Skip to content

Commit e7dafc2

Browse files
authored
feat: Add GovCloud support (#44)
1 parent aac81c6 commit e7dafc2

File tree

3 files changed

+7
-4
lines changed

3 files changed

+7
-4
lines changed

.pre-commit-config.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,6 @@ repos:
2121
- '--args=--only=terraform_standard_module_structure'
2222
- '--args=--only=terraform_workspace_remote'
2323
- repo: git://github.com/pre-commit/pre-commit-hooks
24-
rev: v3.4.0
24+
rev: v4.0.1
2525
hooks:
2626
- id: check-merge-conflict

modules/ecs-instance-profile/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -33,6 +33,7 @@ No modules.
3333
| [aws_iam_role_policy_attachment.amazon_ssm_managed_instance_core](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
3434
| [aws_iam_role_policy_attachment.ecs_ec2_cloudwatch_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
3535
| [aws_iam_role_policy_attachment.ecs_ec2_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
36+
| [aws_partition.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/partition) | data source |
3637

3738
## Inputs
3839

modules/ecs-instance-profile/main.tf

Lines changed: 5 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,5 @@
1+
data "aws_partition" "current" {}
2+
13
resource "aws_iam_role" "this" {
24
name = "${var.name}_ecs_instance_role"
35
path = "/ecs/"
@@ -27,17 +29,17 @@ resource "aws_iam_instance_profile" "this" {
2729

2830
resource "aws_iam_role_policy_attachment" "ecs_ec2_role" {
2931
role = aws_iam_role.this.id
30-
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role"
32+
policy_arn = "arn:${data.aws_partition.current.partition}:iam::aws:policy/service-role/AmazonEC2ContainerServiceforEC2Role"
3133
}
3234

3335
resource "aws_iam_role_policy_attachment" "amazon_ssm_managed_instance_core" {
3436
count = var.include_ssm ? 1 : 0
3537

3638
role = aws_iam_role.this.id
37-
policy_arn = "arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore"
39+
policy_arn = "arn:${data.aws_partition.current.partition}:iam::aws:policy/AmazonSSMManagedInstanceCore"
3840
}
3941

4042
resource "aws_iam_role_policy_attachment" "ecs_ec2_cloudwatch_role" {
4143
role = aws_iam_role.this.id
42-
policy_arn = "arn:aws:iam::aws:policy/CloudWatchLogsFullAccess"
44+
policy_arn = "arn:${data.aws_partition.current.partition}:iam::aws:policy/CloudWatchLogsFullAccess"
4345
}

0 commit comments

Comments
 (0)