From 3ddc62ab643958c23e1700abdad9f802165ad803 Mon Sep 17 00:00:00 2001 From: xpk Date: Wed, 27 Jan 2021 16:36:28 +0800 Subject: [PATCH] UPD: minor touchup --- .../cloudtrail_cloudwatchlogs/terraform.tfvars | 4 ++-- .../iam_roles/terraform.tfvars | 4 ++-- .../roles_iam_resources/main.tf | 14 +++++++------- 3 files changed, 11 insertions(+), 11 deletions(-) diff --git a/layers/security_identity_compliance/cloudtrail_cloudwatchlogs/terraform.tfvars b/layers/security_identity_compliance/cloudtrail_cloudwatchlogs/terraform.tfvars index 4335dc9..9f12b0d 100644 --- a/layers/security_identity_compliance/cloudtrail_cloudwatchlogs/terraform.tfvars +++ b/layers/security_identity_compliance/cloudtrail_cloudwatchlogs/terraform.tfvars @@ -1,6 +1,6 @@ aws-region = "ap-northeast-1" aws-region-short = "apne1" -customer-name = "kf" +customer-name = "racken" environment = "lab" -project = "lime" +project = "cleanslate" application = "infra" \ No newline at end of file diff --git a/layers/security_identity_compliance/iam_roles/terraform.tfvars b/layers/security_identity_compliance/iam_roles/terraform.tfvars index 4335dc9..9f12b0d 100644 --- a/layers/security_identity_compliance/iam_roles/terraform.tfvars +++ b/layers/security_identity_compliance/iam_roles/terraform.tfvars @@ -1,6 +1,6 @@ aws-region = "ap-northeast-1" aws-region-short = "apne1" -customer-name = "kf" +customer-name = "racken" environment = "lab" -project = "lime" +project = "cleanslate" application = "infra" \ No newline at end of file diff --git a/modules/security_identity_compliance/roles_iam_resources/main.tf b/modules/security_identity_compliance/roles_iam_resources/main.tf index aee779d..d4e8d04 100644 --- a/modules/security_identity_compliance/roles_iam_resources/main.tf +++ b/modules/security_identity_compliance/roles_iam_resources/main.tf @@ -25,7 +25,7 @@ data aws_iam_policy_document assume-role-policy { } resource aws_iam_role administrator-role { - name = "${var.environment}-awsadmin" + name = "${var.customer-name}-awsadmin" description = "Provides full access to AWS services and resources." tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -39,7 +39,7 @@ resource "aws_iam_role_policy_attachment" "administrator-role-policy-attach" { } resource aws_iam_role billing-role { - name = "${var.environment}-billing" + name = "${var.customer-name}-billing" description = "Grants permissions for billing and cost management." tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -53,7 +53,7 @@ resource "aws_iam_role_policy_attachment" "billing-role-policy-attach" { } resource aws_iam_role dba-role { - name = "${var.environment}-dba" + name = "${var.customer-name}-dba" description = "AWS database admin role" tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -67,7 +67,7 @@ resource "aws_iam_role_policy_attachment" "dba-role-policy-attach" { } resource aws_iam_role network-admin-role { - name = "${var.environment}-networkadmin" + name = "${var.customer-name}-networkadmin" description = "AWS network admin role" tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -81,7 +81,7 @@ resource "aws_iam_role_policy_attachment" "network-admin-role-policy-attach" { } resource aws_iam_role developer-role { - name = "${var.environment}-developer" + name = "${var.customer-name}-developer" description = "Provides full access to AWS resources excluding IAM." tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -95,7 +95,7 @@ resource "aws_iam_role_policy_attachment" "developer-role-policy-attach1" { } resource aws_iam_role securityaudit-role { - name = "${var.environment}-securityaudit" + name = "${var.customer-name}-securityaudit" description = "Role to read security configuration metadata." tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json @@ -109,7 +109,7 @@ resource "aws_iam_role_policy_attachment" "securityaudit-role-policy-attach1" { } resource aws_iam_role support-role { - name = "${var.environment}-support" + name = "${var.customer-name}-support" description = "Role to troubleshoot and resolve issues in AWS." tags = var.default-tags assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json