From 4307cf5261692da966f9adccbc8c317efa52e0fe Mon Sep 17 00:00:00 2001 From: dsk-minchulahn Date: Thu, 25 Jan 2024 17:04:03 +0900 Subject: [PATCH] =?UTF-8?q?Terraform=20-=20IAM=20-=20readonly=20=EC=82=AC?= =?UTF-8?q?=EC=9A=A9=EC=9E=90=20=EC=B6=94=EA=B0=80?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- .../users/.terraform.lock.hcl | 25 +++++++++++++++++++ .../identity-access-management/users/main.tf | 16 ++++++++++++ .../users/variables.tf | 3 +++ .../users/version.tf | 8 ++++++ 4 files changed, 52 insertions(+) create mode 100644 terraform/identity-access-management/users/.terraform.lock.hcl create mode 100644 terraform/identity-access-management/users/main.tf create mode 100644 terraform/identity-access-management/users/variables.tf create mode 100644 terraform/identity-access-management/users/version.tf diff --git a/terraform/identity-access-management/users/.terraform.lock.hcl b/terraform/identity-access-management/users/.terraform.lock.hcl new file mode 100644 index 0000000..800bb1e --- /dev/null +++ b/terraform/identity-access-management/users/.terraform.lock.hcl @@ -0,0 +1,25 @@ +# This file is maintained automatically by "terraform init". +# Manual edits may be lost in future updates. + +provider "registry.terraform.io/hashicorp/aws" { + version = "5.33.0" + constraints = "~> 5.0" + hashes = [ + "h1:rAmKVvvzUqVocFppyheelWGnyfCcIGxLV31iFBY2sz4=", + "zh:10bb683f2a9306e881f51a971ad3b2bb654ac94b54945dd63769876a343b5b04", + "zh:3916406db958d5487ea0c2d2320012d1907c29e6d01bf693560fe05e38ee0601", + "zh:3cb54b76b2f9e30620f3281ab7fb20633b1e4584fc84cc4ecd5752546252e86f", + "zh:513bcfd6971482215c5d64725189f875cbcbd260c6d11f0da4d66321efd93a92", + "zh:545a34427ebe7a950056627e7c980c9ba16318bf086d300eb808ffc41c52b7a8", + "zh:5a44b90faf1c8e8269f389c04bfac25ad4766d26360e7f7ac371be12a442981c", + "zh:64e1ef83162f78538dccad8b035577738851395ba774d6919cb21eb465a21e3a", + "zh:7315c70cb6b7f975471ea6129474639a08c58c071afc95a36cfaa41a13ae7fb9", + "zh:9806faae58938d638b757f54414400be998dddb45edfd4a29c85e827111dc93d", + "zh:997fa2e2db242354d9f772fba7eb17bd6d18d28480291dd93f85a18ca0a67ac2", + "zh:9b12af85486a96aedd8d7984b0ff811a4b42e3d88dad1a3fb4c0b580d04fa425", + "zh:9f9e076b7e9752971f39eead6eda69df1c5e890c82ba2ca95f56974af7adfe79", + "zh:b1d6af047f96de7f97d38b685654f1aed4356d5060b0e696d87d0270f5d49f75", + "zh:bfb0654b6f34398aeffdf907b744af06733d168db610a2c5747263380f817ac7", + "zh:e25203ee8cedccf60bf450950d533d3c172509bda8af97dbc3bc817d2a503c57", + ] +} diff --git a/terraform/identity-access-management/users/main.tf b/terraform/identity-access-management/users/main.tf new file mode 100644 index 0000000..d118a28 --- /dev/null +++ b/terraform/identity-access-management/users/main.tf @@ -0,0 +1,16 @@ +provider "aws" { + region = var.REGION +} + +resource "aws_iam_user" "user" { + name = "devops-readonly" +} + +resource "aws_iam_user_policy_attachment" "attachment" { + user = aws_iam_user.user.name + policy_arn = "arn:aws:iam::aws:policy/AmazonEC2ReadOnlyAccess" +} + +resource "aws_iam_access_key" "access_key" { + user = aws_iam_user.user.name +} \ No newline at end of file diff --git a/terraform/identity-access-management/users/variables.tf b/terraform/identity-access-management/users/variables.tf new file mode 100644 index 0000000..dde32e7 --- /dev/null +++ b/terraform/identity-access-management/users/variables.tf @@ -0,0 +1,3 @@ +variable "REGION" { + default = "ap-northeast-2" +} \ No newline at end of file diff --git a/terraform/identity-access-management/users/version.tf b/terraform/identity-access-management/users/version.tf new file mode 100644 index 0000000..3f773c6 --- /dev/null +++ b/terraform/identity-access-management/users/version.tf @@ -0,0 +1,8 @@ +terraform { + required_providers { + aws = { + source = "hashicorp/aws" + version = "~> 5.0" + } + } +} \ No newline at end of file