Skip to content

Commit ff345bc

Browse files
authored
fix session duration variable (#49)
1 parent a169120 commit ff345bc

File tree

5 files changed

+5
-5
lines changed

5 files changed

+5
-5
lines changed

src/policy-BillingAdministratorAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ locals {
33
name = "BillingAdministratorAccess",
44
description = "Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods.",
55
relay_state = "https://console.aws.amazon.com/billing/",
6-
session_duration = "",
6+
session_duration = var.session_duration,
77
tags = {},
88
inline_policy = ""
99
policy_attachments = [

src/policy-BillingReadOnlyAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ locals {
33
name = "BillingReadOnlyAccess",
44
description = "Allow users to view bills in the billing console",
55
relay_state = "",
6-
session_duration = "",
6+
session_duration = var.session_duration,
77
tags = {},
88
inline_policy = ""
99
policy_attachments = [

src/policy-DNSAdministratorAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -30,7 +30,7 @@ locals {
3030
name = "DNSRecordAdministratorAccess",
3131
description = "Allow DNS Record Administrator access to the account, but not zone administration",
3232
relay_state = "https://console.aws.amazon.com/route53/",
33-
session_duration = "",
33+
session_duration = var.session_duration,
3434
tags = {},
3535
inline_policy = data.aws_iam_policy_document.dns_administrator_access.json,
3636
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/AWSSupportAccess"]

src/policy-Identity-role-TeamAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -53,7 +53,7 @@ locals {
5353
name = module.role_map.team_permission_set_name_map[role],
5454
description = format("Allow user to assume the %s Team role in the Identity account, which allows access to other accounts", replace(title(role), "-", ""))
5555
relay_state = "",
56-
session_duration = "",
56+
session_duration = var.session_duration,
5757
tags = {},
5858
inline_policy = data.aws_iam_policy_document.assume_aws_team[role].json
5959
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/job-function/ViewOnlyAccess"]

src/policy-ReadOnlyAccess.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ locals {
33
name = "ReadOnlyAccess",
44
description = "Allow Read Only access to the account",
55
relay_state = "",
6-
session_duration = "",
6+
session_duration = var.session_duration,
77
tags = {},
88
inline_policy = data.aws_iam_policy_document.eks_read_only.json,
99
policy_attachments = [

0 commit comments

Comments
 (0)