Use a newly created system account instead of my personal one

This restricts attack surface, and work better in term of automation.
This commit is contained in:
Néstor Salceda 2018-11-09 19:23:54 +01:00
parent e15ee1d28d
commit c24fa324d2
2 changed files with 5 additions and 4 deletions

View File

@ -1,3 +1,7 @@
resource "aws_iam_user" "kubernetes-response-engine-user" {
name = "kubernetes_response_engine"
}
resource "aws_iam_role" "iam-for-lambda" {
name = "iam_for_lambda"
@ -9,7 +13,7 @@ resource "aws_iam_role" "iam-for-lambda" {
"Action": "sts:AssumeRole",
"Principal": {
"Service": "lambda.amazonaws.com",
"AWS": "${var.iam-user-arn}"
"AWS": "${aws_iam_user.kubernetes-response-engine-user.arn}"
},
"Effect": "Allow",
"Sid": ""

View File

@ -1,3 +0,0 @@
variable "iam-user-arn" {
type = "string"
}