@@ -20,6 +20,7 @@ resource "aws_iam_role" "execution" {
2020 name = " ${ var . name_prefix } ${ var . aws_iam_role_execution_suffix } "
2121 assume_role_policy = data. aws_iam_policy_document . task_assume . json
2222 permissions_boundary = var. task_role_permissions_boundary_arn
23+ tags = var. tags
2324}
2425
2526resource "aws_iam_role_policy" "task_execution" {
@@ -49,6 +50,7 @@ resource "aws_iam_role" "task" {
4950 name = " ${ var . name_prefix } ${ var . aws_iam_role_task_suffix } "
5051 assume_role_policy = data. aws_iam_policy_document . task_assume . json
5152 permissions_boundary = var. task_role_permissions_boundary_arn
53+ tags = var. tags
5254}
5355
5456resource "aws_iam_role_policy" "log_agent" {
@@ -175,6 +177,7 @@ resource "aws_ecs_task_definition" "task" {
175177 cpu = var. task_definition_cpu
176178 memory = var. task_definition_memory
177179 task_role_arn = aws_iam_role. task . arn
180+ tags = var. tags
178181 dynamic "volume" {
179182 for_each = var. efs_volumes
180183 content {
@@ -221,6 +224,7 @@ resource "aws_ecs_service" "service" {
221224 health_check_grace_period_seconds = var. lb_arn == " " ? null : var. health_check_grace_period_seconds
222225 wait_for_steady_state = var. wait_for_steady_state
223226 enable_execute_command = var. enable_execute_command
227+ tags = var. tags
224228 network_configuration {
225229 subnets = var. private_subnet_ids
226230 security_groups = concat ([aws_security_group . ecs_service . id ], var. service_sg_ids )
0 commit comments