Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Support
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
terraform-aws-iam
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Boards
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Packages
Packages
Container Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
Terraform Modules
terraform-aws-iam
Commits
9aad929b
Unverified
Commit
9aad929b
authored
Jun 29, 2021
by
Anton Babenko
Committed by
GitHub
Jun 29, 2021
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
feat: Support External ID with MFA in iam-assumable-role (#159)
parent
0f456693
Changes
2
Show whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
11 additions
and
2 deletions
+11
-2
main.tf
examples/iam-assumable-role/main.tf
+1
-1
main.tf
modules/iam-assumable-role/main.tf
+10
-1
No files found.
examples/iam-assumable-role/main.tf
View file @
9aad929b
...
@@ -75,7 +75,7 @@ module "iam_assumable_role_sts" {
...
@@ -75,7 +75,7 @@ module "iam_assumable_role_sts" {
create_role
=
true
create_role
=
true
role_name
=
"custom_sts"
role_name
=
"custom_sts"
role_requires_mfa
=
fals
e
role_requires_mfa
=
tru
e
role_sts_externalid
=
[
role_sts_externalid
=
[
"some-id-goes-here"
,
"some-id-goes-here"
,
...
...
modules/iam-assumable-role/main.tf
View file @
9aad929b
locals
{
locals
{
role_sts_externalid
=
flatten
(
tolist
(
var
.
role_sts_externalid
)
)
role_sts_externalid
=
flatten
(
[
var
.
role_sts_externalid
]
)
}
}
data
"aws_iam_policy_document"
"assume_role"
{
data
"aws_iam_policy_document"
"assume_role"
{
...
@@ -56,6 +56,15 @@ data "aws_iam_policy_document" "assume_role_with_mfa" {
...
@@ -56,6 +56,15 @@ data "aws_iam_policy_document" "assume_role_with_mfa" {
variable
=
"aws:MultiFactorAuthAge"
variable
=
"aws:MultiFactorAuthAge"
values
=
[
var
.
mfa_age
]
values
=
[
var
.
mfa_age
]
}
}
dynamic
"condition"
{
for_each
=
length
(
local
.
role_sts_externalid
)
!
=
0
?
[
true
]
:
[]
content
{
test
=
"StringEquals"
variable
=
"sts:ExternalId"
values
=
local
.
role_sts_externalid
}
}
}
}
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment