Terraform:创建IAM角色时出错.MalformedPolicyDocument:已禁止字段资源

Sno*_*ash 11 amazon-web-services amazon-iam terraform

我的TF代码给了我一个错误:

  /*
   * Policy: AmazonEC2ReadOnlyAccess
   */
  assume_role_policy = <<EOF
{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "ec2:Describe*",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "elasticloadbalancing:Describe*",
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": [
                "cloudwatch:ListMetrics",
                "cloudwatch:GetMetricStatistics",
                "cloudwatch:Describe*"
            ],
            "Resource": "*"
        },
        {
            "Effect": "Allow",
            "Action": "autoscaling:Describe*",
            "Resource": "*"
        }
    ]
}
EOF
Run Code Online (Sandbox Code Playgroud)

我从https://console.aws.amazon.com/iam/home?region=us-west-2#/policies/arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess $ jsonEditor 复制并粘贴了该政策.

* aws_iam_role.<role name>: Error creating IAM Role <role name>: MalformedPolicyDocument: Has prohibited field Resource
status code: 400, request id: <request id>
Run Code Online (Sandbox Code Playgroud)

不知道为什么说资源被禁止.

Gan*_*aju 11

你需要提一下sts:AssumeRole.您可以使用直接附加策略aws_iam_role_policy_attachment而不是复制现有策略.

resource "aws_iam_role" "ec2_iam_role" {
  name = "ec2_iam_role"
  assume_role_policy = <<EOF
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Sid": "",
      "Effect": "Allow",
      "Principal": {
        "Service": [
          "ec2.amazonaws.com"
        ]
      },
      "Action": "sts:AssumeRole"
    }
  ]
}
EOF
}

resource "aws_iam_role_policy_attachment" "ec2-read-only-policy-attachment" {
    role = "${aws_iam_role.ec2_iam_role.name}"
    policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess"
}
Run Code Online (Sandbox Code Playgroud)

  • 如果您想在资源级别和服务级别添加额外权限怎么办?即除了服务之外的另一个 IAM 角色的 ARN。或者您是否需要在那时创建单独的角色? (2认同)
  • 您可以向同一个代入角色策略添加更多具有 IAM 角色而不是服务的语句,或者您也可以创建另一个角色。您尝试在 https://awspolicygen.s3.amazonaws.com/policygen.html、https://policysim.aws.amazon.com 上生成和模拟您的策略 (2认同)