UPD: minor touchup
This commit is contained in:
parent
4865fdcba7
commit
3ddc62ab64
@ -1,6 +1,6 @@
|
|||||||
aws-region = "ap-northeast-1"
|
aws-region = "ap-northeast-1"
|
||||||
aws-region-short = "apne1"
|
aws-region-short = "apne1"
|
||||||
customer-name = "kf"
|
customer-name = "racken"
|
||||||
environment = "lab"
|
environment = "lab"
|
||||||
project = "lime"
|
project = "cleanslate"
|
||||||
application = "infra"
|
application = "infra"
|
@ -1,6 +1,6 @@
|
|||||||
aws-region = "ap-northeast-1"
|
aws-region = "ap-northeast-1"
|
||||||
aws-region-short = "apne1"
|
aws-region-short = "apne1"
|
||||||
customer-name = "kf"
|
customer-name = "racken"
|
||||||
environment = "lab"
|
environment = "lab"
|
||||||
project = "lime"
|
project = "cleanslate"
|
||||||
application = "infra"
|
application = "infra"
|
@ -25,7 +25,7 @@ data aws_iam_policy_document assume-role-policy {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role administrator-role {
|
resource aws_iam_role administrator-role {
|
||||||
name = "${var.environment}-awsadmin"
|
name = "${var.customer-name}-awsadmin"
|
||||||
description = "Provides full access to AWS services and resources."
|
description = "Provides full access to AWS services and resources."
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -39,7 +39,7 @@ resource "aws_iam_role_policy_attachment" "administrator-role-policy-attach" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role billing-role {
|
resource aws_iam_role billing-role {
|
||||||
name = "${var.environment}-billing"
|
name = "${var.customer-name}-billing"
|
||||||
description = "Grants permissions for billing and cost management."
|
description = "Grants permissions for billing and cost management."
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -53,7 +53,7 @@ resource "aws_iam_role_policy_attachment" "billing-role-policy-attach" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role dba-role {
|
resource aws_iam_role dba-role {
|
||||||
name = "${var.environment}-dba"
|
name = "${var.customer-name}-dba"
|
||||||
description = "AWS database admin role"
|
description = "AWS database admin role"
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -67,7 +67,7 @@ resource "aws_iam_role_policy_attachment" "dba-role-policy-attach" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role network-admin-role {
|
resource aws_iam_role network-admin-role {
|
||||||
name = "${var.environment}-networkadmin"
|
name = "${var.customer-name}-networkadmin"
|
||||||
description = "AWS network admin role"
|
description = "AWS network admin role"
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -81,7 +81,7 @@ resource "aws_iam_role_policy_attachment" "network-admin-role-policy-attach" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role developer-role {
|
resource aws_iam_role developer-role {
|
||||||
name = "${var.environment}-developer"
|
name = "${var.customer-name}-developer"
|
||||||
description = "Provides full access to AWS resources excluding IAM."
|
description = "Provides full access to AWS resources excluding IAM."
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -95,7 +95,7 @@ resource "aws_iam_role_policy_attachment" "developer-role-policy-attach1" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role securityaudit-role {
|
resource aws_iam_role securityaudit-role {
|
||||||
name = "${var.environment}-securityaudit"
|
name = "${var.customer-name}-securityaudit"
|
||||||
description = "Role to read security configuration metadata."
|
description = "Role to read security configuration metadata."
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
@ -109,7 +109,7 @@ resource "aws_iam_role_policy_attachment" "securityaudit-role-policy-attach1" {
|
|||||||
}
|
}
|
||||||
|
|
||||||
resource aws_iam_role support-role {
|
resource aws_iam_role support-role {
|
||||||
name = "${var.environment}-support"
|
name = "${var.customer-name}-support"
|
||||||
description = "Role to troubleshoot and resolve issues in AWS."
|
description = "Role to troubleshoot and resolve issues in AWS."
|
||||||
tags = var.default-tags
|
tags = var.default-tags
|
||||||
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
|
||||||
|
Loading…
Reference in New Issue
Block a user