|
1 | 1 | {
|
2 | 2 | "version": 3,
|
3 | 3 | "terraform_version": "0.11.10",
|
4 |
| - "serial": 16, |
| 4 | + "serial": 17, |
5 | 5 | "lineage": "06aae676-abab-bb3e-6cf0-33dcc3b68c52",
|
6 | 6 | "modules": [
|
7 | 7 | {
|
|
111 | 111 | "deposed": [],
|
112 | 112 | "provider": "provider.aws"
|
113 | 113 | },
|
| 114 | + "aws_iam_group_policy_attachment.assume_role_admin": { |
| 115 | + "type": "aws_iam_group_policy_attachment", |
| 116 | + "depends_on": [ |
| 117 | + "aws_iam_group.administrators", |
| 118 | + "aws_iam_policy.assume_role_admin" |
| 119 | + ], |
| 120 | + "primary": { |
| 121 | + "id": "Administrators-20181108221230921900000001", |
| 122 | + "attributes": { |
| 123 | + "group": "Administrators", |
| 124 | + "id": "Administrators-20181108221230921900000001", |
| 125 | + "policy_arn": "arn:aws:iam::537658973298:policy/administrators-permit-assume-role" |
| 126 | + }, |
| 127 | + "meta": {}, |
| 128 | + "tainted": false |
| 129 | + }, |
| 130 | + "deposed": [], |
| 131 | + "provider": "provider.aws" |
| 132 | + }, |
| 133 | + "aws_iam_policy.assume_role_admin": { |
| 134 | + "type": "aws_iam_policy", |
| 135 | + "depends_on": [ |
| 136 | + "data.aws_iam_policy_document.assume_role_admin" |
| 137 | + ], |
| 138 | + "primary": { |
| 139 | + "id": "arn:aws:iam::537658973298:policy/administrators-permit-assume-role", |
| 140 | + "attributes": { |
| 141 | + "arn": "arn:aws:iam::537658973298:policy/administrators-permit-assume-role", |
| 142 | + "description": "Allow administrators to assume admin role", |
| 143 | + "id": "arn:aws:iam::537658973298:policy/administrators-permit-assume-role", |
| 144 | + "name": "administrators-permit-assume-role", |
| 145 | + "path": "/", |
| 146 | + "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Resource\": \"arn:aws:iam::537658973298:role/assume-admin\"\n }\n ]\n}" |
| 147 | + }, |
| 148 | + "meta": {}, |
| 149 | + "tainted": false |
| 150 | + }, |
| 151 | + "deposed": [], |
| 152 | + "provider": "provider.aws" |
| 153 | + }, |
| 154 | + "aws_iam_role.administrators": { |
| 155 | + "type": "aws_iam_role", |
| 156 | + "depends_on": [ |
| 157 | + "data.aws_iam_policy_document.role_trust" |
| 158 | + ], |
| 159 | + "primary": { |
| 160 | + "id": "assume-admin", |
| 161 | + "attributes": { |
| 162 | + "arn": "arn:aws:iam::537658973298:role/assume-admin", |
| 163 | + "assume_role_policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Sid\":\"\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::537658973298:root\"},\"Action\":\"sts:AssumeRole\"}]}", |
| 164 | + "create_date": "2018-11-08T22:11:57Z", |
| 165 | + "description": "", |
| 166 | + "force_detach_policies": "false", |
| 167 | + "id": "assume-admin", |
| 168 | + "max_session_duration": "3600", |
| 169 | + "name": "assume-admin", |
| 170 | + "path": "/", |
| 171 | + "unique_id": "AROAI6KC2I4SPDRJ4CKX4" |
| 172 | + }, |
| 173 | + "meta": {}, |
| 174 | + "tainted": false |
| 175 | + }, |
| 176 | + "deposed": [], |
| 177 | + "provider": "provider.aws" |
| 178 | + }, |
114 | 179 | "aws_iam_user.nastevens": {
|
115 | 180 | "type": "aws_iam_user",
|
116 | 181 | "depends_on": [],
|
|
371 | 436 | "id": "Z1Q9EUUS8L74PK",
|
372 | 437 | "attributes": {
|
373 | 438 | "comment": "Managed by Terraform",
|
| 439 | + "delegation_set_id": "", |
374 | 440 | "force_destroy": "false",
|
375 | 441 | "id": "Z1Q9EUUS8L74PK",
|
376 | 442 | "name": "areweembeddedyet.com.",
|
|
380 | 446 | "name_servers.2": "ns-393.awsdns-49.com",
|
381 | 447 | "name_servers.3": "ns-683.awsdns-21.net",
|
382 | 448 | "tags.%": "0",
|
| 449 | + "vpc.#": "0", |
| 450 | + "vpc_id": "", |
| 451 | + "vpc_region": "", |
383 | 452 | "zone_id": "Z1Q9EUUS8L74PK"
|
384 | 453 | },
|
385 | 454 | "meta": {},
|
|
395 | 464 | "id": "Z2GJVQBHJNLGYL",
|
396 | 465 | "attributes": {
|
397 | 466 | "comment": "Managed by Terraform",
|
| 467 | + "delegation_set_id": "", |
398 | 468 | "force_destroy": "false",
|
399 | 469 | "id": "Z2GJVQBHJNLGYL",
|
400 | 470 | "name": "rust-embedded.com.",
|
|
404 | 474 | "name_servers.2": "ns-218.awsdns-27.com",
|
405 | 475 | "name_servers.3": "ns-879.awsdns-45.net",
|
406 | 476 | "tags.%": "0",
|
| 477 | + "vpc.#": "0", |
| 478 | + "vpc_id": "", |
| 479 | + "vpc_region": "", |
407 | 480 | "zone_id": "Z2GJVQBHJNLGYL"
|
408 | 481 | },
|
409 | 482 | "meta": {},
|
|
419 | 492 | "id": "Z1K6QDM5H6MZNC",
|
420 | 493 | "attributes": {
|
421 | 494 | "comment": "Managed by Terraform",
|
| 495 | + "delegation_set_id": "", |
422 | 496 | "force_destroy": "false",
|
423 | 497 | "id": "Z1K6QDM5H6MZNC",
|
424 | 498 | "name": "rust-embedded.org.",
|
|
428 | 502 | "name_servers.2": "ns-298.awsdns-37.com",
|
429 | 503 | "name_servers.3": "ns-758.awsdns-30.net",
|
430 | 504 | "tags.%": "0",
|
| 505 | + "vpc.#": "0", |
| 506 | + "vpc_id": "", |
| 507 | + "vpc_region": "", |
431 | 508 | "zone_id": "Z1K6QDM5H6MZNC"
|
432 | 509 | },
|
433 | 510 | "meta": {},
|
|
452 | 529 | "force_destroy": "false",
|
453 | 530 | "hosted_zone_id": "Z3AQBSTGFYJSTF",
|
454 | 531 | "id": "areweembeddedyet.com",
|
| 532 | + "lifecycle_rule.#": "0", |
455 | 533 | "logging.#": "0",
|
456 | 534 | "region": "us-east-1",
|
457 | 535 | "replication_configuration.#": "0",
|
|
491 | 569 | "force_destroy": "false",
|
492 | 570 | "hosted_zone_id": "Z3AQBSTGFYJSTF",
|
493 | 571 | "id": "rust-embedded.com",
|
| 572 | + "lifecycle_rule.#": "0", |
494 | 573 | "logging.#": "0",
|
495 | 574 | "region": "us-east-1",
|
496 | 575 | "replication_configuration.#": "0",
|
|
530 | 609 | "force_destroy": "false",
|
531 | 610 | "hosted_zone_id": "Z3AQBSTGFYJSTF",
|
532 | 611 | "id": "www.areweembeddedyet.com",
|
| 612 | + "lifecycle_rule.#": "0", |
533 | 613 | "logging.#": "0",
|
534 | 614 | "region": "us-east-1",
|
535 | 615 | "replication_configuration.#": "0",
|
|
569 | 649 | "force_destroy": "false",
|
570 | 650 | "hosted_zone_id": "Z3AQBSTGFYJSTF",
|
571 | 651 | "id": "www.rust-embedded.com",
|
| 652 | + "lifecycle_rule.#": "0", |
572 | 653 | "logging.#": "0",
|
573 | 654 | "region": "us-east-1",
|
574 | 655 | "replication_configuration.#": "0",
|
|
591 | 672 | },
|
592 | 673 | "deposed": [],
|
593 | 674 | "provider": "provider.aws"
|
| 675 | + }, |
| 676 | + "data.aws_caller_identity.current": { |
| 677 | + "type": "aws_caller_identity", |
| 678 | + "depends_on": [], |
| 679 | + "primary": { |
| 680 | + "id": "2018-11-08 22:11:26.173533 +0000 UTC", |
| 681 | + "attributes": { |
| 682 | + "account_id": "537658973298", |
| 683 | + "arn": "arn:aws:iam::537658973298:user/ryankurte", |
| 684 | + "id": "2018-11-08 22:11:26.173533 +0000 UTC", |
| 685 | + "user_id": "AIDAIVOCQQ5CRIKAOD2VA" |
| 686 | + }, |
| 687 | + "meta": {}, |
| 688 | + "tainted": false |
| 689 | + }, |
| 690 | + "deposed": [], |
| 691 | + "provider": "provider.aws" |
| 692 | + }, |
| 693 | + "data.aws_iam_policy_document.assume_role_admin": { |
| 694 | + "type": "aws_iam_policy_document", |
| 695 | + "depends_on": [ |
| 696 | + "aws_iam_role.administrators" |
| 697 | + ], |
| 698 | + "primary": { |
| 699 | + "id": "1814159211", |
| 700 | + "attributes": { |
| 701 | + "id": "1814159211", |
| 702 | + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Resource\": \"arn:aws:iam::537658973298:role/assume-admin\"\n }\n ]\n}", |
| 703 | + "statement.#": "1", |
| 704 | + "statement.0.actions.#": "1", |
| 705 | + "statement.0.actions.2528466339": "sts:AssumeRole", |
| 706 | + "statement.0.condition.#": "0", |
| 707 | + "statement.0.effect": "Allow", |
| 708 | + "statement.0.not_actions.#": "0", |
| 709 | + "statement.0.not_principals.#": "0", |
| 710 | + "statement.0.not_resources.#": "0", |
| 711 | + "statement.0.principals.#": "0", |
| 712 | + "statement.0.resources.#": "1", |
| 713 | + "statement.0.resources.2220086942": "arn:aws:iam::537658973298:role/assume-admin", |
| 714 | + "statement.0.sid": "" |
| 715 | + }, |
| 716 | + "meta": {}, |
| 717 | + "tainted": false |
| 718 | + }, |
| 719 | + "deposed": [], |
| 720 | + "provider": "provider.aws" |
| 721 | + }, |
| 722 | + "data.aws_iam_policy_document.role_trust": { |
| 723 | + "type": "aws_iam_policy_document", |
| 724 | + "depends_on": [ |
| 725 | + "data.aws_caller_identity.current" |
| 726 | + ], |
| 727 | + "primary": { |
| 728 | + "id": "2185275079", |
| 729 | + "attributes": { |
| 730 | + "id": "2185275079", |
| 731 | + "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"\",\n \"Effect\": \"Allow\",\n \"Action\": \"sts:AssumeRole\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::537658973298:root\"\n }\n }\n ]\n}", |
| 732 | + "statement.#": "1", |
| 733 | + "statement.0.actions.#": "1", |
| 734 | + "statement.0.actions.2528466339": "sts:AssumeRole", |
| 735 | + "statement.0.condition.#": "0", |
| 736 | + "statement.0.effect": "Allow", |
| 737 | + "statement.0.not_actions.#": "0", |
| 738 | + "statement.0.not_principals.#": "0", |
| 739 | + "statement.0.not_resources.#": "0", |
| 740 | + "statement.0.principals.#": "1", |
| 741 | + "statement.0.principals.3686967839.identifiers.#": "1", |
| 742 | + "statement.0.principals.3686967839.identifiers.4224304580": "arn:aws:iam::537658973298:root", |
| 743 | + "statement.0.principals.3686967839.type": "AWS", |
| 744 | + "statement.0.resources.#": "0", |
| 745 | + "statement.0.sid": "" |
| 746 | + }, |
| 747 | + "meta": {}, |
| 748 | + "tainted": false |
| 749 | + }, |
| 750 | + "deposed": [], |
| 751 | + "provider": "provider.aws" |
594 | 752 | }
|
595 | 753 | },
|
596 | 754 | "depends_on": []
|
|
0 commit comments