UPD: minor touchup

This commit is contained in:
xpk 2021-01-27 16:36:28 +08:00
parent 4865fdcba7
commit 3ddc62ab64
Signed by: xpk
GPG Key ID: CD4FF6793F09AB86
3 changed files with 11 additions and 11 deletions

View File

@ -1,6 +1,6 @@
aws-region = "ap-northeast-1" aws-region = "ap-northeast-1"
aws-region-short = "apne1" aws-region-short = "apne1"
customer-name = "kf" customer-name = "racken"
environment = "lab" environment = "lab"
project = "lime" project = "cleanslate"
application = "infra" application = "infra"

View File

@ -1,6 +1,6 @@
aws-region = "ap-northeast-1" aws-region = "ap-northeast-1"
aws-region-short = "apne1" aws-region-short = "apne1"
customer-name = "kf" customer-name = "racken"
environment = "lab" environment = "lab"
project = "lime" project = "cleanslate"
application = "infra" application = "infra"

View File

@ -25,7 +25,7 @@ data aws_iam_policy_document assume-role-policy {
} }
resource aws_iam_role administrator-role { resource aws_iam_role administrator-role {
name = "${var.environment}-awsadmin" name = "${var.customer-name}-awsadmin"
description = "Provides full access to AWS services and resources." description = "Provides full access to AWS services and resources."
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -39,7 +39,7 @@ resource "aws_iam_role_policy_attachment" "administrator-role-policy-attach" {
} }
resource aws_iam_role billing-role { resource aws_iam_role billing-role {
name = "${var.environment}-billing" name = "${var.customer-name}-billing"
description = "Grants permissions for billing and cost management." description = "Grants permissions for billing and cost management."
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -53,7 +53,7 @@ resource "aws_iam_role_policy_attachment" "billing-role-policy-attach" {
} }
resource aws_iam_role dba-role { resource aws_iam_role dba-role {
name = "${var.environment}-dba" name = "${var.customer-name}-dba"
description = "AWS database admin role" description = "AWS database admin role"
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -67,7 +67,7 @@ resource "aws_iam_role_policy_attachment" "dba-role-policy-attach" {
} }
resource aws_iam_role network-admin-role { resource aws_iam_role network-admin-role {
name = "${var.environment}-networkadmin" name = "${var.customer-name}-networkadmin"
description = "AWS network admin role" description = "AWS network admin role"
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -81,7 +81,7 @@ resource "aws_iam_role_policy_attachment" "network-admin-role-policy-attach" {
} }
resource aws_iam_role developer-role { resource aws_iam_role developer-role {
name = "${var.environment}-developer" name = "${var.customer-name}-developer"
description = "Provides full access to AWS resources excluding IAM." description = "Provides full access to AWS resources excluding IAM."
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -95,7 +95,7 @@ resource "aws_iam_role_policy_attachment" "developer-role-policy-attach1" {
} }
resource aws_iam_role securityaudit-role { resource aws_iam_role securityaudit-role {
name = "${var.environment}-securityaudit" name = "${var.customer-name}-securityaudit"
description = "Role to read security configuration metadata." description = "Role to read security configuration metadata."
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json
@ -109,7 +109,7 @@ resource "aws_iam_role_policy_attachment" "securityaudit-role-policy-attach1" {
} }
resource aws_iam_role support-role { resource aws_iam_role support-role {
name = "${var.environment}-support" name = "${var.customer-name}-support"
description = "Role to troubleshoot and resolve issues in AWS." description = "Role to troubleshoot and resolve issues in AWS."
tags = var.default-tags tags = var.default-tags
assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json assume_role_policy = data.aws_iam_policy_document.assume-role-policy.json