@@ -328,13 +328,13 @@ module "cache" {
328
328
# ## Trust policy
329
329
# ###############################################################################
330
330
resource "aws_iam_instance_profile" "instance" {
331
- name = " ${ var . environment } -instance-profile "
331
+ name = " ${ local . name_iam_objects } -instance"
332
332
role = aws_iam_role. instance . name
333
333
tags = local. tags
334
334
}
335
335
336
336
resource "aws_iam_role" "instance" {
337
- name = " ${ var . environment } -instance-role "
337
+ name = " ${ local . name_iam_objects } -instance"
338
338
assume_role_policy = length (var. instance_role_json ) > 0 ? var. instance_role_json : templatefile (" ${ path . module } /policies/instance-role-trust-policy.json" , {})
339
339
permissions_boundary = var. permissions_boundary == " " ? null : " ${ var . arn_format } :iam::${ data . aws_caller_identity . current . account_id } :policy/${ var . permissions_boundary } "
340
340
tags = merge (local. tags , var. role_tags )
@@ -344,7 +344,7 @@ resource "aws_iam_role" "instance" {
344
344
# ## Policies for runner agent instance to create docker machines via spot req.
345
345
# ###############################################################################
346
346
resource "aws_iam_policy" "instance_docker_machine_policy" {
347
- name = " ${ var . environment } -docker-machine"
347
+ name = " ${ local . name_iam_objects } -docker-machine"
348
348
path = " /"
349
349
description = " Policy for docker machine."
350
350
policy = templatefile (" ${ path . module } /policies/instance-docker-machine-policy.json" , {})
@@ -362,7 +362,7 @@ resource "aws_iam_role_policy_attachment" "instance_docker_machine_policy" {
362
362
resource "aws_iam_policy" "instance_session_manager_policy" {
363
363
count = var. enable_runner_ssm_access ? 1 : 0
364
364
365
- name = " ${ var . environment } -session-manager"
365
+ name = " ${ local . name_iam_objects } -session-manager"
366
366
path = " /"
367
367
description = " Policy session manager."
368
368
policy = templatefile (" ${ path . module } /policies/instance-session-manager-policy.json" , {})
@@ -405,14 +405,14 @@ resource "aws_iam_role_policy_attachment" "docker_machine_cache_instance" {
405
405
# ## docker machine instance policy
406
406
# ###############################################################################
407
407
resource "aws_iam_role" "docker_machine" {
408
- name = " ${ var . environment } -docker-machine-role "
408
+ name = " ${ local . name_iam_objects } -docker-machine"
409
409
assume_role_policy = length (var. docker_machine_role_json ) > 0 ? var. docker_machine_role_json : templatefile (" ${ path . module } /policies/instance-role-trust-policy.json" , {})
410
410
permissions_boundary = var. permissions_boundary == " " ? null : " ${ var . arn_format } :iam::${ data . aws_caller_identity . current . account_id } :policy/${ var . permissions_boundary } "
411
411
tags = local. tags
412
412
}
413
413
414
414
resource "aws_iam_instance_profile" "docker_machine" {
415
- name = " ${ var . environment } -docker-machine-profile "
415
+ name = " ${ local . name_iam_objects } -docker-machine"
416
416
role = aws_iam_role. docker_machine . name
417
417
tags = local. tags
418
418
}
@@ -440,7 +440,7 @@ resource "aws_iam_role_policy_attachment" "docker_machine_session_manager_aws_ma
440
440
resource "aws_iam_policy" "service_linked_role" {
441
441
count = var. allow_iam_service_linked_role_creation ? 1 : 0
442
442
443
- name = " ${ var . environment } -service_linked_role"
443
+ name = " ${ local . name_iam_objects } -service_linked_role"
444
444
path = " /"
445
445
description = " Policy for creation of service linked roles."
446
446
policy = templatefile (" ${ path . module } /policies/service-linked-role-create-policy.json" , { arn_format = var.arn_format })
@@ -464,7 +464,7 @@ resource "aws_eip" "gitlab_runner" {
464
464
resource "aws_iam_policy" "ssm" {
465
465
count = var. enable_manage_gitlab_token ? 1 : 0
466
466
467
- name = " ${ var . environment } -ssm"
467
+ name = " ${ local . name_iam_objects } -ssm"
468
468
path = " /"
469
469
description = " Policy for runner token param access via SSM"
470
470
policy = templatefile (" ${ path . module } /policies/instance-secure-parameter-role-policy.json" , { arn_format = var.arn_format })
0 commit comments