@@ -399,14 +399,14 @@ resource "aws_iam_policy" "instance_session_manager_policy" {
399
399
resource "aws_iam_role_policy_attachment" "instance_session_manager_policy" {
400
400
count = var. enable_runner_ssm_access ? 1 : 0
401
401
402
- role = local. aws_iam_role_instance_name
402
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
403
403
policy_arn = aws_iam_policy. instance_session_manager_policy [0 ]. arn
404
404
}
405
405
406
406
resource "aws_iam_role_policy_attachment" "instance_session_manager_aws_managed" {
407
407
count = var. enable_runner_ssm_access ? 1 : 0
408
408
409
- role = local. aws_iam_role_instance_name
409
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
410
410
policy_arn = " arn:${ data . aws_partition . current . partition } :iam::aws:policy/AmazonSSMManagedInstanceCore"
411
411
}
412
412
@@ -416,7 +416,7 @@ resource "aws_iam_role_policy_attachment" "instance_session_manager_aws_managed"
416
416
resource "aws_iam_role_policy_attachment" "user_defined_policies" {
417
417
count = length (var. runner_iam_policy_arns )
418
418
419
- role = local. aws_iam_role_instance_name
419
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
420
420
policy_arn = var. runner_iam_policy_arns [count . index ]
421
421
}
422
422
@@ -429,7 +429,7 @@ resource "aws_iam_role_policy_attachment" "docker_machine_cache_instance" {
429
429
use aws_iam_role.docker_machine.name here! See https://docs.gitlab.com/runner/configuration/advanced-configuration.html */
430
430
count = var. runners_executor == " docker+machine" ? (var. cache_bucket [" create" ] || lookup (var. cache_bucket , " policy" , " " ) != " " ? 1 : 0 ) : 0
431
431
432
- role = local. aws_iam_role_instance_name
432
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
433
433
policy_arn = local. bucket_policy
434
434
}
435
435
@@ -485,7 +485,7 @@ resource "aws_iam_policy" "service_linked_role" {
485
485
resource "aws_iam_role_policy_attachment" "service_linked_role" {
486
486
count = var. allow_iam_service_linked_role_creation ? 1 : 0
487
487
488
- role = local. aws_iam_role_instance_name
488
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
489
489
policy_arn = aws_iam_policy. service_linked_role [0 ]. arn
490
490
}
491
491
@@ -509,7 +509,7 @@ resource "aws_iam_policy" "ssm" {
509
509
resource "aws_iam_role_policy_attachment" "ssm" {
510
510
count = var. enable_manage_gitlab_token ? 1 : 0
511
511
512
- role = local. aws_iam_role_instance_name
512
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
513
513
policy_arn = aws_iam_policy. ssm [0 ]. arn
514
514
}
515
515
@@ -529,7 +529,7 @@ resource "aws_iam_policy" "eip" {
529
529
resource "aws_iam_role_policy_attachment" "eip" {
530
530
count = var. enable_eip ? 1 : 0
531
531
532
- role = local. aws_iam_role_instance_name
532
+ role = var . create_runner_iam_role ? aws_iam_role . instance [ 0 ] . name : local. aws_iam_role_instance_name
533
533
policy_arn = aws_iam_policy. eip [0 ]. arn
534
534
}
535
535
0 commit comments