Skip to content

v1.10.5: add network_admin to iam-general-policies #23

Merged
merged 1 commit into from
May 11, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
4 changes: 4 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -97,3 +97,7 @@
- add 120s delay before applying bucket policy
- s3-flow-logs
- add 120s delay before applying bucket policy

* v1.10.5 -- 20210511
- iam-general-policies
- add additional policy for network admin
2 changes: 1 addition & 1 deletion common/version.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,3 @@
locals {
_module_version = "1.10.4"
_module_version = "1.10.5"
}
2 changes: 2 additions & 0 deletions iam-general-policies/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -110,6 +110,7 @@ No modules.
| Name | Type |
|------|------|
| [aws_iam_policy.general](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
| [aws_iam_policy.policy_network-admin](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_policy) | resource |
| [aws_arn.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/arn) | data source |
| [aws_caller_identity.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
| [aws_iam_policy_document.deny_billing](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
Expand All @@ -119,6 +120,7 @@ No modules.
| [aws_iam_policy_document.lambda_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.manage_credentials](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.manage_keys](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.network_admin](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.root_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.sts_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_region.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/region) | data source |
Expand Down
7 changes: 7 additions & 0 deletions iam-general-policies/custom_policies.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,6 +35,13 @@ locals {
policy = data.aws_iam_policy_document.deny_readonly_data.json
create_policy = true
}
"network_admin" = {
name = "network-admin"
path = "/"
description = "Policy to augment (allow/deny) access for NetworkAdministrator"
policy = data.aws_iam_policy_document.network_admin.json
create_policy = true
}

#---
# sts
Expand Down
28 changes: 28 additions & 0 deletions iam-general-policies/policy_data.tf
Original file line number Diff line number Diff line change
Expand Up @@ -101,6 +101,34 @@ data "aws_iam_policy_document" "deny_readonly_data" {
}
}

data "aws_iam_policy_document" "network_admin" {
statement {
sid = "NetworkAdminDeny"
effect = "Deny"
actions = [
"route53:*",
"route53domains:*",
# "cloudfront:ListDistributions",
"elasticloadbalancing:*",
"elasticbeanstalk:*",
"sns:CreateTopic",
"cloudwatch:DeleteAlarms",
]
}
}

resource "aws_iam_policy" "policy_network-admin" {
name = format("%vinf-%v", "p-", "network-admin")
path = "/"
description = "inf-network-admin policy"
policy = data.aws_iam_policy_document.policy_network-admin.json

tags = merge(
local.common_tags,
tomap({ "boc:created_by" = "terraform" }),
tomap({ "Name" = format("%vinf-%v", "p-", "network-admin") }),
)
}
#---
# sts (for roles)
#---
Expand Down