Skip to content
Projects
Groups
Snippets
Help
Loading...
Help
Submit feedback
Contribute to GitLab
Sign in
Toggle navigation
E
eks-alb-ingress
Project
Project
Details
Activity
Releases
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
terraform-eks
eks-alb-ingress
Commits
c4e967e0
Commit
c4e967e0
authored
Feb 28, 2019
by
Danny
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
commit for working terraform modules
parent
c67b5293
Changes
1
Hide whitespace changes
Inline
Side-by-side
Showing
1 changed file
with
68 additions
and
1 deletion
+68
-1
iam.tf
iam.tf
+68
-1
No files found.
iam.tf
View file @
c4e967e0
...
@@ -22,7 +22,6 @@ data "aws_iam_policy_document" "ec2_assume" {
...
@@ -22,7 +22,6 @@ data "aws_iam_policy_document" "ec2_assume" {
}
}
}
}
# TODO: Convert JSON into datasource
data
"aws_iam_policy_document"
"ingress"
{
data
"aws_iam_policy_document"
"ingress"
{
statement
{
statement
{
actions
=
[
actions
=
[
...
@@ -32,29 +31,84 @@ data "aws_iam_policy_document" "ingress" {
...
@@ -32,29 +31,84 @@ data "aws_iam_policy_document" "ingress" {
]
]
resources
=
[
"*"
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
actions
=
[
"ec2:AuthorizeSecurityGroupIngress"
,
"ec2:AuthorizeSecurityGroupIngress"
,
"ec2:CreateSecurityGroup"
,
"ec2:CreateSecurityGroup"
,
"ec2:CreateTags"
,
"ec2:CreateTags"
,
"ec2:DeleteTags"
,
"ec2:DeleteSecurityGroup"
,
"ec2:DeleteSecurityGroup"
,
"ec2:DescribeAccountAttributes"
,
"ec2:DescribeAddresses"
,
"ec2:DescribeInstances"
,
"ec2:DescribeInstances"
,
"ec2:DescribeInstanceStatus"
,
"ec2:DescribeInstanceStatus"
,
"ec2:DescribeInternetGateways"
,
"ec2:DescribeNetworkInterfaces"
,
"ec2:DescribeSecurityGroups"
,
"ec2:DescribeSecurityGroups"
,
"ec2:DescribeSubnets"
,
"ec2:DescribeSubnets"
,
"ec2:DescribeTags"
,
"ec2:DescribeTags"
,
"ec2:DescribeVpcs"
,
"ec2:DescribeVpcs"
,
"ec2:ModifyInstanceAttribute"
,
"ec2:ModifyInstanceAttribute"
,
"ec2:ModifyNetworkInterfaceAttribute"
,
"ec2:RevokeSecurityGroupIngress"
,
"ec2:RevokeSecurityGroupIngress"
,
]
]
resources
=
[
"*"
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
actions
=
[
"elasticloadbalancing:AddListenerCertificates"
,
"elasticloadbalancing:AddTags"
,
"elasticloadbalancing:CreateListener"
,
"elasticloadbalancing:CreateLoadBalancer"
,
"elasticloadbalancing:CreateRule"
,
"elasticloadbalancing:CreateTargetGroup"
,
"elasticloadbalancing:DeleteListener"
,
"elasticloadbalancing:DeleteLoadBalancer"
,
"elasticloadbalancing:DeleteRule"
,
"elasticloadbalancing:DeleteTargetGroup"
,
"elasticloadbalancing:DeregisterTargets"
,
"elasticloadbalancing:DescribeListenerCertificates"
,
"elasticloadbalancing:DescribeListeners"
,
"elasticloadbalancing:DescribeLoadBalancers"
,
"elasticloadbalancing:DescribeLoadBalancerAttributes"
,
"elasticloadbalancing:DescribeRules"
,
"elasticloadbalancing:DescribeSSLPolicies"
,
"elasticloadbalancing:DescribeTags"
,
"elasticloadbalancing:DescribeTargetGroups"
,
"elasticloadbalancing:DescribeTargetGroupAttributes"
,
"elasticloadbalancing:DescribeTargetHealth"
,
"elasticloadbalancing:ModifyListener"
,
"elasticloadbalancing:ModifyLoadBalancerAttributes"
,
"elasticloadbalancing:ModifyRule"
,
"elasticloadbalancing:ModifyTargetGroup"
,
"elasticloadbalancing:ModifyTargetGroupAttributes"
,
"elasticloadbalancing:RegisterTargets"
,
"elasticloadbalancing:RemoveListenerCertificates"
,
"elasticloadbalancing:RemoveTags"
,
"elasticloadbalancing:SetIpAddressType"
,
"elasticloadbalancing:SetSecurityGroups"
,
"elasticloadbalancing:SetSubnets"
,
"elasticloadbalancing:SetWebACL"
,
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
"iam:CreateServiceLinkedRole"
,
"iam:GetServerCertificate"
,
"iam:GetServerCertificate"
,
"iam:ListServerCertificates"
,
"iam:ListServerCertificates"
,
]
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
actions
=
[
"waf-regional:GetWebACLForResource"
,
"waf-regional:GetWebACLForResource"
,
"waf-regional:GetWebACL"
,
"waf-regional:GetWebACL"
,
...
@@ -62,6 +116,19 @@ data "aws_iam_policy_document" "ingress" {
...
@@ -62,6 +116,19 @@ data "aws_iam_policy_document" "ingress" {
"waf-regional:DisassociateWebACL"
,
"waf-regional:DisassociateWebACL"
,
]
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
"tag:GetResources"
,
"tag:TagResources"
,
]
resources
=
[
"*"
]
}
statement
{
actions
=
[
actions
=
[
"waf:GetWebACL"
,
"waf:GetWebACL"
,
]
]
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment