An open API service indexing awesome lists of open source software.

https://github.com/cloudtruth/terraform-cloudtruth-access

Terraform module to automate creation of a role that allows cloudtruth to access a customer's aws resources
https://github.com/cloudtruth/terraform-cloudtruth-access

Last synced: about 1 month ago
JSON representation

Terraform module to automate creation of a role that allows cloudtruth to access a customer's aws resources

Awesome Lists containing this project

README

          

# Grant Cloudtruth Access

Sets up a role and uses it to grant cloudtruth the permission to access the
given resources within your aws account

## Usage

```hcl
module "grant_cloudtruth_access" {
source = "github.com/cloudtruth/terraform-cloudtruth-access"

role_name = "name-the-role-as-desired-matches-that-on-cloudtruth-integration-page"
external_id = "generated-external-id-from-cloudtruth-integration-page"
services_enabled = ["s3"]
}
```

**IMPORTANT:** We do not pin modules to versions in our examples because of the difficulty of keeping the versions in the documentation in sync with the latest released versions. We highly recommend that you pin the version to the exact version you are using so that your infrastructure remains stable.

## Requirements

| Name | Version |
|------|---------|
| terraform | >= 0.12 |

## Providers

| Name | Version |
|------|---------|
| aws | n/a |

## Inputs

| Name | Description | Type | Default | Required |
|------|-------------|------|---------|:--------:|
| account\_ids | The AWS account IDs (for the cloudtruth account) that will be assuming the role | `list(string)` |

[
"609878994716"
]
| no |
| external\_id | The external id used for limiting access. | `any` | n/a | yes |
| role\_name | The role within your AWS account that cloudtruth will assume to perform its actions | `any` | n/a | yes |
| s3\_policy | A custom policy to use for s3 instead of the one this module would define | `string` | `""` | no |
| s3\_resources | The s3 resources to explicitly grant access to, defaults to all, and listing
all buckets is always allowed (for bucket chooser in UI) even if access
isn't granted here | `list(string)` |
[
"*"
]
| no |
| services\_enabled | The AWS services to grant cloudtruth access to, allowed values are s3, ssm, secretsmanager | `list(string)` | n/a | yes |
| services\_write\_enabled | The AWS services to grant cloudtruth write access to, allowed values are s3, ssm, secretsmanager | `list(string)` | `[]` | no |
| ssm\_policy | A custom policy to use for ssm instead of the one this module would define | `string` | `""` | no |
| ssm\_resources | The ssm resources to explicitly grant access to, defaults to all, and listing
all is always allowed (for chooser in UI) even if access
isn't granted here | `list(string)` |
[
"*"
]
| no |
| secretsmanager\_policy | A custom policy to use for secrets manager instead of the one this module would define | `string` | `""` | no |
| secretsmanager\_resources | The secrets manager resources to explicitly grant access to, defaults to all, and listing
all is always allowed (for chooser in UI) even if access
isn't granted here | `list(string)` |
[
"*"
]
| no |
| kms\_decrypt\_enabled | Enable kms decryption using the specified kms keys; required only if ssm parameters or secretsmanager secrets use custom kms keys | `bool` | `false` | no |
| kms\_encrypt\_enabled | Enable kms decryption/encryption using the specified kms keys; required only if ssm parameters or secretsmanager secrets use custom kms keys | `bool` | `false` | no |
| kms\_keys | The kms keys to explicitly grant access to | `list(string)` |
[]
| no |

## Outputs

No output.