Skip to content

Commit

Permalink
fix
Browse files Browse the repository at this point in the history
  • Loading branch information
badra001 committed Jan 16, 2026
1 parent e5eb838 commit 1941ae6
Show file tree
Hide file tree
Showing 4 changed files with 18 additions and 11 deletions.
9 changes: 3 additions & 6 deletions policies/sc-servicecatalog-t1/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,13 +2,14 @@

| Name | Version |
|------|---------|
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 3.66.0 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.12 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | >= 6.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 3.66.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | >= 6.0 |

## Modules

Expand All @@ -29,11 +30,7 @@ No modules.
|------|-------------|------|---------|:--------:|
| <a name="input_account_alias"></a> [account\_alias](#input\_account\_alias) | AWS Account Alias | `string` | `""` | no |
| <a name="input_account_id"></a> [account\_id](#input\_account\_id) | AWS Account ID (default will pull from current user) | `string` | `""` | no |
| <a name="input_customer_managed_policy_names"></a> [customer\_managed\_policy\_names](#input\_customer\_managed\_policy\_names) | Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset | `map(string)` | `{}` | no |
| <a name="input_managed_policy_names"></a> [managed\_policy\_names](#input\_managed\_policy\_names) | Names of AWS Managed Policy to attach to the permissionset | `list(string)` | `[]` | no |
| <a name="input_name"></a> [name](#input\_name) | Permission Set Name for which all settings apply | `string` | `null` | no |
| <a name="input_override_prefixes"></a> [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no |
| <a name="input_relay_state"></a> [relay\_state](#input\_relay\_state) | Relay State to pass along to permissionset | `string` | `null` | no |
| <a name="input_tags"></a> [tags](#input\_tags) | AWS Tags to apply to appropriate resources | `map(string)` | `{}` | no |

## Outputs
Expand Down
10 changes: 5 additions & 5 deletions policies/sc-servicecatalog-t1/outputs.tf
Original file line number Diff line number Diff line change
@@ -1,24 +1,24 @@
output "name" {
description = "Permission Set Name for which all settings apply"
value = var.name
value = local.name
}

output "managed_policy_names" {
description = "Names of AWS Managed Policy to attach to the permissionset"
value = var.managed_policy_names
value = local.managed_policy_names
}

output "customer_managed_policy_names" {
description = "Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset"
value = var.customer_managed_policy_names
value = local.customer_managed_policy_names
}

output "inline_policy" {
description = "AWS Policy document for the single allowed inline policy (use .json to get policy)"
value = data.aws_iam_policy_document.inline
value = local.inline
}

output "relay_state" {
description = "Relay State to pass along to permissionset"
value = var.relay_state
value = local.relay_state
}
10 changes: 10 additions & 0 deletions policies/sc-servicecatalog-t1/settings.tf
Original file line number Diff line number Diff line change
@@ -0,0 +1,10 @@
locals {
name = "servicecatalog-t1"
managed_policy_names = [
"ReadOnlyAccess",
"AWSServiceCatalogEndUserFullAccess"
]
customer_managed_policy_names = {}
relay_state = "https://console.amazonaws-us-gov.com/servicecatalog/home"
inline_policy = data.aws_iam_policy_document.inline
}
File renamed without changes.

0 comments on commit 1941ae6

Please sign in to comment.