Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion src/policy-AdminstratorAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
description = "Allow Full Administrator access to the account",
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = ""
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/AdministratorAccess"]
customer_managed_policy_attachments = []
Expand Down
2 changes: 1 addition & 1 deletion src/policy-BillingAdministratorAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
description = "Grants permissions for billing and cost management. This includes viewing account usage and viewing and modifying budgets and payment methods.",
relay_state = "https://console.aws.amazon.com/billing/",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = ""
policy_attachments = [
"arn:${local.aws_partition}:iam::aws:policy/job-function/Billing",
Expand Down
2 changes: 1 addition & 1 deletion src/policy-BillingReadOnlyAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
description = "Allow users to view bills in the billing console",
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = ""
policy_attachments = [
"arn:${local.aws_partition}:iam::aws:policy/AWSBillingReadOnlyAccess",
Expand Down
2 changes: 1 addition & 1 deletion src/policy-DNSAdministratorAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -31,7 +31,7 @@ locals {
description = "Allow DNS Record Administrator access to the account, but not zone administration",
relay_state = "https://console.aws.amazon.com/route53/",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = data.aws_iam_policy_document.dns_administrator_access.json,
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/AWSSupportAccess"]
customer_managed_policy_attachments = []
Expand Down
2 changes: 1 addition & 1 deletion src/policy-Identity-role-TeamAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -54,7 +54,7 @@ locals {
description = format("Allow user to assume the %s Team role in the Identity account, which allows access to other accounts", replace(title(role), "-", ""))
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = data.aws_iam_policy_document.assume_aws_team[role].json
policy_attachments = ["arn:${local.aws_partition}:iam::aws:policy/job-function/ViewOnlyAccess"]
customer_managed_policy_attachments = []
Expand Down
2 changes: 1 addition & 1 deletion src/policy-PoweruserAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
description = "Allow Poweruser access to the account",
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = ""
policy_attachments = [
"arn:${local.aws_partition}:iam::aws:policy/PowerUserAccess",
Expand Down
2 changes: 1 addition & 1 deletion src/policy-ReadOnlyAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -4,7 +4,7 @@ locals {
description = "Allow Read Only access to the account",
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = data.aws_iam_policy_document.eks_read_only.json,
policy_attachments = [
"arn:${local.aws_partition}:iam::aws:policy/ReadOnlyAccess",
Expand Down
2 changes: 1 addition & 1 deletion src/policy-TerraformUpdateAccess.tf
Original file line number Diff line number Diff line change
Expand Up @@ -53,7 +53,7 @@ locals {
description = "Allow access to Terraform state sufficient to make changes",
relay_state = "",
session_duration = var.session_duration,
tags = {},
tags = module.this.tags,
inline_policy = one(data.aws_iam_policy_document.terraform_update_access[*].json),
policy_attachments = []
customer_managed_policy_attachments = []
Expand Down
Loading