diff --git a/policies/sc-servicecatalog-t1/README.md b/policies/sc-servicecatalog-t1/README.md index 243ac06..33cb3c2 100644 --- a/policies/sc-servicecatalog-t1/README.md +++ b/policies/sc-servicecatalog-t1/README.md @@ -2,13 +2,14 @@ | Name | Version | |------|---------| -| [aws](#requirement\_aws) | >= 3.66.0 | +| [terraform](#requirement\_terraform) | >= 1.12 | +| [aws](#requirement\_aws) | >= 6.0 | ## Providers | Name | Version | |------|---------| -| [aws](#provider\_aws) | >= 3.66.0 | +| [aws](#provider\_aws) | >= 6.0 | ## Modules @@ -29,11 +30,7 @@ No modules. |------|-------------|------|---------|:--------:| | [account\_alias](#input\_account\_alias) | AWS Account Alias | `string` | `""` | no | | [account\_id](#input\_account\_id) | AWS Account ID (default will pull from current user) | `string` | `""` | no | -| [customer\_managed\_policy\_names](#input\_customer\_managed\_policy\_names) | Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset | `map(string)` | `{}` | no | -| [managed\_policy\_names](#input\_managed\_policy\_names) | Names of AWS Managed Policy to attach to the permissionset | `list(string)` | `[]` | no | -| [name](#input\_name) | Permission Set Name for which all settings apply | `string` | `null` | no | | [override\_prefixes](#input\_override\_prefixes) | Override built-in prefixes by component. This should be used primarily for common infrastructure things | `map(string)` | `{}` | no | -| [relay\_state](#input\_relay\_state) | Relay State to pass along to permissionset | `string` | `null` | no | | [tags](#input\_tags) | AWS Tags to apply to appropriate resources | `map(string)` | `{}` | no | ## Outputs diff --git a/policies/sc-servicecatalog-t1/outputs.tf b/policies/sc-servicecatalog-t1/outputs.tf index 8467959..b1158eb 100644 --- a/policies/sc-servicecatalog-t1/outputs.tf +++ b/policies/sc-servicecatalog-t1/outputs.tf @@ -1,24 +1,24 @@ output "name" { description = "Permission Set Name for which all settings apply" - value = var.name + value = local.name } output "managed_policy_names" { description = "Names of AWS Managed Policy to attach to the permissionset" - value = var.managed_policy_names + value = local.managed_policy_names } output "customer_managed_policy_names" { description = "Map of policy name to permission boundary of Customer Managed Policy to attach to the permissionset" - value = var.customer_managed_policy_names + value = local.customer_managed_policy_names } output "inline_policy" { description = "AWS Policy document for the single allowed inline policy (use .json to get policy)" - value = data.aws_iam_policy_document.inline + value = local.inline } output "relay_state" { description = "Relay State to pass along to permissionset" - value = var.relay_state + value = local.relay_state } diff --git a/policies/sc-servicecatalog-t1/settings.tf b/policies/sc-servicecatalog-t1/settings.tf new file mode 100644 index 0000000..01cd7e0 --- /dev/null +++ b/policies/sc-servicecatalog-t1/settings.tf @@ -0,0 +1,10 @@ +locals { + name = "servicecatalog-t1" + managed_policy_names = [ + "ReadOnlyAccess", + "AWSServiceCatalogEndUserFullAccess" + ] + customer_managed_policy_names = {} + relay_state = "https://console.amazonaws-us-gov.com/servicecatalog/home" + inline_policy = data.aws_iam_policy_document.inline +} diff --git a/policies/sc-servicecatalog-t1/variables.tf b/policies/sc-servicecatalog-t1/variables.tf.unused similarity index 100% rename from policies/sc-servicecatalog-t1/variables.tf rename to policies/sc-servicecatalog-t1/variables.tf.unused