modules/c7n_epam/c7n_role.tf (25 lines of code) (raw):
data "aws_iam_policy_document" "assume_role" {
statement {
actions = ["sts:AssumeRole"]
principals {
type = "AWS"
identifiers = [var.atlantis_role_arn]
}
}
}
resource "aws_iam_role" "read_only_access" {
name = "Read-Only-Access-For-Custodian-${var.region}"
description = "Role to use if you activate EPAM Custodian to test AWS resources"
assume_role_policy = data.aws_iam_policy_document.assume_role.json
}
resource "aws_iam_role_policy_attachment" "read_only_policy" {
role = aws_iam_role.read_only_access.name
policy_arn = "arn:aws:iam::aws:policy/ReadOnlyAccess"
}
resource "aws_ssm_parameter" "role_for_custodian" {
description = "This role arn atlantis will use during EPAM Custodian check"
name = "/custodian/role/arn"
type = "String"
value = aws_iam_role.read_only_access.arn
depends_on = [aws_iam_role.read_only_access]
}