File tree Expand file tree Collapse file tree 4 files changed +18
-2
lines changed
Expand file tree Collapse file tree 4 files changed +18
-2
lines changed Original file line number Diff line number Diff line change @@ -150,6 +150,10 @@ module "iam_role" {
150150
151151 trust_policy_permissions = {
152152 TrustRoleAndServiceToAssume = {
153+ actions = [
154+ "sts:AssumeRole",
155+ "sts:TagSession",
156+ ]
153157 principals = [{
154158 type = "AWS"
155159 identifiers = [
Original file line number Diff line number Diff line change @@ -46,6 +46,10 @@ module "iam_roles" {
4646
4747 trust_policy_permissions = {
4848 TrustRoleAndServiceToAssume = {
49+ actions = [
50+ " sts:AssumeRole" ,
51+ " sts:TagSession" ,
52+ ]
4953 principals = [{
5054 type = " AWS"
5155 identifiers = each.value.trusted_arns
@@ -90,6 +94,10 @@ module "iam_role_instance_profile" {
9094
9195 trust_policy_permissions = {
9296 TrustRoleAndServiceToAssume = {
97+ actions = [
98+ " sts:AssumeRole" ,
99+ " sts:TagSession" ,
100+ ]
93101 principals = [
94102 {
95103 type = " AWS"
Original file line number Diff line number Diff line change @@ -47,7 +47,7 @@ module "iam_user2" {
4747
4848 create_inline_policy = true
4949 inline_policy_permissions = {
50- s3_read_access = {
50+ S3ReadAccess = {
5151 effect = " Allow"
5252 actions = [
5353 " s3:GetObject" ,
@@ -58,7 +58,7 @@ module "iam_user2" {
5858 " arn:aws:s3:::example-bucket/*"
5959 ]
6060 }
61- cloudwatch_logs = {
61+ CloudwatchLogs = {
6262 effect = " Allow"
6363 actions = [
6464 " logs:CreateLogGroup" ,
Original file line number Diff line number Diff line change @@ -63,6 +63,10 @@ module "iam_role" {
6363
6464 trust_policy_permissions = {
6565 TrustRoleAndServiceToAssume = {
66+ actions = [
67+ "sts:AssumeRole",
68+ "sts:TagSession",
69+ ]
6670 principals = [{
6771 type = "AWS"
6872 identifiers = [
You can’t perform that action at this time.
0 commit comments