Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace managed_policy_arns with aws_iam_role_policy_attachment #162

Open
wants to merge 8 commits into
base: main
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 19 additions & 9 deletions infra/modules/database/resources/role_manager.tf
Original file line number Diff line number Diff line change
Expand Up @@ -74,18 +74,28 @@ data "aws_secretsmanager_secret" "db_password" {
resource "aws_iam_role" "role_manager" {
name = "${var.name}-manager"
assume_role_policy = data.aws_iam_policy_document.role_manager_assume_role.json
managed_policy_arns = [
data.aws_iam_policy.lambda_vpc_access.arn,

# Grant the role manager access to the DB as app and migrator users
# so that it can performance database checks. This is needed by
# the infra database tests
aws_iam_policy.app_db_access.arn,
aws_iam_policy.migrator_db_access.arn
]
}

resource "aws_iam_role_policy_attachment" "role_manager_vpc_access" {
role = aws_iam_role.role_manager.name
policy_arn = data.aws_iam_policy.lambda_vpc_access.arn
}

resource "aws_iam_role_policy_attachment" "role_manager_app_db_access" {
# Grants the role manager access to the DB as app and migrator users
# so that it can performance database checks. This is needed by
# the infra database tests
role = aws_iam_role.role_manager.name
policy_arn = aws_iam_policy.app_db_access.arn
}

resource "aws_iam_role_policy_attachment" "role_manager_migrator_db_access" {
# Grants the role manager access to the DB as app and migrator users
# so that it can performance database checks. This is needed by
# the infra database tests
role = aws_iam_role.role_manager.name
policy_arn = aws_iam_policy.migrator_db_access.arn
}

resource "aws_iam_role_policy" "role_manager_access_to_db_password" {
name = "${var.name}-role-manager-ssm-access"
Expand Down
10 changes: 7 additions & 3 deletions infra/modules/service/events_role.tf
Original file line number Diff line number Diff line change
Expand Up @@ -6,9 +6,13 @@
# Role that EventBridge will assume
# The role allows EventBridge to run tasks on the ECS cluster
resource "aws_iam_role" "events" {
name = "${local.cluster_name}-events"
managed_policy_arns = [aws_iam_policy.run_task.arn]
assume_role_policy = data.aws_iam_policy_document.events_assume_role.json
name = "${local.cluster_name}-events"
assume_role_policy = data.aws_iam_policy_document.events_assume_role.json
}

resource "aws_iam_role_policy_attachment" "events" {
role = aws_iam_role.events.name
policy_arn = aws_iam_policy.run_task.arn
}

data "aws_iam_policy_document" "events_assume_role" {
Expand Down
10 changes: 7 additions & 3 deletions infra/modules/service/scheduler_role.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,13 @@
# This role and policy are used by EventBridge to manage the scheduled jobs.

resource "aws_iam_role" "scheduler" {
name = "${var.service_name}-scheduler"
managed_policy_arns = [aws_iam_policy.scheduler.arn]
assume_role_policy = data.aws_iam_policy_document.scheduler_assume_role.json
name = "${var.service_name}-scheduler"
assume_role_policy = data.aws_iam_policy_document.scheduler_assume_role.json
}

resource "aws_iam_role_policy_attachment" "scheduler" {
role = aws_iam_role.scheduler.name
policy_arn = aws_iam_policy.scheduler.arn
}

data "aws_iam_policy_document" "scheduler_assume_role" {
Expand Down
10 changes: 7 additions & 3 deletions infra/modules/service/workflow_orchestrator_role.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,9 +4,13 @@
# This role and policy are used by the Step Functions state machine that manages the scheduled jobs workflow.

resource "aws_iam_role" "workflow_orchestrator" {
name = "${var.service_name}-workflow-orchestrator"
managed_policy_arns = [aws_iam_policy.workflow_orchestrator.arn]
assume_role_policy = data.aws_iam_policy_document.workflow_orchestrator_assume_role.json
name = "${var.service_name}-workflow-orchestrator"
assume_role_policy = data.aws_iam_policy_document.workflow_orchestrator_assume_role.json
}

resource "aws_iam_role_policy_attachment" "workflow_orchestrator" {
role = aws_iam_role.workflow_orchestrator.name
policy_arn = aws_iam_policy.workflow_orchestrator.arn
}

data "aws_iam_policy_document" "workflow_orchestrator_assume_role" {
Expand Down
Loading