Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
T
tf_mod_aws_iam_assume_role
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
steamhaus
tf_mod_aws_iam_assume_role
Commits
33d00097
Commit
33d00097
authored
Dec 01, 2021
by
Beckybrannan
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
Temporarily commenting out & reconfiguring some resources for testing
parent
c23c813a
Changes
1
Show whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
10 additions
and
10 deletions
+10
-10
main.tf
main.tf
+10
-10
No files found.
main.tf
View file @
33d00097
...
@@ -23,12 +23,12 @@ variable "admin" {
...
@@ -23,12 +23,12 @@ variable "admin" {
# IAM Role, Policy and Attachment
# IAM Role, Policy and Attachment
#############################################################################################################
#############################################################################################################
data
"template_file"
"assume_role"
{
#
data "template_file" "assume_role" {
template
=
"
${
file
(
"
${
path
.
module}
/assume_role.json"
)
}
"
#
template = "${file("${path.module}/assume_role.json")}"
vars
{
#
vars {
source_account_id
=
"
${
var
.
source_account_id
}
"
#
source_account_id = "${var.source_account_id}"
}
#
}
}
#
}
# resource "aws_iam_role" "role" {
# resource "aws_iam_role" "role" {
# count = terraform.required_version < "0.12.0" ? 1 : 0
# count = terraform.required_version < "0.12.0" ? 1 : 0
...
@@ -40,7 +40,7 @@ data "template_file" "assume_role" {
...
@@ -40,7 +40,7 @@ data "template_file" "assume_role" {
# lifecycle { create_before_destroy = true }
# lifecycle { create_before_destroy = true }
# }
# }
resource
"aws_iam_role"
"role"
{
resource
"aws_iam_role"
"role"
{
count
=
terraform
.
required
_version
>
"0.12.0"
?
1
:
0
count
=
var
.
terraform
_version
>
"0.12.0"
?
1
:
0
name
=
"
${
var
.
name
}
"
name
=
"
${
var
.
name
}
"
assume_role_policy
=
templatefile
(
"
${
path
.
module}
/assume_role.json"
,
{
source_account_id
=
var
.
source_account_id
}
)
assume_role_policy
=
templatefile
(
"
${
path
.
module}
/assume_role.json"
,
{
source_account_id
=
var
.
source_account_id
}
)
tags
=
{
tags
=
{
...
@@ -58,13 +58,13 @@ resource "aws_iam_policy" "steamhaus_apn" {
...
@@ -58,13 +58,13 @@ resource "aws_iam_policy" "steamhaus_apn" {
}
}
resource
"aws_iam_role_policy_attachment"
"steamhaus_apn"
{
resource
"aws_iam_role_policy_attachment"
"steamhaus_apn"
{
role
=
"
${
aws_iam_role
.
role
.
name
}
"
role
=
"
${
aws_iam_role
.
role
[
count
.
index
]
.
name
}
"
policy_arn
=
"
${
aws_iam_policy
.
steamhaus_apn
.
arn
}
"
policy_arn
=
"
${
aws_iam_policy
.
steamhaus_apn
[
count
.
index
]
.
arn
}
"
count
=
"
${
var
.
steamhaus_apn
}
"
count
=
"
${
var
.
steamhaus_apn
}
"
}
}
resource
"aws_iam_role_policy_attachment"
"admin"
{
resource
"aws_iam_role_policy_attachment"
"admin"
{
role
=
"
${
aws_iam_role
.
role
.
name
}
"
role
=
"
${
aws_iam_role
.
role
[
count
.
index
]
.
name
}
"
policy_arn
=
"arn:aws:iam::aws:policy/AdministratorAccess"
policy_arn
=
"arn:aws:iam::aws:policy/AdministratorAccess"
count
=
"
${
var
.
admin
}
"
count
=
"
${
var
.
admin
}
"
}
}
\ No newline at end of file
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment