Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support creating new IAM users in IAM module #160

Closed
hoangmirs opened this issue Jan 12, 2023 · 0 comments · Fixed by #188
Closed

Support creating new IAM users in IAM module #160

hoangmirs opened this issue Jan 12, 2023 · 0 comments · Fixed by #188
Assignees
Labels
type : feature New feature or request

Comments

@hoangmirs
Copy link
Collaborator

hoangmirs commented Jan 12, 2023

Why

Currently, we are still creating IAM groups & accounts manually from the AWS console. We should support creating them with Terraform.

Typically, the following groups should be created

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Sid": "AllowManageRoleAndPolicy",
            "Effect": "Allow",
            "Action": [
                "iam:UpdateRoleDescription",
                "iam:UpdateRole",
                "iam:UpdateAssumeRolePolicy",
                "iam:UntagUser",
                "iam:UntagServerCertificate",
                "iam:UntagSAMLProvider",
                "iam:UntagRole",
                "iam:UntagPolicy",
                "iam:UntagOpenIDConnectProvider",
                "iam:UntagMFADevice",
                "iam:UntagInstanceProfile",
                "iam:TagUser",
                "iam:TagServerCertificate",
                "iam:TagSAMLProvider",
                "iam:TagRole",
                "iam:TagPolicy",
                "iam:TagOpenIDConnectProvider",
                "iam:TagMFADevice",
                "iam:TagInstanceProfile",
                "iam:SimulatePrincipalPolicy",
                "iam:SimulateCustomPolicy",
                "iam:SetDefaultPolicyVersion",
                "iam:RemoveRoleFromInstanceProfile",
                "iam:PutRolePolicy",
                "iam:PutRolePermissionsBoundary",
                "iam:PassRole",
                "iam:ListVirtualMFADevices",
                "iam:ListUsers",
                "iam:ListUserTags",
                "iam:ListUserPolicies",
                "iam:ListSigningCertificates",
                "iam:ListServiceSpecificCredentials",
                "iam:ListServerCertificates",
                "iam:ListServerCertificateTags",
                "iam:ListSSHPublicKeys",
                "iam:ListSAMLProviders",
                "iam:ListSAMLProviderTags",
                "iam:ListRoles",
                "iam:ListRoleTags",
                "iam:ListRolePolicies",
                "iam:ListPolicyVersions",
                "iam:ListPolicyTags",
                "iam:ListPoliciesGrantingServiceAccess",
                "iam:ListPolicies",
                "iam:ListOpenIDConnectProviders",
                "iam:ListOpenIDConnectProviderTags",
                "iam:ListMFADevices",
                "iam:ListMFADeviceTags",
                "iam:ListInstanceProfilesForRole",
                "iam:ListInstanceProfiles",
                "iam:ListInstanceProfileTags",
                "iam:ListGroupsForUser",
                "iam:ListGroups",
                "iam:ListGroupPolicies",
                "iam:ListEntitiesForPolicy",
                "iam:ListAttachedUserPolicies",
                "iam:ListAttachedRolePolicies",
                "iam:ListAttachedGroupPolicies",
                "iam:ListAccountAliases",
                "iam:ListAccessKeys",
                "iam:GetServiceLinkedRoleDeletionStatus",
                "iam:GetRolePolicy",
                "iam:GetRole",
                "iam:GetPolicyVersion",
                "iam:GetPolicy",
                "iam:GetLoginProfile",
                "iam:GetAccountSummary",
                "iam:DetachRolePolicy",
                "iam:DeleteServiceLinkedRole",
                "iam:DeleteRolePolicy",
                "iam:DeleteRolePermissionsBoundary",
                "iam:DeleteRole",
                "iam:DeletePolicyVersion",
                "iam:DeletePolicy",
                "iam:CreateServiceLinkedRole",
                "iam:CreateRole",
                "iam:CreatePolicyVersion",
                "iam:CreatePolicy",
                "iam:AttachRolePolicy",
                "iam:AddRoleToInstanceProfile"
            ],
            "Resource": "arn:aws:iam::*"
        }
    ]
}

The users should be created and assigned to the appropriate groups.

Who Benefits?

Developers

@hoangmirs hoangmirs added the type : feature New feature or request label Jan 12, 2023
@longnd longnd self-assigned this Apr 17, 2023
longnd added a commit that referenced this issue Apr 26, 2023
[#160] define the IAM users & groups module
longnd added a commit that referenced this issue Apr 27, 2023
longnd added a commit that referenced this issue May 14, 2023
longnd added a commit that referenced this issue May 14, 2023
longnd added a commit that referenced this issue May 15, 2023
longnd added a commit that referenced this issue May 15, 2023
longnd added a commit that referenced this issue May 15, 2023
longnd added a commit that referenced this issue May 15, 2023
longnd added a commit that referenced this issue May 15, 2023
longnd added a commit that referenced this issue Jun 26, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
type : feature New feature or request
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants