Skip to content

Commit da430e8

Browse files
committed
Add permissions_boundary_arn variable
1 parent 7348d53 commit da430e8

File tree

7 files changed

+21
-5
lines changed

7 files changed

+21
-5
lines changed

README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@ Terraform module which creates ECS cluster resources on AWS.
77
```hcl
88
module "php" {
99
source = "rabiloo/ecs/aws"
10-
version = "~> 0.2.1"
10+
version = "~> 0.2.2"
1111
1212
name = "app-ecs-cluster"
1313
capacity_providers = ["FARGATE", "FARGATE_SPOT"]

modules/ecs-execution-role/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -62,6 +62,7 @@ module "task_execution_role" {
6262
| <a name="input_name"></a> [name](#input\_name) | The name of the IAM role | `string` | n/a | yes |
6363
| <a name="input_description"></a> [description](#input\_description) | The description of the IAM role | `string` | `"This is a customized role"` | no |
6464
| <a name="input_path"></a> [path](#input\_path) | The path to the IAM role | `string` | `"/"` | no |
65+
| <a name="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn) | The permissions boundary of the IAM role | `string` | `""` | no |
6566
| <a name="input_readable_kms_keys_arn"></a> [readable\_kms\_keys\_arn](#input\_readable\_kms\_keys\_arn) | The list KMS key\_id | `list(string)` | `[]` | no |
6667
| <a name="input_readable_secrets_arn"></a> [readable\_secrets\_arn](#input\_readable\_secrets\_arn) | The list secret ARN | `list(string)` | `[]` | no |
6768
| <a name="input_tags"></a> [tags](#input\_tags) | The list of tags to apply to the IAM role | `map(string)` | `{}` | no |

modules/ecs-execution-role/main.tf

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -73,8 +73,9 @@ module "this" {
7373
role_description = var.description
7474
tags = var.tags
7575

76-
create_role = true
77-
role_requires_mfa = false
76+
create_role = true
77+
role_requires_mfa = false
78+
role_permissions_boundary_arn = var.permissions_boundary_arn
7879

7980
trusted_role_actions = [
8081
"sts:AssumeRole",

modules/ecs-execution-role/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -47,3 +47,9 @@ variable "readable_secrets_arn" {
4747
type = list(string)
4848
default = []
4949
}
50+
51+
variable "permissions_boundary_arn" {
52+
description = "The permissions boundary of the IAM role"
53+
type = string
54+
default = ""
55+
}

modules/ecs-task-role/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ module "task_role" {
7070
| <a name="input_name"></a> [name](#input\_name) | The name of the IAM role | `string` | n/a | yes |
7171
| <a name="input_description"></a> [description](#input\_description) | The description of the IAM role | `string` | `"This is a customized role"` | no |
7272
| <a name="input_path"></a> [path](#input\_path) | The path to the IAM role | `string` | `"/"` | no |
73+
| <a name="input_permissions_boundary_arn"></a> [permissions\_boundary\_arn](#input\_permissions\_boundary\_arn) | The permissions boundary of the IAM role | `string` | `""` | no |
7374
| <a name="input_readable_s3_arns"></a> [readable\_s3\_arns](#input\_readable\_s3\_arns) | The list of S3 ARN that can be read from | `list(string)` | <pre>[<br> "arn:aws:s3:::*"<br>]</pre> | no |
7475
| <a name="input_sendable_ses_arns"></a> [sendable\_ses\_arns](#input\_sendable\_ses\_arns) | The list of SES domain identity ARN that can be sent from | `list(string)` | <pre>[<br> "arn:aws:ses:*:*:*"<br>]</pre> | no |
7576
| <a name="input_tags"></a> [tags](#input\_tags) | The list of tags to apply to the IAM role | `map(string)` | `{}` | no |

modules/ecs-task-role/main.tf

Lines changed: 3 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -121,8 +121,9 @@ module "this" {
121121
role_description = var.description
122122
tags = var.tags
123123

124-
create_role = true
125-
role_requires_mfa = false
124+
create_role = true
125+
role_requires_mfa = false
126+
role_permissions_boundary_arn = var.permissions_boundary_arn
126127

127128
trusted_role_actions = [
128129
"sts:AssumeRole",

modules/ecs-task-role/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,12 @@ variable "description" {
3636
default = "This is a customized role"
3737
}
3838

39+
variable "permissions_boundary_arn" {
40+
description = "The permissions boundary of the IAM role"
41+
type = string
42+
default = ""
43+
}
44+
3945
variable "writable_s3_arns" {
4046
description = "The list of S3 ARN that can be written to"
4147
type = list(string)

0 commit comments

Comments
 (0)