Skip to content

cisagov/cool-certificate-manager-iam

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

cool-certificate-manager-iam

GitHub Build Status

This project is used to manage IAM permissions for COOL users that are allowed to create and renew COOL certificates.

Pre-requisites

Usage

  1. Create a Terraform workspace (if you haven't already done so) by running terraform workspace new <workspace_name>
  2. Create a <workspace_name>.tfvars file with all of the required variables (see Inputs below for details):
users = [
  "firstname1.lastname1",
  "firstname2.lastname2"
]
  1. Run the command terraform init.
  2. Run the command terraform apply -var-file=<workspace_name>.tfvars.

Requirements

Name Version
terraform ~> 1.1
aws ~> 4.9

Providers

Name Version
aws ~> 4.9
aws.users ~> 4.9
terraform n/a

Modules

No modules.

Resources

Name Type
aws_iam_group.certificate_managers resource
aws_iam_group_policy_attachment.assume_dns_certificatesbucketfullaccess_role_attachment resource
aws_iam_group_policy_attachment.assume_dns_route53resourcechange_cyber_dhs_gov_role_attachment resource
aws_iam_policy.assume_dns_certificatesbucketfullaccess_role resource
aws_iam_policy.assume_dns_route53resourcechange_cyber_dhs_gov_role resource
aws_iam_user_group_membership.certificate_managers resource
aws_caller_identity.current data source
aws_iam_policy_document.assume_dns_certificatesbucketfullaccess_role_doc data source
aws_iam_policy_document.assume_dns_route53resourcechange_cyber_dhs_gov_role_doc data source
aws_iam_user.users data source
terraform_remote_state.dns_certboto data source
terraform_remote_state.dns_cyber_dhs_gov data source
terraform_remote_state.users data source

Inputs

Name Description Type Default Required
assume_dns_certificatesbucketfullaccess_policy_description The description to associate with the IAM policy that allows assumption of the role that allows full access to the certificates bucket in the DNS account. string "The IAM policy that allows assumption of the role that allows full access to the certificates bucket in the DNS account." no
assume_dns_certificatesbucketfullaccess_policy_name The name to assign the IAM policy that allows assumption of the role that allows full access to the certificates bucket in the DNS account. string "DNS-AssumeCertificatesBucketFullAccess" no
assume_dns_route53resourcechange_cyber_dhs_gov_policy_description The description to associate with the IAM policy that allows assumption of the role that allows sufficient permissions to modify resource records in the cyber.dhs.gov zone in the DNS account. string "The IAM policy that allows assumption of the role that allows sufficient permissions to modify resource records in the cyber.dhs.gov zone in the DNS account." no
assume_dns_route53resourcechange_cyber_dhs_gov_policy_name The name to assign the IAM policy that allows assumption of the role that allows sufficient permissions to modify resource records in the cyber.dhs.gov zone in the DNS account. string "DNS-AssumeRoute53ResourceChange-cyber.dhs.gov" no
aws_region The AWS region to deploy into (e.g. us-east-1). string "us-east-1" no
certificate_managers_group_name The name of the group to be created for certificate manager users. string "certificate_managers" no
tags Tags to apply to all AWS resources created. map(string) {} no
users A list containing the usernames of each user that is allowed to manage certificates. Example: [ "firstname1.lastname1", "firstname2.lastname2" ]. list(string) n/a yes

Outputs

No outputs.

Notes

Running pre-commit requires running terraform init in every directory that contains Terraform code. In this repository, this is just the main directory.

Contributing

We welcome contributions! Please see CONTRIBUTING.md for details.

License

This project is in the worldwide public domain.

This project is in the public domain within the United States, and copyright and related rights in the work worldwide are waived through the CC0 1.0 Universal public domain dedication.

All contributions to this project will be released under the CC0 dedication. By submitting a pull request, you are agreeing to comply with this waiver of copyright interest.

About

Manage IAM permissions for COOL users that manage certificates

Resources

License

Security policy

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published