|
1 | | -data "aws_iam_policy_document" "app_runner_assume_role" { |
2 | | - statement { |
3 | | - actions = ["sts:AssumeRole"] |
4 | | - principals { |
5 | | - type = "Service" |
6 | | - identifiers = ["build.apprunner.amazonaws.com", "tasks.apprunner.amazonaws.com"] |
7 | | - } |
8 | | - } |
| 1 | +# Instance Role |
| 2 | +resource "aws_iam_role" "app_runner_instance_role" { |
| 3 | + name = "app-runner-instance-role" |
| 4 | + |
| 5 | + assume_role_policy = jsonencode({ |
| 6 | + Version = "2012-10-17" |
| 7 | + Statement = [ |
| 8 | + { |
| 9 | + Action = "sts:AssumeRole" |
| 10 | + Effect = "Allow" |
| 11 | + Principal = { |
| 12 | + Service = "tasks.apprunner.amazonaws.com" |
| 13 | + } |
| 14 | + } |
| 15 | + ] |
| 16 | + }) |
9 | 17 | } |
10 | 18 |
|
| 19 | +# Service Role |
11 | 20 | resource "aws_iam_role" "app_runner_service_role" { |
12 | | - name = "app-runner-service-role" |
13 | | - assume_role_policy = data.aws_iam_policy_document.app_runner_assume_role.json |
| 21 | + name = "app-runner-service-role" |
| 22 | + |
| 23 | + assume_role_policy = jsonencode({ |
| 24 | + Version = "2012-10-17" |
| 25 | + Statement = [ |
| 26 | + { |
| 27 | + Action = "sts:AssumeRole" |
| 28 | + Effect = "Allow" |
| 29 | + Principal = { |
| 30 | + Service = "build.apprunner.amazonaws.com" |
| 31 | + } |
| 32 | + } |
| 33 | + ] |
| 34 | + }) |
| 35 | +} |
| 36 | + |
| 37 | +# Attach policies to the instance role |
| 38 | +resource "aws_iam_role_policy_attachment" "app_runner_instance_policy" { |
| 39 | + role = aws_iam_role.app_runner_instance_role.name |
| 40 | + policy_arn = "arn:aws:iam::aws:policy/service-role/AWSAppRunnerServicePolicyForECRAccess" |
14 | 41 | } |
15 | 42 |
|
| 43 | +# Attach policies to the service role |
16 | 44 | resource "aws_iam_role_policy_attachment" "app_runner_service_policy" { |
17 | 45 | role = aws_iam_role.app_runner_service_role.name |
18 | 46 | policy_arn = "arn:aws:iam::aws:policy/service-role/AWSAppRunnerServicePolicyForECRAccess" |
19 | 47 | } |
| 48 | + |
| 49 | +# Add SecretsManager access policy for the instance role |
| 50 | +resource "aws_iam_role_policy" "secrets_access" { |
| 51 | + name = "secrets-access" |
| 52 | + role = aws_iam_role.app_runner_instance_role.id |
| 53 | + |
| 54 | + policy = jsonencode({ |
| 55 | + Version = "2012-10-17" |
| 56 | + Statement = [ |
| 57 | + { |
| 58 | + Effect = "Allow" |
| 59 | + Action = [ |
| 60 | + "secretsmanager:GetSecretValue", |
| 61 | + "secretsmanager:DescribeSecret" |
| 62 | + ] |
| 63 | + Resource = [ |
| 64 | + aws_secretsmanager_secret.db_secrets["test"].arn, |
| 65 | + aws_secretsmanager_secret.db_secrets["prod"].arn |
| 66 | + ] |
| 67 | + } |
| 68 | + ] |
| 69 | + }) |
| 70 | +} |
0 commit comments