aws_iam_role_policy_attachment
Attaches a Managed IAM Policy to an IAM role
Example Usage
resource "aws_iam_role" "role" { name = "test-role" assume_role_policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": "sts:AssumeRole", "Principal": { "Service": "ec2.amazonaws.com" }, "Effect": "Allow", "Sid": "" } ] } EOF } resource "aws_iam_policy" "policy" { name = "test-policy" description = "A test policy" policy = <<EOF { "Version": "2012-10-17", "Statement": [ { "Action": [ "ec2:Describe*" ], "Effect": "Allow", "Resource": "*" } ] } EOF } resource "aws_iam_role_policy_attachment" "test-attach" { role = "${aws_iam_role.role.name}" policy_arn = "${aws_iam_policy.policy.arn}" }
Argument Reference
The following arguments are supported:
-
role
(Required) - The role the policy should be applied to -
policy_arn
(Required) - The ARN of the policy you want to apply
© 2018 HashiCorpLicensed under the MPL 2.0 License.
https://www.terraform.io/docs/providers/aws/r/iam_role_policy_attachment.html