diff --git a/policies/sc-servicecatalog-t1/README.md b/policies/sc-servicecatalog-t1/README.md
index 243ac06..33cb3c2 100644
--- a/policies/sc-servicecatalog-t1/README.md
+++ b/policies/sc-servicecatalog-t1/README.md
@@ -2,13 +2,14 @@
| Name | Version |
|------|---------|
-| [aws](#requirement\_aws) | >= 3.66.0 |
+| [terraform](#requirement\_terraform) | >= 1.12 |
+| [aws](#requirement\_aws) | >= 6.0 |
## Providers
| Name | Version |
|------|---------|
-| [aws](#provider\_aws) | >= 3.66.0 |
+| [aws](#provider\_aws) | >= 6.0 |
## Modules
@@ -29,11 +30,7 @@ No modules.
|------|-------------|------|---------|:--------:|
| [account\_alias](#input\_account\_alias) | AWS Account Alias | `string` | `""` | no |
| [account\_id](#input\_account\_id) | AWS Account ID (default will pull from current user) | `string` | `""` | no |
-| [customer\_managed\_policy\_names](#input\_customer\_managed\_policy\_names) | Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset | `map(string)` | `{}` | no |
-| [managed\_policy\_names](#input\_managed\_policy\_names) | Names of AWS Managed Policy to attach to the permissionset | `list(string)` | `[]` | no |
-| [name](#input\_name) | Permission Set Name for which all settings apply | `string` | `null` | no |
| [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no |
-| [relay\_state](#input\_relay\_state) | Relay State to pass along to permissionset | `string` | `null` | no |
| [tags](#input\_tags) | AWS Tags to apply to appropriate resources | `map(string)` | `{}` | no |
## Outputs
diff --git a/policies/sc-servicecatalog-t1/outputs.tf b/policies/sc-servicecatalog-t1/outputs.tf
index 8467959..b1158eb 100644
--- a/policies/sc-servicecatalog-t1/outputs.tf
+++ b/policies/sc-servicecatalog-t1/outputs.tf
@@ -1,24 +1,24 @@
output "name" {
description = "Permission Set Name for which all settings apply"
- value = var.name
+ value = local.name
}
output "managed_policy_names" {
description = "Names of AWS Managed Policy to attach to the permissionset"
- value = var.managed_policy_names
+ value = local.managed_policy_names
}
output "customer_managed_policy_names" {
description = "Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset"
- value = var.customer_managed_policy_names
+ value = local.customer_managed_policy_names
}
output "inline_policy" {
description = "AWS Policy document for the single allowed inline policy (use .json to get policy)"
- value = data.aws_iam_policy_document.inline
+ value = local.inline
}
output "relay_state" {
description = "Relay State to pass along to permissionset"
- value = var.relay_state
+ value = local.relay_state
}
diff --git a/policies/sc-servicecatalog-t1/settings.tf b/policies/sc-servicecatalog-t1/settings.tf
new file mode 100644
index 0000000..01cd7e0
--- /dev/null
+++ b/policies/sc-servicecatalog-t1/settings.tf
@@ -0,0 +1,10 @@
+locals {
+ name = "servicecatalog-t1"
+ managed_policy_names = [
+ "ReadOnlyAccess",
+ "AWSServiceCatalogEndUserFullAccess"
+ ]
+ customer_managed_policy_names = {}
+ relay_state = "https://console.amazonaws-us-gov.com/servicecatalog/home"
+ inline_policy = data.aws_iam_policy_document.inline
+}
diff --git a/policies/sc-servicecatalog-t1/variables.tf b/policies/sc-servicecatalog-t1/variables.tf.unused
similarity index 100%
rename from policies/sc-servicecatalog-t1/variables.tf
rename to policies/sc-servicecatalog-t1/variables.tf.unused