
...
@@ -167,7 +169,7 @@ EOF
...
@@ -167,7 +169,7 @@ EOF
```
hcl
```
hcl
module
"iam_group_with_assumable_roles_policy"
{
module
"iam_group_with_assumable_roles_policy"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-group-with-assumable-roles-policy"
source
=
"terraform-aws-modules/iam/aws//modules/iam-group-with-assumable-roles-policy"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
name
=
"production-readonly"
name
=
"production-readonly"
...
@@ -186,7 +188,7 @@ module "iam_group_with_assumable_roles_policy" {
...
@@ -186,7 +188,7 @@ module "iam_group_with_assumable_roles_policy" {
```
hcl
```
hcl
module
"iam_group_with_policies"
{
module
"iam_group_with_policies"
{
source
=
"terraform-aws-modules/iam/aws//modules/iam-group-with-policies"
source
=
"terraform-aws-modules/iam/aws//modules/iam-group-with-policies"
version
=
"~>
2
.0"
version
=
"~>
3
.0"
name
=
"superadmins"
name
=
"superadmins"
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment