@@ -15,21 +15,18 @@ github_repo: clouddrove/terraform-aws-iam-role
15
15
16
16
# Badges to display
17
17
badges :
18
- - name : " Terraform"
19
- image : " https://img.shields.io/badge/Terraform-v1.1.7-green"
20
- url : " https://www.terraform.io"
21
- - name : " Licence"
22
- image : " https://img.shields.io/badge/License-APACHE-blue.svg"
23
- url : " LICENSE.md"
18
+ - name : " Latest Release"
19
+ image : " https://img.shields.io/github/release/clouddrove/terraform-aws-iam-role.svg"
20
+ url : " https://github.com/clouddrove/terraform-aws-iam-role/releases/latest"
24
21
- name : " tfsec"
25
22
image : " https://github.com/clouddrove/terraform-aws-iam-role/actions/workflows/tfsec.yml/badge.svg"
26
23
url : " https://github.com/clouddrove/terraform-aws-iam-role/actions/workflows/tfsec.yml"
27
- - name : " static-checks "
28
- image : " https://github.com/clouddrove/terraform-aws-iam-role/actions/workflows/terraform.yml/badge .svg"
29
- url : " https://github.com/clouddrove/terraform-aws-iam-role/actions/workflows/terraform.yml "
24
+ - name : " Licence "
25
+ image : " https://img.shields.io/badge/License-APACHE-blue .svg"
26
+ url : " LICENSE.md "
30
27
31
28
prerequesties :
32
- - name : Terraform 1.5.4
29
+ - name : Terraform 1.5.6
33
30
url : https://learn.hashicorp.com/terraform/getting-started/install.html
34
31
35
32
# description of this project
@@ -47,21 +44,19 @@ usage: |-
47
44
### Simple example
48
45
Here is an example of how you can use this module in your inventory structure:
49
46
```hcl
50
- module "iam-role" {
47
+ module "iam-role" {
51
48
source = "clouddrove/iam-role/aws"
52
- version = "1.3.0"
53
-
54
- name = "iam-role"
55
- application = "clouddrove"
56
- environment = "test"
57
- label_order = ["environment", "name"]
58
- assume_role_policy = data.aws_iam_policy_document.default.json
59
- managed_policy_arns =
60
- policy_enabled = true
61
- policy = data.aws_iam_policy_document.iam-policy.json
49
+ name = local.name
50
+ environment = local.environment
51
+ assume_role_policy = data.aws_iam_policy_document.default.json
52
+ policy_enabled = true
53
+ policy = data.aws_iam_policy_document.iam-policy.json
62
54
}
63
55
64
- data "aws_iam_policy_document" "default" {
56
+ ##-----------------------------------------------------------------------------
57
+ ## Data block to create IAM policy.
58
+ ##-----------------------------------------------------------------------------
59
+ data "aws_iam_policy_document" "default" {
65
60
statement {
66
61
effect = "Allow"
67
62
actions = ["sts:AssumeRole"]
@@ -72,14 +67,17 @@ usage: |-
72
67
}
73
68
}
74
69
75
- data "aws_iam_policy_document" "iam-policy" {
70
+ ##-----------------------------------------------------------------------------
71
+ ## Data block to create IAM policy.
72
+ ##-----------------------------------------------------------------------------
73
+ data "aws_iam_policy_document" "iam-policy" {
76
74
statement {
77
75
actions = [
78
76
"ssm:UpdateInstanceInformation",
79
77
"ssmmessages:CreateControlChannel",
80
78
"ssmmessages:CreateDataChannel",
81
79
"ssmmessages:OpenControlChannel",
82
- "ssmmessages:OpenDataChannel" ]
80
+ "ssmmessages:OpenDataChannel"]
83
81
effect = "Allow"
84
82
resources = ["*"]
85
83
}
0 commit comments