All checks were successful
Terraform Apply / Terraform Apply (push) Successful in 46s
72 lines
1.5 KiB
HCL
72 lines
1.5 KiB
HCL
resource "aws_iam_group" "administrators" {
|
|
name = "Administrators"
|
|
path = "/"
|
|
}
|
|
|
|
data "aws_iam_policy" "administrator_access" {
|
|
name = "AdministratorAccess"
|
|
}
|
|
|
|
resource "aws_iam_group_policy_attachment" "administrators" {
|
|
group = aws_iam_group.administrators.name
|
|
policy_arn = data.aws_iam_policy.administrator_access.arn
|
|
}
|
|
|
|
resource "aws_iam_user" "administrator" {
|
|
name = "Administrator"
|
|
}
|
|
|
|
resource "aws_iam_user_group_membership" "devstream" {
|
|
user = aws_iam_user.administrator.name
|
|
groups = [aws_iam_group.administrators.name]
|
|
}
|
|
|
|
resource "aws_iam_user_login_profile" "administrator" {
|
|
user = aws_iam_user.administrator.name
|
|
password_reset_required = true
|
|
}
|
|
|
|
resource "aws_iam_access_key" "AccK" {
|
|
user = aws_iam_user.administrator.name
|
|
}
|
|
|
|
resource "aws_iam_user_policy" "iam" {
|
|
name = "ListBuckets"
|
|
user = aws_iam_user.administrator.name
|
|
policy = <<EOF
|
|
{
|
|
"Version": "2012-10-17",
|
|
"Statement": [
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": "s3:ListAllMyBuckets",
|
|
"Resource": "*"
|
|
}
|
|
]
|
|
}
|
|
EOF
|
|
}
|
|
|
|
# Create IAM policy to allow S3 read access
|
|
resource "aws_iam_policy" "s3_read_policy" {
|
|
name = "s3_read_policy"
|
|
description = "Allows read access to files in the specified S3 bucket"
|
|
policy = <<EOF
|
|
{
|
|
"Version": "2012-10-17",
|
|
"Statement": [
|
|
{
|
|
"Effect": "Allow",
|
|
"Action": [
|
|
"s3:GetObject",
|
|
"s3:ListBucket"
|
|
],
|
|
"Resource": [
|
|
"arn:aws:s3:::your-bucket-name/*",
|
|
"arn:aws:s3:::your-bucket-name"
|
|
]
|
|
}
|
|
]
|
|
}
|
|
EOF
|
|
} |