Skip to content

Commit a6ef70e

Browse files
authored
feat: pass tags to permission sets
1 parent ff345bc commit a6ef70e

8 files changed

+8
-8
lines changed

src/policy-AdminstratorAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ locals {
44
description = "Allow Full Administrator access to the account",
55
relay_state = "",
66
session_duration = var.session_duration,
7-
tags = {},
7+
tags = module.this.tags,
88
inline_policy = ""
99
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/AdministratorAccess"]
1010
customer_managed_policy_attachments = []

src/policy-BillingAdministratorAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ locals {
44
description = "Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods.",
55
relay_state = "https://console.aws.amazon.com/billing/",
66
session_duration = var.session_duration,
7-
tags = {},
7+
tags = module.this.tags,
88
inline_policy = ""
99
policy_attachments = [
1010
"arn:${local.aws_partition}:iam::aws:policy/job-function/Billing",

src/policy-BillingReadOnlyAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ locals {
44
description = "Allow users to view bills in the billing console",
55
relay_state = "",
66
session_duration = var.session_duration,
7-
tags = {},
7+
tags = module.this.tags,
88
inline_policy = ""
99
policy_attachments = [
1010
"arn:${local.aws_partition}:iam::aws:policy/AWSBillingReadOnlyAccess",

src/policy-DNSAdministratorAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -31,7 +31,7 @@ locals {
3131
description = "Allow DNS Record Administrator access to the account, but not zone administration",
3232
relay_state = "https://console.aws.amazon.com/route53/",
3333
session_duration = var.session_duration,
34-
tags = {},
34+
tags = module.this.tags,
3535
inline_policy = data.aws_iam_policy_document.dns_administrator_access.json,
3636
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/AWSSupportAccess"]
3737
customer_managed_policy_attachments = []

src/policy-Identity-role-TeamAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ locals {
5454
description = format("Allow user to assume the %s Team role in the Identity account, which allows access to other accounts", replace(title(role), "-", ""))
5555
relay_state = "",
5656
session_duration = var.session_duration,
57-
tags = {},
57+
tags = module.this.tags,
5858
inline_policy = data.aws_iam_policy_document.assume_aws_team[role].json
5959
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/job-function/ViewOnlyAccess"]
6060
customer_managed_policy_attachments = []

src/policy-PoweruserAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ locals {
44
description = "Allow Poweruser access to the account",
55
relay_state = "",
66
session_duration = var.session_duration,
7-
tags = {},
7+
tags = module.this.tags,
88
inline_policy = ""
99
policy_attachments = [
1010
"arn:${local.aws_partition}:iam::aws:policy/PowerUserAccess",

src/policy-ReadOnlyAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@ locals {
44
description = "Allow Read Only access to the account",
55
relay_state = "",
66
session_duration = var.session_duration,
7-
tags = {},
7+
tags = module.this.tags,
88
inline_policy = data.aws_iam_policy_document.eks_read_only.json,
99
policy_attachments = [
1010
"arn:${local.aws_partition}:iam::aws:policy/ReadOnlyAccess",

src/policy-TerraformUpdateAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ locals {
5353
description = "Allow access to Terraform state sufficient to make changes",
5454
relay_state = "",
5555
session_duration = var.session_duration,
56-
tags = {},
56+
tags = module.this.tags,
5757
inline_policy = one(data.aws_iam_policy_document.terraform_update_access[*].json),
5858
policy_attachments = []
5959
customer_managed_policy_attachments = []

0 commit comments

Comments
 (0)