Skip to content

Commit c81f221

Browse files
authored
feat: Add role_tags to support tag based authorization (cattle-ops#333) (cattle-ops#335)
Co-authored-by: kayma <[email protected]>
1 parent b3ab3f6 commit c81f221

File tree

2 files changed

+7
-1
lines changed

2 files changed

+7
-1
lines changed

main.tf

+1-1
Original file line numberDiff line numberDiff line change
@@ -269,7 +269,7 @@ resource "aws_iam_role" "instance" {
269269
name = "${var.environment}-instance-role"
270270
assume_role_policy = length(var.instance_role_json) > 0 ? var.instance_role_json : templatefile("${path.module}/policies/instance-role-trust-policy.json", {})
271271
permissions_boundary = var.permissions_boundary == "" ? null : "${var.arn_format}:iam::${data.aws_caller_identity.current.account_id}:policy/${var.permissions_boundary}"
272-
tags = local.tags
272+
tags = merge(local.tags, var.role_tags)
273273
}
274274

275275
################################################################################

variables.tf

+6
Original file line numberDiff line numberDiff line change
@@ -448,6 +448,12 @@ variable "runner_tags" {
448448
default = {}
449449
}
450450

451+
variable "role_tags" {
452+
description = "Map of tags that will be added to the role created. Useful for tag based authorization."
453+
type = map(string)
454+
default = {}
455+
}
456+
451457
variable "allow_iam_service_linked_role_creation" {
452458
description = "Boolean used to control attaching the policy to a runner instance to create service linked roles."
453459
type = bool

0 commit comments

Comments
 (0)