Skip to content
Snippets Groups Projects

Update to use an Amazon Linux 2 image - WISCALERTS-2

Merged Nuwan Rajika Kumarasiri requested to merge ebs2 into master
All threads resolved!
Files
4
+ 55
5
locals {
informatica_username = format("arn:aws:ssm:%s:%s:parameter/%s", var.aws_region, var.aws_account_id[0], "/iics/cicd_username")
informatica_password = format("arn:aws:ssm:%s:%s:parameter/%s", var.aws_region, var.aws_account_id[0], "/iics/cicd_password")
informatica_username = format("arn:aws:ssm:%s:%s:parameter%s", var.aws_region, var.aws_account_id[0], "/iics/cicd_username")
informatica_password = format("arn:aws:ssm:%s:%s:parameter%s", var.aws_region, var.aws_account_id[0], "/iics/cicd_password")
}
data "template_file" "container" {
@@ -19,13 +19,63 @@ data "template_file" "container" {
}
}
data "aws_iam_role" "ecs-task-execution" {
name = "ecsTaskExecutionRole"
resource "aws_iam_role" "ecs-task-execution" {
name = var.ecs_execution_role
assume_role_policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Action": "sts:AssumeRole",
"Principal": {
"Service": "ecs.amazonaws.com"
},
"Effect":"Allow"
}
]
}
EOF
tags = {
Name = "iics-ecs-execution-role"
}
}
# grant role permission for ECS task execution
resource "aws_iam_role_policy_attachment" "ecs-task-execution" {
role = aws_iam_role.ecs-task-execution.name
policy_arn = "arn:aws:iam::aws:policy/service-role/AmazonECSTaskExecutionRolePolicy"
}
# grant access for SSM for credentails look up
resource "aws_iam_policy" "iics-ssm-policy" {
name = var.iics_secret_access_policy
policy = <<EOF
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"ssm:GetParameters"
],
"Resource": [
"${local.informatica_username}",
"${local.informatica_password}"
]
}
]
}
EOF
}
resource "aws_iam_role_policy_attachment" "credentails" {
role = aws_iam_role.ecs-task-execution.name
policy_arn = aws_iam_policy.iics-ssm-policy.arn
}
resource "aws_ecs_task_definition" "task" {
family = var.ecs_task_name
execution_role_arn = data.aws_iam_role.ecs-task-execution.arn
execution_role_arn = aws_iam_role.ecs-task-execution.arn
network_mode = var.container_network_mode
requires_compatibilities = [
"EC2"]
Loading