diff --git a/terraform/aws_iam/terraform.tfstate b/terraform/aws_iam/terraform.tfstate index ab7700e..e14ef1a 100644 --- a/terraform/aws_iam/terraform.tfstate +++ b/terraform/aws_iam/terraform.tfstate @@ -1,7 +1,7 @@ { "version": 4, "terraform_version": "1.4.6", - "serial": 789, + "serial": 794, "lineage": "757d2b20-88b9-4a16-2150-6bd77f71aa53", "outputs": { "bypark_password": { @@ -664,7 +664,7 @@ "name": "dsk-metering", "path": "/system/", "permissions_boundary": null, - "tags": null, + "tags": {}, "tags_all": {}, "unique_id": "AIDAXMVVF3TA2MLW4CM7L" }, @@ -737,6 +737,23 @@ }, "sensitive_attributes": [], "private": "bnVsbA==" + }, + { + "index_key": 1, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:user/system/baekchan", + "force_destroy": false, + "id": "baekchan", + "name": "baekchan", + "path": "/system/", + "permissions_boundary": null, + "tags": null, + "tags_all": {}, + "unique_id": "AIDAXMVVF3TAWKKZZNE5B" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" } ] }, @@ -810,6 +827,7 @@ "schema_version": 0, "attributes": { "groups": [ + "CloudWatch_ReadOnly_Access_Group", "S3_Full_Access_Group", "Sqs_Full_Access_Group" ], @@ -821,6 +839,23 @@ "dependencies": [ "aws_iam_user.tmp" ] + }, + { + "index_key": 1, + "schema_version": 0, + "attributes": { + "groups": [ + "CloudWatch_ReadOnly_Access_Group", + "S3_Full_Access_Group" + ], + "id": "terraform-20230814023037161800000001", + "user": "baekchan" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_user.tmp" + ] } ] }, @@ -848,6 +883,25 @@ "dependencies": [ "aws_iam_user.dev2" ] + }, + { + "index_key": 1, + "schema_version": 0, + "attributes": { + "encrypted_password": null, + "id": "user2", + "key_fingerprint": null, + "password": "58Oi)tsxTWy+i*_N_LVw", + "password_length": 20, + "password_reset_required": null, + "pgp_key": null, + "user": "user2" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_user.dev2" + ] } ] } diff --git a/terraform/aws_iam/terraform.tfstate.backup b/terraform/aws_iam/terraform.tfstate.backup index a8f5220..ab7700e 100644 --- a/terraform/aws_iam/terraform.tfstate.backup +++ b/terraform/aws_iam/terraform.tfstate.backup @@ -1,7 +1,7 @@ { "version": 4, "terraform_version": "1.4.6", - "serial": 785, + "serial": 789, "lineage": "757d2b20-88b9-4a16-2150-6bd77f71aa53", "outputs": { "bypark_password": { @@ -653,6 +653,23 @@ }, "sensitive_attributes": [], "private": "bnVsbA==" + }, + { + "index_key": 2, + "schema_version": 0, + "attributes": { + "arn": "arn:aws:iam::508259851457:user/system/dsk-metering", + "force_destroy": false, + "id": "dsk-metering", + "name": "dsk-metering", + "path": "/system/", + "permissions_boundary": null, + "tags": null, + "tags_all": {}, + "unique_id": "AIDAXMVVF3TA2MLW4CM7L" + }, + "sensitive_attributes": [], + "private": "bnVsbA==" } ] }, @@ -763,6 +780,22 @@ "dependencies": [ "aws_iam_user.app" ] + }, + { + "index_key": 2, + "schema_version": 0, + "attributes": { + "groups": [ + "S3_Full_Access_Group" + ], + "id": "terraform-20230809031434938500000001", + "user": "dsk-metering" + }, + "sensitive_attributes": [], + "private": "bnVsbA==", + "dependencies": [ + "aws_iam_user.app" + ] } ] }, diff --git a/terraform/aws_iam/variables.tf b/terraform/aws_iam/variables.tf index 3dc2ecd..db1036c 100644 --- a/terraform/aws_iam/variables.tf +++ b/terraform/aws_iam/variables.tf @@ -74,7 +74,12 @@ variable "tmp_users" { { name = "bypark", is_console_user = true, - groups = ["S3_Full_Access_Group", "Sqs_Full_Access_Group"] + groups = ["S3_Full_Access_Group", "Sqs_Full_Access_Group", "CloudWatch_ReadOnly_Access_Group"] + }, + { + name = "baekchan", + is_console_user = true, + groups = ["S3_Full_Access_Group", "CloudWatch_ReadOnly_Access_Group"] } ] }