Commit fa393efa by e0d

Merge pull request #82 from edx/feature/e0d/iam-association

adding iam role association to launch configurations
parents 5534cbca 660c306e
......@@ -1882,6 +1882,78 @@
]
}
},
"EdxappRole": {
"Type": "AWS::IAM::Role",
"Properties": {
"AssumeRolePolicyDocument": {
"Statement": [ {
"Effect": "Allow",
"Principal": {
"Service": [ "ec2.amazonaws.com" ]
},
"Action": [ "sts:AssumeRole" ]
} ]
},
"Path": "/"
}
},
"EdxappInstanceProfile": {
"Type": "AWS::IAM::InstanceProfile",
"Properties": {
"Path": "/",
"Roles": [ {
"Ref": "EdxappRole"
} ]
}
},
"XqueueRole": {
"Type": "AWS::IAM::Role",
"Properties": {
"AssumeRolePolicyDocument": {
"Statement": [ {
"Effect": "Allow",
"Principal": {
"Service": [ "ec2.amazonaws.com" ]
},
"Action": [ "sts:AssumeRole" ]
} ]
},
"Path": "/"
}
},
"XqueueInstanceProfile": {
"Type": "AWS::IAM::InstanceProfile",
"Properties": {
"Path": "/",
"Roles": [ {
"Ref": "XqueueRole"
} ]
}
},
"XServerRole": {
"Type": "AWS::IAM::Role",
"Properties": {
"AssumeRolePolicyDocument": {
"Statement": [ {
"Effect": "Allow",
"Principal": {
"Service": [ "ec2.amazonaws.com" ]
},
"Action": [ "sts:AssumeRole" ]
} ]
},
"Path": "/"
}
},
"XServerInstanceProfile": {
"Type": "AWS::IAM::InstanceProfile",
"Properties": {
"Path": "/",
"Roles": [ {
"Ref": "XServerRole"
} ]
}
},
"EdxServerUser":{
"Type":"AWS::IAM::User",
"Properties":{
......@@ -1970,6 +2042,7 @@
}
},
"Properties":{
"IamInstanceProfile":{ "Ref":"EdxappInstanceProfile" },
"SecurityGroups":[
{
"Ref":"EdxappServerSecurityGroup"
......@@ -2368,6 +2441,7 @@
}
},
"Properties":{
"IamInstanceProfile":{ "Ref":"XqueueInstanceProfile" },
"SecurityGroups":[
{
"Ref":"XqueueServerSecurityGroup"
......@@ -3165,6 +3239,7 @@
}
},
"Properties":{
"IamInstanceProfile":{ "Ref":"XServerInstanceProfile" },
"SecurityGroups":[
{
"Ref":"XServerSecurityGroup"
......
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment