A role to enable read/write access to a specific S3 bucket via sts:AssumeRole.
It's primarily intended for cross-account scenarios. This is a little odd perhaps
compared to S3 bucket policies and things allowing for native cross-account
access via Principal in the bucket policy itself.
I went this way so that scripts running on EC2 nodes with instance roles would have the ablility to (when needed) use an AssumeRole in order to gain read-write access to a bucket that 99.99% of the time they don't need the read-write access.
| Argument | type | value / description |
|---|---|---|
| name | string | The name of the role we're making. It will be in the /service/ path in IAM |
| trusted_arns | list(string) | The ARNs that should be able to assume this role |
| kms_key_arns | list(string) | (optional) KMS keys that we need to access the bucket |
| description | string | Description tied to the role |
| bucket | string | The bucket that this policy should allow write access to |
| tags | map | (optional) Tags to be applied |
| standard_tags | map | (optional) Other tags to be applied from terragrunt |