instance_profile.tf 1.6 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849
  1. resource "aws_iam_instance_profile" "instance_profile" {
  2. name = "${var.prefix}-instance-profile"
  3. path = "/instance/"
  4. role = aws_iam_role.instance_role.name
  5. }
  6. resource "aws_iam_role" "instance_role" {
  7. name = "${var.prefix}-instance-role"
  8. path = "/instance/"
  9. assume_role_policy = <<EOF
  10. {
  11. "Version": "2012-10-17",
  12. "Statement": [
  13. {
  14. "Sid": "",
  15. "Effect": "Allow",
  16. "Principal": {
  17. "Service": [
  18. "ec2.amazonaws.com",
  19. "ssm.amazonaws.com"
  20. ]
  21. },
  22. "Action": "sts:AssumeRole"
  23. }
  24. ]
  25. }
  26. EOF
  27. }
  28. # These 3 are the default profile attachments:
  29. resource "aws_iam_role_policy_attachment" "instance_AmazonEC2RoleforSSM" {
  30. role = aws_iam_role.instance_role.name
  31. policy_arn = "arn:${var.aws_partition}:iam::aws:policy/service-role/AmazonEC2RoleforSSM"
  32. }
  33. resource "aws_iam_role_policy_attachment" "instance_default_policy_attach" {
  34. role = aws_iam_role.instance_role.name
  35. policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/launchroles/default_instance_tag_read"
  36. }
  37. resource "aws_iam_role_policy_attachment" "instance_binaries_policy_attach" {
  38. role = aws_iam_role.instance_role.name
  39. policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/launchroles/default_instance_s3_binaries"
  40. }
  41. resource "aws_iam_role_policy_attachment" "instance_cloudwatch_policy_attach" {
  42. role = aws_iam_role.instance_role.name
  43. policy_arn = "arn:${var.aws_partition}:iam::${var.aws_account_id}:policy/cloudwatch_events"
  44. }