Skip to content

Commit

Permalink
fix: Removed inline policies from eks_app (#106)
Browse files Browse the repository at this point in the history
* wip

* wip

* wip

* chore(dev): Role policies to attachments

* removed inline policies

---------

Co-authored-by: elaina <ehodgkin9418@gmail.com>
  • Loading branch information
George Scott and elainaRenee authored Jul 13, 2023
1 parent 841044c commit bb34c7b
Show file tree
Hide file tree
Showing 5 changed files with 49 additions and 27 deletions.
39 changes: 29 additions & 10 deletions modules/app_eks/iam-policies.tf
Original file line number Diff line number Diff line change
@@ -1,24 +1,43 @@
resource "aws_iam_policy" "node_cloudwatch_policy" {
resource "aws_iam_policy" "node_cloudwatch" {
name = "${var.namespace}-node-cloudwatch"
policy = data.aws_iam_policy_document.node_cloudwatch_policy.json
policy = data.aws_iam_policy_document.node_cloudwatch.json
lifecycle {
create_before_destroy = false
}

}

resource "aws_iam_policy" "node_IMDSv2_policy" {
resource "aws_iam_policy" "node_IMDSv2" {
name = "${var.namespace}-node-IMDSv2"
policy = data.aws_iam_policy_document.node_IMDSv2_policy.json
policy = data.aws_iam_policy_document.node_IMDSv2.json
lifecycle {
create_before_destroy = false
}

}

resource "aws_iam_policy" "node_kms_policy" {
resource "aws_iam_policy" "node_kms" {
name = "${var.namespace}-node-kms"
policy = data.aws_iam_policy_document.node_kms_policy.json
policy = data.aws_iam_policy_document.node_kms.json
lifecycle {
create_before_destroy = false
}

}

resource "aws_iam_policy" "node_sqs_policy" {
resource "aws_iam_policy" "node_sqs" {
name = "${var.namespace}-node-sqs"
policy = data.aws_iam_policy_document.node_sqs_policy.json
policy = data.aws_iam_policy_document.node_sqs.json
lifecycle {
create_before_destroy = false
}

}

resource "aws_iam_policy" "node_s3_policy" {
resource "aws_iam_policy" "node_s3" {
name = "${var.namespace}-node-s3"
policy = data.aws_iam_policy_document.node_s3_policy.json
policy = data.aws_iam_policy_document.node_s3.json
lifecycle {
create_before_destroy = false
}
}
12 changes: 6 additions & 6 deletions modules/app_eks/iam-policy-docs.tf
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
data "aws_iam_policy_document" "node_cloudwatch_policy" {
data "aws_iam_policy_document" "node_cloudwatch" {
statement {
sid = "bb2"
actions = ["cloudwatch:PutMetricData"]
Expand All @@ -8,7 +8,7 @@ data "aws_iam_policy_document" "node_cloudwatch_policy" {
}


data "aws_iam_policy_document" "node_IMDSv2_policy" {
data "aws_iam_policy_document" "node_IMDSv2" {
statement {
sid = "cc3"
actions = ["ec2:DescribeInstanceAttribute"]
Expand All @@ -18,7 +18,7 @@ data "aws_iam_policy_document" "node_IMDSv2_policy" {
}


data "aws_iam_policy_document" "node_kms_policy" {
data "aws_iam_policy_document" "node_kms" {
statement {
sid = "dd4"
actions = [
Expand All @@ -36,11 +36,11 @@ data "aws_iam_policy_document" "node_kms_policy" {

//////////////////////////////////////////////////
// because terraform vomits when we send a policy
// doucment with noe resources defined, i'm
// doucment with noe resources defined, so
// fudging and using the arn of the caller id
// if var.bucket_sqs_queue_arn is empty
//////////////////////////////////////////////////
data "aws_iam_policy_document" "node_sqs_policy" {
data "aws_iam_policy_document" "node_sqs" {
statement {
sid = "ee5"
actions = ["sqs:*"]
Expand All @@ -50,7 +50,7 @@ data "aws_iam_policy_document" "node_sqs_policy" {
}


data "aws_iam_policy_document" "node_s3_policy" {
data "aws_iam_policy_document" "node_s3" {
statement {
sid = "ff6"
actions = ["s3:*"]
Expand Down
18 changes: 9 additions & 9 deletions modules/app_eks/iam-role-attachments.tf
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
resource "aws_iam_role_policy_attachment" "node_cloudwatch" {
role = aws_iam_role.node.name
policy_arn = aws_iam_policy.node_cloudwatch_policy.arn
policy_arn = aws_iam_policy.node_cloudwatch.arn
}

resource "aws_iam_role_policy_attachment" "node_IMDSv2_policy" {
resource "aws_iam_role_policy_attachment" "node_IMDSv2" {
role = aws_iam_role.node.name
policy_arn = aws_iam_policy.node_IMDSv2_policy.arn
policy_arn = aws_iam_policy.node_IMDSv2.arn
}

resource "aws_iam_role_policy_attachment" "node_kms_policy" {
resource "aws_iam_role_policy_attachment" "node_kms" {
role = aws_iam_role.node.name
policy_arn = aws_iam_policy.node_kms_policy.arn
policy_arn = aws_iam_policy.node_kms.arn
}

resource "aws_iam_role_policy_attachment" "node_sqs_policy" {
resource "aws_iam_role_policy_attachment" "node_sqs" {
role = aws_iam_role.node.name
policy_arn = aws_iam_policy.node_sqs_policy.arn
policy_arn = aws_iam_policy.node_sqs.arn
}

resource "aws_iam_role_policy_attachment" "node_s3_policy" {
resource "aws_iam_role_policy_attachment" "node_s3" {
role = aws_iam_role.node.name
policy_arn = aws_iam_policy.node_s3_policy.arn
policy_arn = aws_iam_policy.node_s3.arn
}
2 changes: 1 addition & 1 deletion modules/app_eks/iam-role-policies.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@

data "aws_iam_policy_document" "node_assume_role_policy" {
data "aws_iam_policy_document" "node_assume" {
statement {
sid = "aa1"
actions = ["sts:AssumeRole"]
Expand Down
5 changes: 4 additions & 1 deletion modules/app_eks/iam-roles.tf
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
resource "aws_iam_role" "node" {
name = "${var.namespace}-node"
assume_role_policy = data.aws_iam_policy_document.node_assume_role_policy.json
assume_role_policy = data.aws_iam_policy_document.node_assume.json

inline_policy {}

}

0 comments on commit bb34c7b

Please sign in to comment.