File tree Expand file tree Collapse file tree 4 files changed +18
-2
lines changed Expand file tree Collapse file tree 4 files changed +18
-2
lines changed Original file line number Diff line number Diff line change @@ -150,6 +150,10 @@ module "iam_role" {
150
150
151
151
trust_policy_permissions = {
152
152
TrustRoleAndServiceToAssume = {
153
+ actions = [
154
+ "sts:AssumeRole",
155
+ "sts:TagSession",
156
+ ]
153
157
principals = [{
154
158
type = "AWS"
155
159
identifiers = [
Original file line number Diff line number Diff line change @@ -46,6 +46,10 @@ module "iam_roles" {
46
46
47
47
trust_policy_permissions = {
48
48
TrustRoleAndServiceToAssume = {
49
+ actions = [
50
+ " sts:AssumeRole" ,
51
+ " sts:TagSession" ,
52
+ ]
49
53
principals = [{
50
54
type = " AWS"
51
55
identifiers = each.value.trusted_arns
@@ -90,6 +94,10 @@ module "iam_role_instance_profile" {
90
94
91
95
trust_policy_permissions = {
92
96
TrustRoleAndServiceToAssume = {
97
+ actions = [
98
+ " sts:AssumeRole" ,
99
+ " sts:TagSession" ,
100
+ ]
93
101
principals = [
94
102
{
95
103
type = " AWS"
Original file line number Diff line number Diff line change @@ -47,7 +47,7 @@ module "iam_user2" {
47
47
48
48
create_inline_policy = true
49
49
inline_policy_permissions = {
50
- s3_read_access = {
50
+ S3ReadAccess = {
51
51
effect = " Allow"
52
52
actions = [
53
53
" s3:GetObject" ,
@@ -58,7 +58,7 @@ module "iam_user2" {
58
58
" arn:aws:s3:::example-bucket/*"
59
59
]
60
60
}
61
- cloudwatch_logs = {
61
+ CloudwatchLogs = {
62
62
effect = " Allow"
63
63
actions = [
64
64
" logs:CreateLogGroup" ,
Original file line number Diff line number Diff line change @@ -63,6 +63,10 @@ module "iam_role" {
63
63
64
64
trust_policy_permissions = {
65
65
TrustRoleAndServiceToAssume = {
66
+ actions = [
67
+ "sts:AssumeRole",
68
+ "sts:TagSession",
69
+ ]
66
70
principals = [{
67
71
type = "AWS"
68
72
identifiers = [
You can’t perform that action at this time.
0 commit comments