Skip to content

Commit

Permalink
Merge pull request #23 from terraform-modules/add-network-admin
Browse files Browse the repository at this point in the history
v1.10.5: add network_admin to iam-general-policies
  • Loading branch information
badra001 committed May 11, 2021
2 parents 43674d9 + 3c8e277 commit 5d587d3
Show file tree
Hide file tree
Showing 5 changed files with 42 additions and 1 deletion.
4 changes: 4 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,3 +97,7 @@
- add 120s delay before applying bucket policy
- s3-flow-logs
- add 120s delay before applying bucket policy

* v1.10.5 -- 20210511
- iam-general-policies
- add additional policy for network admin
2 changes: 1 addition & 1 deletion common/version.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
locals {
_module_version = "1.10.4"
_module_version = "1.10.5"
}
2 changes: 2 additions & 0 deletions iam-general-policies/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,6 +110,7 @@ No modules.
| Name | Type |
|------|------|
| [aws_iam_policy.general](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
| [aws_iam_policy.policy_network-admin](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
| [aws_arn.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/arn) | data source |
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
| [aws_iam_policy_document.deny_billing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
Expand All @@ -119,6 +120,7 @@ No modules.
| [aws_iam_policy_document.lambda_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.manage_credentials](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.manage_keys](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.network_admin](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.root_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.sts_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
Expand Down
7 changes: 7 additions & 0 deletions iam-general-policies/custom_policies.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,13 @@ locals {
policy = data.aws_iam_policy_document.deny_readonly_data.json
create_policy = true
}
"network_admin" = {
name = "network-admin"
path = "/"
description = "Policy to augment (allow/deny) access for NetworkAdministrator"
policy = data.aws_iam_policy_document.network_admin.json
create_policy = true
}

#---
# sts
Expand Down
28 changes: 28 additions & 0 deletions iam-general-policies/policy_data.tf
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,34 @@ data "aws_iam_policy_document" "deny_readonly_data" {
}
}

data "aws_iam_policy_document" "network_admin" {
statement {
sid = "NetworkAdminDeny"
effect = "Deny"
actions = [
"route53:*",
"route53domains:*",
# "cloudfront:ListDistributions",
"elasticloadbalancing:*",
"elasticbeanstalk:*",
"sns:CreateTopic",
"cloudwatch:DeleteAlarms",
]
}
}

resource "aws_iam_policy" "policy_network-admin" {
name = format("%vinf-%v", "p-", "network-admin")
path = "/"
description = "inf-network-admin policy"
policy = data.aws_iam_policy_document.policy_network-admin.json

tags = merge(
local.common_tags,
tomap({ "boc:created_by" = "terraform" }),
tomap({ "Name" = format("%vinf-%v", "p-", "network-admin") }),
)
}
#---
# sts (for roles)
#---
Expand Down

0 comments on commit 5d587d3

Please sign in to comment.