Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/ahmadalibagheri/cdktf-typescript-aws-iam
AWS iam configuration with typescript and cdktf
https://github.com/ahmadalibagheri/cdktf-typescript-aws-iam
aws cdktf cdktf-template terraform typescript
Last synced: 3 months ago
JSON representation
AWS iam configuration with typescript and cdktf
- Host: GitHub
- URL: https://github.com/ahmadalibagheri/cdktf-typescript-aws-iam
- Owner: ahmadalibagheri
- Created: 2021-02-23T15:58:58.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2022-03-08T05:48:47.000Z (almost 3 years ago)
- Last Synced: 2023-03-06T09:32:15.509Z (almost 2 years ago)
- Topics: aws, cdktf, cdktf-template, terraform, typescript
- Language: JavaScript
- Homepage:
- Size: 210 KB
- Stars: 17
- Watchers: 1
- Forks: 1
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
## Documentation
* Explore the Terraform for Terraform [CLI](https://www.terraform.io/downloads.html) >= v1.0+
* Explore the Nodejs for npm [CLI](https://nodejs.org/en/) >= v14+
* Explore the Yarn for Yarn [CLI](https://classic.yarnpkg.com/en/docs/install#debian-stable) >= v1.21 (optional - NPM will work as an alternative)
* Explore the CDK for cdktf [CLI](https://github.com/hashicorp/terraform-cdk#build)Add your AWS credentials as two environment variables, AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY, replacing AAAAAA with each respective values.
```shell
$ export AWS_ACCESS_KEY_ID=AAAAAA
$ export AWS_SECRET_ACCESS_KEY=AAAAA
```# typescript-aws-iam
A CDK for Terraform application in TypeScript for IAM configuraiton.
## Usage
Install project dependencies
```shell
yarn install
```Generate CDK for Terraform constructs for Terraform provides and modules used in the project.
```bash
cdktf get
```You can now edit the `main.ts` file if you want to modify any code.
```typescript
vim main.ts
import { Construct } from "constructs";
import { App, TerraformStack, TerraformOutput } from "cdktf";
import { AwsProvider, iam } from "./.gen/providers/aws/";class MyStack extends TerraformStack {
constructor(scope: Construct, name: string) {
super(scope, name);new AwsProvider(this, "aws", {
region: "us-west-1",
});const iamNewGroup = new iam.IamGroup(this, "Group", {
name: "CDKtf-TypeScript-Group-Demo",
});const iamNewUser = new iam.IamUser(this, "User", {
name: "CDKtf-TypeScript-User-Demo",
tags: {
Name: "CDKtf-TypeScript-User-Demo",
Team: "Devops",
Company: "Your compnay",
},
});const iamNewRole = new iam.IamRole(this, "role", {
name: "CDKtf-TypeScript-role-Demo",
assumeRolePolicy: JSON.stringify({
Version: "2012-10-17",
Statement: [
{
Action: "sts:AssumeRole",
Principal: {
Service: "ec2.amazonaws.com",
},
Effect: "Allow",
},
],
}),
tags: {
Name: "CDKtf-TypeScript-role-Demo",
Team: "Devops",
Company: "Your compnay",
},
});const iamNewPolicy = new iam.IamPolicy(this, "policy", {
name: "CDKtf-TypeScript-policy-Demo",
policy: JSON.stringify({
Version: "2012-10-17",
Statement: [
{
Action: "*",
Resource: ["arn:aws:ec2:*:*:client-vpn-endpoint/*"],
Effect: "Allow",
},
],
}),
description: "This policy is for typescript demo",
});new iam.IamUserGroupMembership(
this,
"iamusergroupmembership",
{
groups: [iamNewGroup.name],
user: iamNewUser.name,
}
);const iamAttachment = new iam.IamPolicyAttachment(
this,
"iampolicyattachement",
{
name: "CDKtf-TypeScript-iam-attachment-Demo",
groups: [iamNewGroup.name],
roles: [iamNewRole.name],
policyArn: iamNewPolicy.arn,
users: [iamNewUser.name],
}
);new TerraformOutput(this, "iam_Group", {
value: iamNewGroup.name,
});new TerraformOutput(this, "iam_username", {
value: iamNewUser.name,
});new TerraformOutput(this, "iam_role", {
value: iamNewRole.arn,
});new TerraformOutput(this, "iam_policy", {
value: iamNewPolicy.arn,
});new TerraformOutput(this, "iam_attachemnt", {
value: iamAttachment.name,
});}
}const app = new App();
new MyStack(app, "cdktf-typescript-aws-iam");
app.synth();
```Compile the TypeScript application
```bash
tsc
```
At this step you can run code with two different way:# The first way:
Generate Terraform configuration
```bash
cdktf synth
```The above command will create a folder called `cdktf.out` that contains all Terraform JSON configuration that was generated.
Run Terraform commands
```bash
cd cdktf.out
terraform init
terraform plan
terraform apply
```# The second way:
Run cdktf commands
```bash
cdktf deploy
```