Role-FIAM-Developer.tf 1.3 KB

12345678910111213141516171819202122232425262728293031323334353637
  1. resource "aws_iam_role" "FIAM-Developer" {
  2. name = "FIAM-Developer"
  3. assume_role_policy = "${data.template_file.trust_policy.rendered}"
  4. tags = {
  5. "IAM:PermissionsBoundary" = "FIAM-BOUNDARY-Developer"
  6. "IAM:NamePrefix" = "FIAM-DEV"
  7. }
  8. }
  9. resource "aws_iam_role_policy_attachment" "FIAM-Developer-FIAM-COMMON-RestrictRegions" {
  10. role = "${aws_iam_role.FIAM-Developer.name}"
  11. policy_arn = "${aws_iam_policy.FIAM-COMMON-RestrictRegions.arn}"
  12. }
  13. resource "aws_iam_role_policy_attachment" "FIAM-Developer-FIAM-COMMON-RestrictServices" {
  14. role = "${aws_iam_role.FIAM-Developer.name}"
  15. policy_arn = "${aws_iam_policy.FIAM-COMMON-RestrictServices.arn}"
  16. }
  17. resource "aws_iam_role_policy_attachment" "FIAM-Developer-FIAM-COMMON-IAMBasics" {
  18. role = "${aws_iam_role.FIAM-Developer.name}"
  19. policy_arn = "${aws_iam_policy.FIAM-COMMON-IAMBasics.arn}"
  20. }
  21. resource "aws_iam_role_policy_attachment" "FIAM-Developer-FIAM-COMMON-IAM-EC2" {
  22. role = "${aws_iam_role.FIAM-Developer.name}"
  23. policy_arn = "${aws_iam_policy.FIAM-COMMON-IAM-EC2.arn}"
  24. }
  25. data "template_file" "trust_policy" {
  26. template = "${file("../policies/FIAM-TRUST-TrustPolicy.json")}"
  27. #template = "${file("../policies/FIAM-TRUST-TrustPolicy-MFARequired.json")}"
  28. vars = {
  29. account = "${data.aws_caller_identity.current.account_id}"
  30. }
  31. }