Component: iam-delegated-roles
No description available.
Component: iam-delegated-roles
This component is responsible for provisioning all delegated user and system IAM roles. It sets them up to be assumed from the primary, identity account roles. This is expected to be used alongside and applied after the iam-primary-roles
component is applied to the identity account.
Usage
Stack Level: Global
Here’s an example snippet for how to use this component. This specific usage is for an audit stack (e.g. gbl-audit.yaml
) where limiting the default permissions of the roles is desired.
components:
terraform:
iam-delegated-roles:
vars:
exclude_roles: [ "helm" ]
account_role_policy_arns:
# IAM Policy ARNs to attach to each role, overriding the defaults
admin: [ "arn:aws:iam::aws:policy/PowerUserAccess" ]
ops: [ "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess" ]
poweruser: [ "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess" ]
observer: [ "arn:aws:iam::aws:policy/job-function/ViewOnlyAccess" ]
# Use default for terraform
trusted_primary_role_overrides:
# Terraform in audit can wipe out logs, so access to it needs to be restricted
terraform: [ "admin" ]
Requirements
Name | Version |
---|---|
terraform | >= 0.12.0 |
aws | >= 2.0 |
local | >= 1.3 |
template | >= 2.0 |
Providers
Name | Version |
---|---|
aws | >= 2.0 |
terraform | n/a |
Inputs
Name | Description | Type | Default | Required |
---|---|---|---|---|
account_number | Account number for the target account | string |
n/a | yes |
account_role_policy_arns | Custom IAM policy ARNs to override defaults | map(list(string)) |
{} |
no |
additional_tag_map | Additional tags for appending to tags_as_list_of_maps. Not added to tags . |
map(string) |
{} |
no |
allow_same_account_assume_role | Set true to allow roles to assume other roles in the same account | bool |
false |
no |
attributes | Additional attributes (e.g. 1 ) |
list(string) |
[] |
no |
context | Single object for setting entire context at once.See description of individual variables for details.Leave string and numeric variables as null to use default value.Individual variable settings (non-null) override settings in context object,except for attributes, tags, and additional_tag_map, which are merged. |
object({ enabled = bool namespace = string environment = string stage = string name = string delimiter = string attributes = list(string) tags = map(string) additional_tag_map = map(string) regex_replace_chars = string label_order = list(string) id_length_limit = number }) | { “additional_tag_map”: {}, “attributes”: [], “delimiter”: null, “enabled”: true, “environment”: null, “id_length_limit”: null, “label_order”: [], “name”: null, “namespace”: null, “regex_replace_chars”: null, “stage”: null, “tags”: {}} | no |
default_account_role_policy_arns | Custom IAM policy ARNs to override defaults | map(list(string)) |
n/a | yes |
delimiter | Delimiter to be used between namespace , environment , stage , name and attributes .Defaults to - (hyphen). Set to "" to use no delimiter at all. |
string |
null |
no |
enabled | Set to false to prevent the module from creating any resources | bool |
null |
no |
environment | Environment, e.g. ‘uw2’, ‘us-west-2’, OR ‘prod’, ‘staging’, ‘dev’, ‘UAT’ | string |
null |
no |
exclude_roles | Roles in roles_config that should NOT be created | list(string) |
[] |
no |
iam_primary_roles_stage_name | The name of the stage where the IAM primary roles are provisioned | string |
"identity" |
no |
iam_role_max_session_duration | The maximum session duration (in seconds) that you want to set for the IAM roles. If you do not specify a value for this setting, the default maximum of one hour is applied. This setting can have a value from 1 hour to 12 hours | number |
43200 |
no |
iam_roles_environment_name | The name of the environment where the IAM roles are provisioned | string |
"gbl" |
no |
id_length_limit | Limit id to this many characters.Set to 0 for unlimited length.Set to null for default, which is 0 .Does not affect id_full . |
number |
null |
no |
import_role_arn | IAM Role ARN to use when importing a resource | string |
null |
no |
label_order | The naming order of the id output and Name tag.Defaults to [“namespace”, “environment”, “stage”, “name”, “attributes”].You can omit any of the 5 elements, but at least one must be present. | list(string) |
null |
no |
name | Solution name, e.g. ‘app’ or ‘jenkins’ | string |
null |
no |
namespace | Namespace, which could be your organization name or abbreviation, e.g. ‘eg’ or ‘cp’ | string |
null |
no |
primary_account_id | Primary authentication account id used as the source for assume role | string |
n/a | yes |
regex_replace_chars | Regex to replace chars with empty string in namespace , environment , stage and name .If not set, "/[^a-zA-Z0-9-]/" is used to remove all characters other than hyphens, letters and digits. |
string |
null |
no |
region | AWS Region | string |
n/a | yes |
stage | Stage, e.g. ‘prod’, ‘staging’, ‘dev’, OR ‘source’, ‘build’, ‘test’, ‘deploy’, ‘release’ | string |
null |
no |
tags | Additional tags (e.g. map('BusinessUnit','XYZ') |
map(string) |
{} |
no |
tfstate_account_id | The ID of the account where the Terraform remote state backend is provisioned | string |
"" |
no |
tfstate_assume_role | Set to false to use the caller’s role to access the Terraform remote state | bool |
true |
no |
tfstate_backend_stage_name | The name of the stage where the Terraform state backend is provisioned | string |
"root" |
no |
tfstate_bucket_environment_name | The name of the environment for Terraform state bucket | string |
"" |
no |
tfstate_bucket_stage_name | The name of the stage for Terraform state bucket | string |
"root" |
no |
tfstate_existing_role_arn | The ARN of the existing IAM Role to access the Terraform remote state. If not provided and remote_state_assume_role is true , a role will be constructed from remote_state_role_arn_template |
string |
"" |
no |
tfstate_role_arn_template | IAM Role ARN template for accessing the Terraform remote state | string |
"arn:aws:iam::%s:role/%s-%s-%s-%s" |
no |
tfstate_role_environment_name | The name of the environment for Terraform state IAM role | string |
"gbl" |
no |
tfstate_role_name | IAM Role name for accessing the Terraform remote state | string |
"terraform" |
no |
tfstate_role_stage_name | The name of the stage for Terraform state IAM role | string |
"root" |
no |
trusted_primary_role_overrides | Override default list of primary roles that can assume this one | map(list(string)) |
{} |
no |
Outputs
Name | Description |
---|---|
role_long_name_policy_arn_map | Map of role long names to attached IAM Policy ARNs |
role_name_role_arn_map | Map of role names to role ARNs |
References
- cloudposse/terraform-aws-components - Cloud Posse’s upstream component