You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| account\_alias | AWS IAM account alias for this account |`string`| n/a | yes |
36
43
| allow\_users\_to\_change\_password | Whether to allow users to change their own password |`bool`|`true`| no |
37
44
| create\_account\_password\_policy | Whether to create AWS IAM account password policy |`bool`|`true`| no |
38
45
| get\_caller\_identity | Whether to get AWS account ID, User ID, and ARN in which Terraform is authorized |`bool`|`true`| no |
39
46
| hard\_expiry | Whether users are prevented from setting a new password after their password has expired (i.e. require administrator reset) |`bool`|`false`| no |
40
47
| max\_password\_age | The number of days that an user password is valid. |`number`|`0`| no |
41
48
| minimum\_password\_length | Minimum length to require for user passwords |`number`|`8`| no |
42
-
| password\_reuse\_prevention | The number of previous passwords that users are prevented from reusing |`number`|n/a|yes|
49
+
| password\_reuse\_prevention | The number of previous passwords that users are prevented from reusing |`number`|`null`|no|
43
50
| require\_lowercase\_characters | Whether to require lowercase characters for user passwords |`bool`|`true`| no |
44
51
| require\_numbers | Whether to require numbers for user passwords |`bool`|`true`| no |
45
52
| require\_symbols | Whether to require symbols for user passwords |`bool`|`true`| no |
Copy file name to clipboardexpand all lines: modules/iam-assumable-role-with-oidc/README.md
+8-1
Original file line number
Diff line number
Diff line change
@@ -7,6 +7,13 @@ Creates single IAM role which can be assumed by trusted resources using OpenID C
7
7
This module supports IAM Roles for kubernetes service accounts as described in the [EKS documentation](https://docs.aws.amazon.com/eks/latest/userguide/iam-roles-for-service-accounts.html).
8
8
9
9
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
10
+
## Requirements
11
+
12
+
| Name | Version |
13
+
|------|---------|
14
+
| terraform |~> 0.12.6 |
15
+
| aws |~> 2.23 |
16
+
10
17
## Providers
11
18
12
19
| Name | Version |
@@ -16,7 +23,7 @@ This module supports IAM Roles for kubernetes service accounts as described in t
16
23
## Inputs
17
24
18
25
| Name | Description | Type | Default | Required |
Copy file name to clipboardexpand all lines: modules/iam-assumable-role/README.md
+8-1
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,13 @@ Creates single IAM role which can be assumed by trusted resources.
5
5
Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-arns) - typically, AWS accounts and users.
6
6
7
7
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
8
+
## Requirements
9
+
10
+
| Name | Version |
11
+
|------|---------|
12
+
| terraform |~> 0.12.6 |
13
+
| aws |~> 2.23 |
14
+
8
15
## Providers
9
16
10
17
| Name | Version |
@@ -14,7 +21,7 @@ Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/U
14
21
## Inputs
15
22
16
23
| Name | Description | Type | Default | Required |
Copy file name to clipboardexpand all lines: modules/iam-assumable-roles/README.md
+8-1
Original file line number
Diff line number
Diff line change
@@ -5,6 +5,13 @@ Creates predefined IAM roles (admin, poweruser and readonly) which can be assume
5
5
Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_identifiers.html#identifiers-arns) - typically, AWS accounts and users.
6
6
7
7
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
8
+
## Requirements
9
+
10
+
| Name | Version |
11
+
|------|---------|
12
+
| terraform |~> 0.12.6 |
13
+
| aws |~> 2.23 |
14
+
8
15
## Providers
9
16
10
17
| Name | Version |
@@ -14,7 +21,7 @@ Trusted resources can be any [IAM ARNs](https://docs.aws.amazon.com/IAM/latest/U
14
21
## Inputs
15
22
16
23
| Name | Description | Type | Default | Required |
Copy file name to clipboardexpand all lines: modules/iam-group-with-assumable-roles-policy/README.md
+8-1
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,13 @@
3
3
Creates IAM group with users who are allowed to assume IAM roles. This is typically done in resource AWS account where IAM users can jump into from IAM AWS account.
4
4
5
5
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
6
+
## Requirements
7
+
8
+
| Name | Version |
9
+
|------|---------|
10
+
| terraform |~> 0.12.6 |
11
+
| aws |~> 2.23 |
12
+
6
13
## Providers
7
14
8
15
| Name | Version |
@@ -12,7 +19,7 @@ Creates IAM group with users who are allowed to assume IAM roles. This is typica
12
19
## Inputs
13
20
14
21
| Name | Description | Type | Default | Required |
| create\_iam\_access\_key | Whether to create IAM access key |`bool`|`true`| no |
33
40
| create\_iam\_user\_login\_profile | Whether to create IAM user login profile |`bool`|`true`| no |
34
41
| create\_user | Whether to create the IAM user |`bool`|`true`| no |
@@ -38,7 +45,7 @@ This module outputs commands and PGP messages which can be decrypted either usin
38
45
| password\_reset\_required | Whether the user should be forced to reset the generated password on first login. |`bool`|`true`| no |
39
46
| path | Desired path for the IAM user |`string`|`"/"`| no |
40
47
| permissions\_boundary | The ARN of the policy that is used to set the permissions boundary for the user. |`string`|`""`| no |
41
-
| pgp\_key | Either a base-64 encoded PGP public key, or a keybase username in the form keybase:username. Used to encrypt password and access key. |`string`|`""`| no |
48
+
| pgp\_key | Either a base-64 encoded PGP public key, or a keybase username in the form `keybase:username`. Used to encrypt password and access key.`pgp_key` is required when `create_iam_user_login_profile` is set to `true`|`string`|`""`| no |
42
49
| ssh\_key\_encoding | Specifies the public key encoding format to use in the response. To retrieve the public key in ssh-rsa format, use SSH. To retrieve the public key in PEM format, use PEM |`string`|`"SSH"`| no |
43
50
| ssh\_public\_key | The SSH public key. The public key must be encoded in ssh-rsa format or PEM format |`string`|`""`| no |
44
51
| tags | A map of tags to add to all resources. |`map(string)`|`{}`| no |
Copy file name to clipboardexpand all lines: modules/iam-user/variables.tf
+1-1
Original file line number
Diff line number
Diff line change
@@ -34,7 +34,7 @@ variable "force_destroy" {
34
34
}
35
35
36
36
variable"pgp_key" {
37
-
description="Either a base-64 encoded PGP public key, or a keybase username in the form keybase:username. Used to encrypt password and access key."
37
+
description="Either a base-64 encoded PGP public key, or a keybase username in the form `keybase:username`. Used to encrypt password and access key. `pgp_key` is required when `create_iam_user_login_profile` is set to `true`"
0 commit comments