Skip to content

Commit

Permalink
v3.3.0 (#2)
Browse files Browse the repository at this point in the history
tag roles and policies
  • Loading branch information
paul-e-allen authored Oct 25, 2022
1 parent 4a1e509 commit bd7b23c
Show file tree
Hide file tree
Showing 3 changed files with 9 additions and 0 deletions.
3 changes: 3 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -18,6 +18,9 @@ Terraform module to create Terraform drift, plan, and apply CodePipelines.

## Change Log

### 3.3.0
- add tags to IAM role and policy resources

### 3.2.0
- added minimum version of v4.9.0 for AWS provider
- added `aws_s3_bucket_acl` resource
Expand Down
1 change: 1 addition & 0 deletions drift-pipeline.tf
Original file line number Diff line number Diff line change
Expand Up @@ -119,6 +119,7 @@ resource "aws_cloudwatch_event_target" "build-drift-trigger" {

resource "aws_iam_role" "build-drift-pipeline-trigger-role" {
name = "${var.namespace}-build-drift-pipeline-trigger-role"
tags = var.global_tags

assume_role_policy = <<EOF
{
Expand Down
5 changes: 5 additions & 0 deletions shared.tf
Original file line number Diff line number Diff line change
Expand Up @@ -22,6 +22,7 @@ resource "aws_s3_bucket_acl" "codepipeline_bucket" {

resource "aws_iam_role" "codepipeline_role" {
name = "${var.namespace}-pipeline-role"
tags = var.global_tags

assume_role_policy = <<EOF
{
Expand Down Expand Up @@ -86,6 +87,7 @@ EOF

resource "aws_iam_role" "build-role" {
name = "${var.namespace}-build-role"
tags = var.global_tags

assume_role_policy = <<EOF
{
Expand All @@ -106,6 +108,7 @@ EOF

resource "aws_iam_role" "apply-role" {
name = "${var.namespace}-apply-role"
tags = var.global_tags

assume_role_policy = <<EOF
{
Expand Down Expand Up @@ -146,6 +149,7 @@ EOF

resource "aws_iam_policy" "build-policy" {
name = "${var.namespace}-build-policy"
tags= var.global_tags

policy = <<POLICY
{
Expand Down Expand Up @@ -217,6 +221,7 @@ POLICY

resource "aws_iam_policy" "apply-policy" {
name = "${var.namespace}-apply-policy"
tags = var.global_tags

policy = <<POLICY
{
Expand Down

0 comments on commit bd7b23c

Please sign in to comment.