Difference between revisions of "Terraform resource: aws iam role"
Jump to navigation
Jump to search
Tags: Mobile web edit, Mobile edit |
Tags: Mobile web edit, Mobile edit |
||
Line 1: | Line 1: | ||
<code>[[aws_iam_role]]</code> creates an IAM role ([https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role tf.io]). | <code>[[aws_iam_role]]</code> creates an IAM role ([https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role tf.io]). | ||
+ | |||
+ | == Official example == | ||
+ | resource "aws_iam_role" "test_role" { | ||
+ | name = "test_role" | ||
+ | |||
+ | # Terraform's "jsonencode" function converts a | ||
+ | # Terraform expression result to valid JSON syntax. | ||
+ | assume_role_policy = jsonencode({ | ||
+ | Version = "2012-10-17" | ||
+ | Statement = [ | ||
+ | { | ||
+ | Action = "sts:AssumeRole" | ||
+ | Effect = "Allow" | ||
+ | Sid = "" | ||
+ | Principal = { | ||
+ | Service = "ec2.amazonaws.com" | ||
+ | } | ||
+ | }, | ||
+ | ] | ||
+ | }) | ||
+ | |||
+ | [[tags]] = { | ||
+ | tag-key = "tag-value" | ||
+ | } | ||
+ | } | ||
== Errors == | == Errors == |
Revision as of 04:43, 28 March 2023
aws_iam_role
creates an IAM role (tf.io).
Official example
resource "aws_iam_role" "test_role" { name = "test_role"
# Terraform's "jsonencode" function converts a # Terraform expression result to valid JSON syntax. assume_role_policy = jsonencode({ Version = "2012-10-17" Statement = [ { Action = "sts:AssumeRole" Effect = "Allow" Sid = "" Principal = { Service = "ec2.amazonaws.com" } }, ] })
tags = { tag-key = "tag-value" } }
Errors
Related terms
See also
- Terraform IAM resources:
aws_iam_user, aws_iam_group, aws_iam_role, aws_iam_role_policy_attachment
,aws_iam_policy
,aws_iam_role_policy, aws_iam_user_policy, aws_iam_user_policy_attachment
,aws_iam_access_key, aws_iam_group_policy, aws_iam_group_policy_attachment, aws_iam_openid_connect_provider
- AWS IAM role, AWS service roles, AWS IAM Roles Anywhere: [
list-roles | get-role | create-role | put-role-policy | create-service-linked-role | attach-role-policy | update-role | add-role-to-instance-profile ], aws ec2 describe-iam-instance-profile-associations ]
, IAM roles for EC2 instances,AWSServiceRoleForAutoScaling
Advertising: