Skip to content

Latest commit

 

History

History
52 lines (35 loc) · 1.63 KB

File metadata and controls

52 lines (35 loc) · 1.63 KB

Individual IAM assumable role example

Configuration in this directory creates a single IAM role which can be assumed by trusted resources using OpenID Connect Federated Users.

Usage

To run this example you need to execute:

$ terraform init
$ terraform plan
$ terraform apply

Run terraform destroy when you don't need these resources.

Requirements

Name Version
terraform >= 1.0
aws >= 4.0

Providers

No providers.

Modules

Name Source Version
iam_assumable_role_admin ../../modules/iam-assumable-role-with-oidc n/a
iam_assumable_role_self_assume ../../modules/iam-assumable-role-with-oidc n/a

Resources

No resources.

Inputs

No inputs.

Outputs

Name Description
iam_role_arn ARN of IAM role
iam_role_name Name of IAM role
iam_role_path Path of IAM role
iam_role_unique_id Unique ID of IAM role