Terraform - IAM user, role, policies 최신화
This commit is contained in:
24
terraform/iam/roles/modules/lambda.tf
Normal file
24
terraform/iam/roles/modules/lambda.tf
Normal file
@@ -0,0 +1,24 @@
|
||||
data "aws_iam_policy_document" "lambda_assume_role" {
|
||||
statement {
|
||||
effect = "Allow"
|
||||
principals {
|
||||
type = "Service"
|
||||
identifiers = ["lambda.amazonaws.com"]
|
||||
}
|
||||
actions = ["sts:AssumeRole"]
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "lambda_role" {
|
||||
name = "DSK_Lambda_Role"
|
||||
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
|
||||
|
||||
tags = {
|
||||
Name = "dsk-lambda-role"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_iam_role_policy_attachment" "lambda_role_policy_attach" {
|
||||
role = aws_iam_role.lambda_role.name
|
||||
policy_arn = var.dsk_lambda_execute_policy
|
||||
}
|
||||
@@ -1,24 +0,0 @@
|
||||
data "aws_iam_policy_document" "assume_role" {
|
||||
statement {
|
||||
effect = "Allow"
|
||||
principals {
|
||||
type = "Service"
|
||||
identifiers = ["lambda.amazonaws.com"]
|
||||
}
|
||||
actions = ["sts:AssumeRole"]
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_iam_role" "role" {
|
||||
name = "DSK_Lambda_Role"
|
||||
assume_role_policy = data.aws_iam_policy_document.assume_role.json
|
||||
|
||||
tags = {
|
||||
Name = "dsk-lambda-role"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_iam_role_policy_attachment" "role_policy_attach" {
|
||||
role = aws_iam_role.role.name
|
||||
policy_arn = var.DSK_LambdaExecute
|
||||
}
|
||||
@@ -1,4 +1,4 @@
|
||||
variable "DSK_LambdaExecute" {
|
||||
variable "dsk_lambda_execute_policy" {
|
||||
type = string
|
||||
default = "arn:aws:iam::508259851457:policy/DSK_LambdaExecute"
|
||||
}
|
||||
Reference in New Issue
Block a user