|
1 | | -data "aws_iam_policy_document" "iceberg_ecs_task_policy" { |
| 1 | +# --- Iceberg ECS Task Role --- |
| 2 | + |
| 3 | +data "aws_iam_policy_document" "iceberg_task_assume_role_policy" { |
| 4 | + statement { |
| 5 | + principals { |
| 6 | + type = "Service" |
| 7 | + identifiers = ["ecs-tasks.amazonaws.com"] |
| 8 | + } |
| 9 | + actions = ["sts:AssumeRole"] |
| 10 | + } |
| 11 | +} |
| 12 | + |
| 13 | +resource "aws_iam_role" "iceberg_task_role" { |
| 14 | + name = "${var.prefix}-iceberg-task-role" |
| 15 | + assume_role_policy = data.aws_iam_policy_document.iceberg_task_assume_role_policy.json |
| 16 | + permissions_boundary = var.permissions_boundary_arn |
| 17 | +} |
| 18 | + |
| 19 | +data "aws_iam_policy_document" "iceberg_task_role_policy" { |
| 20 | + |
2 | 21 | statement { |
3 | 22 | actions = [ |
4 | | - "s3:GetObject", |
5 | | - "s3:ListBucket", |
6 | | - "s3:PutObject", |
7 | | - "s3:DeleteObject", |
| 23 | + "s3:GetBucket*", |
| 24 | + "s3:ListBucket*", |
8 | 25 | ] |
9 | 26 | resources = [ |
10 | 27 | "arn:aws:s3:::${var.iceberg_s3_bucket}", |
| 28 | + ] |
| 29 | + } |
| 30 | + |
| 31 | + statement { |
| 32 | + actions = [ |
| 33 | + "s3:GetObject*", |
| 34 | + "s3:ListMultipartUploadParts", |
| 35 | + ] |
| 36 | + resources = [ |
11 | 37 | "arn:aws:s3:::${var.iceberg_s3_bucket}/*", |
12 | 38 | ] |
13 | 39 | } |
14 | 40 |
|
| 41 | + statement { |
| 42 | + actions = [ |
| 43 | + "dynamodb:GetItem", |
| 44 | + "dynamodb:Scan", |
| 45 | + "dynamodb:Query", |
| 46 | + ] |
| 47 | + resources = ["arn:aws:dynamodb:*:*:table/*"] |
| 48 | + } |
| 49 | + |
| 50 | + statement { |
| 51 | + actions = ["dynamodb:Query"] |
| 52 | + resources = ["arn:aws:dynamodb:*:*:table/*/index/*"] |
| 53 | + } |
| 54 | + |
| 55 | + statement { |
| 56 | + actions = [ |
| 57 | + "states:DescribeActivity", |
| 58 | + "states:DescribeExecution", |
| 59 | + "states:GetActivityTask", |
| 60 | + "states:GetExecutionHistory", |
| 61 | + "states:SendTaskFailure", |
| 62 | + "states:SendTaskSuccess", |
| 63 | + ] |
| 64 | + resources = ["arn:aws:states:*:*:*"] |
| 65 | + } |
| 66 | + |
| 67 | + statement { |
| 68 | + actions = ["secretsmanager:GetSecretValue"] |
| 69 | + resources = [var.api_config_secret_arn] |
| 70 | + } |
| 71 | + |
| 72 | + # Iceberg-specific: Glue catalog access |
15 | 73 | statement { |
16 | 74 | actions = ["glue:*"] |
17 | 75 | resources = ["*"] |
18 | 76 | } |
19 | 77 | } |
20 | 78 |
|
21 | | -resource "aws_iam_role_policy" "iceberg_ecs_task_policy" { |
22 | | - name = "${var.prefix}-iceberg-ecs-task-policy" |
23 | | - role = split("/", var.ecs_task_role_arn)[1] |
24 | | - policy = data.aws_iam_policy_document.iceberg_ecs_task_policy.json |
| 79 | +resource "aws_iam_role_policy" "iceberg_task_role_policy" { |
| 80 | + name = "${var.prefix}-iceberg-task-role-policy" |
| 81 | + role = aws_iam_role.iceberg_task_role.name |
| 82 | + policy = data.aws_iam_policy_document.iceberg_task_role_policy.json |
25 | 83 | } |
0 commit comments