A Terraform module for creating an IAM role and policy for reading SSM parameters.
module "role_site.example.com" {
source = "github.com/cisagov/ssm-read-role-tf-module?ref=v1.0.0"
providers = {
aws = aws.provision-ssm-read-roles
}
account_ids = ["123456789012"]
entity_name = "site.example.com"
ssm_names = ["/server/foo/secret.txt", "/common/*"]
}You will also need a "meta-role" that you can assume for the purposes of creating the IAM role for reading SSM parameter values. This meta-role requires a permission policy similar to the following:
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "1",
"Effect": "Allow",
"Action": [
"iam:AttachRolePolicy"
"iam:CreateRole",
"iam:DeleteRole",
"iam:DeleteRolePolicy",
"iam:DetachRolePolicy",
"iam:GetRole",
"iam:GetRolePolicy",
"iam:ListAttachedRolePolicies",
"iam:ListInstanceProfilesForRole",
"iam:PutRolePolicy",
"iam:TagRole",
"iam:UpdateAssumeRolePolicy",
"iam:UpdateRole",
],
"Resource": "arn:aws:iam::123456789012:role/ParameterStoreReadOnly-*"
},
{
"Sid": "2",
"Effect": "Allow",
"Action": [
"iam:CreatePolicy"
"iam:CreatePolicyVersion",
"iam:DeletePolicy",
"iam:DeletePolicyVersion",
"iam:GetPolicy",
"iam:GetPolicyVersion",
"iam:ListPolicyVersions",
],
"Resource": "arn:aws:iam::123456789012:policy/ParameterStoreReadOnly-*"
}
]
}| Name | Version |
|---|---|
| terraform | >= 1.1 |
| aws | >= 4.9 |
| Name | Version |
|---|---|
| aws | >= 4.9 |
No modules.
| Name | Type |
|---|---|
| aws_iam_policy.ssm_policy | resource |
| aws_iam_role.ssm_role | resource |
| aws_iam_role_policy_attachment.ssm_policy_attachment | resource |
| aws_caller_identity.current | data source |
| aws_iam_policy_document.assume_role_doc | data source |
| aws_iam_policy_document.ssm_doc | data source |
| Name | Description | Type | Default | Required |
|---|---|---|---|---|
| account_ids | AWS account IDs that are allowed to assume the role. | list(string) |
[] |
no |
| entity_name | The name of the entity that the role is being created for (e.g. "test-user" or "host.example.com"). | string |
n/a | yes |
| iam_usernames | The list of IAM usernames allowed to assume the role. If not provided, defaults to allowing any user in the specified account(s). Note that including "root" in this list will override any other usernames in the list. | list(string) |
[ "root" ] |
no |
| role_description | The description to associate with the IAM role (as well as the corresponding policy) that allows read-only access to the specified SSM Parameter Store parameters. Note that the "%s" in this value will get replaced with the entity_name variable. If there are no instances of "%s" present in this value, no replacement will be made and the value will be used as is. Including more than one instance of "%s" in this value will result in a Terraform error, so don't do that. | string |
"Allows read-only access to SSM Parameter Store parameters required for %s." |
no |
| role_name | The name to assign the IAM role (as well as the corresponding policy) that allows read-only access to the specified SSM Parameter Store parameters. Note that the "%s" in this value will get replaced with the entity_name variable. If there are no instances of "%s" present in this value, no replacement will be made and the value will be used as is. Including more than one instance of "%s" in this value will result in a Terraform error, so don't do that. If the role name is longer than the current AWS limit of 64 characters (either as-is or after entity_name replacement), the role name will be truncated to the first 64 characters. | string |
"ParameterStoreReadOnly-%s" |
no |
| ssm_names | A list of SSM Parameter Store parameters that the created role will be allowed to access. | list(string) |
n/a | yes |
| ssm_regions | AWS regions of target SSMs (e.g. ["us-east-1", "us-east-2"]). If not provided, defaults to all regions. | list(string) |
[ "*" ] |
no |
| Name | Description |
|---|---|
| policy | The IAM policy that can read the specified SSM Parameter Store parameters. |
| role | The IAM role that can read the specified SSM Parameter Store parameters. |
Running pre-commit requires running terraform init in every directory that
contains Terraform code. In this repository, these are the main directory and
every directory under examples/.
We welcome contributions! Please see CONTRIBUTING.md for
details.
This project is in the worldwide public domain.
This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.
All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.