Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added ability to provide additional IAM Policy ARNs #93

Closed
wants to merge 2 commits into from
Closed
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .terraform.lock.hcl

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -98,6 +98,7 @@ Before you begin using this Terraform module, ensure you meet the following prer
| assume\_role\_session\_name | (Optional) name of the session to be assumed to run session | `string` | `null` | no |
| assume\_role\_external\_id | The external ID can be any identifier that is known only by you and the third party. For example, you can use an invoice ID between you and the third party | `string` | `null` | no |
| assume\_role\_principal\_arn | (Optional) Principal for the IAM role assume policies | `string` | `null` | no |
| graphdb\_additional\_policy\_arns | List of additional IAM policy ARNs to attach to the instance IAM role | `list(string)` | `[]` | no |
| deploy\_backup | Deploy backup module | `bool` | `true` | no |
| backup\_schedule | Cron expression for the backup job. | `string` | `"0 0 * * *"` | no |
| backup\_retention\_count | Number of backups to keep. | `number` | `7` | no |
Expand Down
1 change: 1 addition & 0 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -245,6 +245,7 @@ module "graphdb" {
aws_region = data.aws_region.current.name
aws_subscription_id = data.aws_caller_identity.current.account_id
assume_role_principal_arn = var.assume_role_principal_arn
additional_policy_arns = var.graphdb_additional_policy_arns

# Networking

Expand Down
6 changes: 6 additions & 0 deletions modules/graphdb/iam.tf
Original file line number Diff line number Diff line change
Expand Up @@ -520,3 +520,9 @@ resource "aws_iam_role_policy" "param_store_key_admin_role_permissions" {
role = aws_iam_role.param_store_key_admin_role.name
policy = data.aws_iam_policy_document.param_store_key_admin_role_permissions.json
}

resource "aws_iam_role_policy_attachment" "additional_policies" {
for_each = toset(var.additional_policy_arns)
role = aws_iam_role.graphdb_iam_role.id
policy_arn = each.value
}
6 changes: 6 additions & 0 deletions modules/graphdb/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -442,3 +442,9 @@ variable "user_supplied_templates" {
}))
default = []
}

variable "additional_policy_arns" {
description = "List of additional IAM policy ARNs to attach to the instance IAM role"
type = list(string)
default = []
}
9 changes: 8 additions & 1 deletion variables.tf
Original file line number Diff line number Diff line change
@@ -1,6 +1,5 @@
# Common configurations


variable "deployment_restriction_tag" {
description = "Deployment tag used to restrict access via IAM policies"
type = string
Expand Down Expand Up @@ -57,7 +56,14 @@ variable "assume_role_principal_arn" {
default = null
}

variable "graphdb_additional_policy_arns" {
description = "List of additional IAM policy ARNs to attach to the instance IAM role"
type = list(string)
default = []
}

# Backup configurations

variable "deploy_backup" {
description = "Deploy backup module"
type = bool
Expand Down Expand Up @@ -765,6 +771,7 @@ variable "create_ebs_kms_key" {
type = bool
default = false
}

# SNS Encryption

variable "create_sns_kms_key" {
Expand Down