Skip to content
This repository has been archived by the owner on Sep 27, 2024. It is now read-only.

CMS-Enterprise/batcave-tf-db-s3-integration

Repository files navigation

batcave-tf-db-s3-integration

Requirements

Name Version
terraform >= 1.0
aws >= 4.0

Providers

Name Version
aws >= 4.0

Modules

No modules.

Resources

Name Type
aws_iam_policy.s3 resource
aws_iam_role.this resource
aws_iam_role_policy_attachment.s3_policy resource
aws_iam_role_policy_attachment.this resource
aws_iam_policy_document.s3 data source
aws_iam_policy_document.this data source

Inputs

Name Description Type Default Required
app_name App name (ie. Flux, Velero, etc.) string "" no
assume_role_condition_test Name of the IAM condition operator to evaluate when assuming the role string "StringEquals" no
attach_s3_policy Determines whether to attach the S3 to the role bool false no
aws_id AWS Account Ids string "111122223333" no
create_role Whether to create a role bool true no
force_detach_policies Whether policies should be detached from this role when destroying bool true no
max_session_duration Maximum CLI/API session duration in seconds between 3600 and 43200 number null no
oidc_providers Map of OIDC providers where each provider map should contain the provider, provider_arn, and namespace_service_accounts any
{
"one": {
"namespace_service_accounts": [
"default:default"
],
"provider_arn": ""
}
}
no
policy_name_prefix IAM policy name prefix string "AmazonEKS_" no
role_description IAM Role description string null no
role_name Name of IAM role string "vpc-cni" no
role_path Path of IAM role string "/delegatedadmin/developer/" no
role_permissions_boundary_arn Permissions boundary ARN to use for IAM role string "arn:aws:iam::373346310182:policy/cms-cloud-admin/developer-boundary-policy" no
role_policy_arns ARNs of any policies to attach to the IAM role map(string) {} no
s3_bucket_arns List of S3 Bucket ARNs to allow access to list(string)
[
""
]
no
tags A map of tags to add the the IAM role map(any) {} no

Outputs

Name Description
iam_role_arn ARN of IAM role
iam_role_name Name of IAM role
iam_role_path Path of IAM role
iam_role_unique_id Unique ID of IAM role