Terraform - IAM user, role, policies 최신화

This commit is contained in:
dsk-minchulahn
2024-01-30 17:46:36 +09:00
parent 886e60ab28
commit f3e9a26a95
11 changed files with 115 additions and 49 deletions

View File

@@ -0,0 +1,24 @@
data "aws_iam_policy_document" "lambda_assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["lambda.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "lambda_role" {
name = "DSK_Lambda_Role"
assume_role_policy = data.aws_iam_policy_document.lambda_assume_role.json
tags = {
Name = "dsk-lambda-role"
}
}
resource "aws_iam_role_policy_attachment" "lambda_role_policy_attach" {
role = aws_iam_role.lambda_role.name
policy_arn = var.dsk_lambda_execute_policy
}

View File

@@ -1,24 +0,0 @@
data "aws_iam_policy_document" "assume_role" {
statement {
effect = "Allow"
principals {
type = "Service"
identifiers = ["lambda.amazonaws.com"]
}
actions = ["sts:AssumeRole"]
}
}
resource "aws_iam_role" "role" {
name = "DSK_Lambda_Role"
assume_role_policy = data.aws_iam_policy_document.assume_role.json
tags = {
Name = "dsk-lambda-role"
}
}
resource "aws_iam_role_policy_attachment" "role_policy_attach" {
role = aws_iam_role.role.name
policy_arn = var.DSK_LambdaExecute
}

View File

@@ -1,4 +1,4 @@
variable "DSK_LambdaExecute" {
variable "dsk_lambda_execute_policy" {
type = string
default = "arn:aws:iam::508259851457:policy/DSK_LambdaExecute"
}