Compare commits

...

3 commits
1.0.0 ... main

Author SHA1 Message Date
00ee290f29
chore(infrastructure): change the AWS account used for tests
All checks were successful
main / test (push) Successful in 1m51s
2025-04-17 17:02:05 +02:00
959edc9d00
chore(infrastructure): bootstrap CI
All checks were successful
main / test (push) Successful in 1m47s
2025-04-12 09:02:04 +02:00
51bdcc5fc0
feat(module): add default value [] to input variable assume_role_account_names 2025-04-12 09:02:02 +02:00
9 changed files with 159 additions and 40 deletions

View file

@ -0,0 +1,16 @@
---
name: 'main'
on:
push:
workflow_dispatch:
jobs:
test:
runs-on: 'self-hosted'
steps:
- uses: 'actions/checkout@v4'
- uses: "https://git.adyxax.org/adyxax/action-tofu-aws-test@1.0.0"
with:
aws-access-key-id: "${{ vars.AWS_ACCESS_KEY_ID }}"
aws-access-key-secret: "${{ secrets.AWS_ACCESS_KEY_SECRET }}"

View file

@ -2,8 +2,14 @@
All notable changes to this project will be documented in this file.
## 1.1.0 - 2025-04-12
### Added
- Added default value `[]` to input variable `assume_role_account_names`.
## 1.0.0 - 2025-04-11
### Added
- initial import
- Initial import.

1
infrastructure/tofu/.gitignore vendored Normal file
View file

@ -0,0 +1 @@
!.terraform.lock.hcl

21
infrastructure/tofu/.terraform.lock.hcl generated Normal file
View file

@ -0,0 +1,21 @@
# This file is maintained automatically by "tofu init".
# Manual edits may be lost in future updates.
provider "registry.opentofu.org/hashicorp/aws" {
version = "5.91.0"
constraints = "5.91.0"
hashes = [
"h1:g+uDHz6bZ36QaxoKWmJEYGh7OP5RAE5MPbxLohzcU18=",
"h1:qw1Sp5py+7rRwzHgHNJvgYTeTkBnPHY7WercO1BsOh0=",
"zh:057e6cb85e3efe2c30ef5ca47cc47abc8217e2e0dddce2e92a8d2d6f18b6cee6",
"zh:0f15d3f599e07307ac9771c602dcaaf0c46dd259649da985cb3cb80a7a647cea",
"zh:187086070cc878ab0a27163939516983e3efae65ebff78dc3466619cdf978dee",
"zh:67a58fc85c630bcc6c772f573813caabe6c9af291c71c7207590fc4792e4d94e",
"zh:68abb9382928ce29c0f3dd9a75b41ad2a453f3a46330f484d1ea858589146c1b",
"zh:772134ba713e879e5b70d614d08a6650f156e7a3fa724d538bfa85632b1ed639",
"zh:bf67439e47cf6720dcec7a1e2988d6c10c56d7eea69bb1ecff1b22d6bb63a36d",
"zh:bfd0b91dc4ae338eb79ec41bede5eed7a0740380bffbdfbda362f7ed08e0e2ad",
"zh:ca3c3313cd4971850da45ce4337b027a804389db740c310ba637bc0a86775eef",
"zh:d75a8ec54a4783c25cb806b887f0d3c67cded08db8c496fd9cf831791e4c8482",
]
}

View file

@ -0,0 +1,30 @@
locals {
name = "tofu-module-aws-iam-user"
}
module "aws_iam_ci_user" {
providers = {
aws.core = aws.all["core"]
aws.root = aws.all["root"]
aws.tests = aws.all["tests"]
}
source = "git::ssh://git@git.adyxax.org/adyxax/tofu-module-aws-iam-ci-user?depth=1&ref=1.0.1"
name = local.name
tests_policy_statements = jsonencode([
{
Action = "iam:*"
Effect = "Allow"
Resource = [
"arn:aws:iam::*:user/tftest-user",
"arn:aws:iam::*:policy/${local.name}-tftest",
]
},
{
# Necessary for removing an IAM user
Action = "iam:ListVirtualMFADevices",
Effect = "Allow"
Resource = "*"
}
])
}

View file

@ -0,0 +1,24 @@
terraform {
backend "s3" {
bucket = "adyxax-tofu-states"
dynamodb_table = "tofu-states"
key = "repositories/${local.name}"
profile = "core"
region = "eu-west-3"
}
required_providers {
aws = {
source = "hashicorp/aws"
version = "5.91.0"
}
}
}
provider "aws" {
for_each = toset(["core", "root", "tests"])
alias = "all"
default_tags { tags = { "managed-by" = "tofu" } }
profile = each.key
region = "eu-west-3"
}

83
main.tf
View file

@ -1,9 +1,10 @@
data "aws_organizations_organization" "main" {}
locals {
aws_account_ids = { for info in data.aws_organizations_organization.main.accounts :
aws_account_ids = length(var.assume_role_account_names) > 0 ? {
for info in data.aws_organizations_organization.main.accounts :
info.name => info.id
}
} : {}
}
resource "aws_iam_user" "main" {
@ -14,43 +15,47 @@ resource "aws_iam_user" "main" {
resource "aws_iam_user_policy" "main" {
name = var.name
policy = jsonencode({
Statement = concat([
{ # Assume roles in AWS sub-accounts
Action = "sts:AssumeRole"
Effect = "Allow"
Resource = [for name in var.assume_role_account_names :
format(
"arn:aws:iam::%s:role/%s",
local.aws_account_ids[name],
var.name,
)
]
},
{
Action = [
# Manage the user's own IAM access key
"iam:CreateAccessKey",
"iam:DeleteAccessKey",
"iam:UpdateAccessKey",
# Read only access to the user's IAM object
"iam:Get*",
"iam:List*",
]
Effect = "Allow"
Resource = aws_iam_user.main.arn
},
{
Action = [
# Necessary for removing an IAM user
"iam:ListVirtualMFADevices",
# Describe and list the organization accounts
"organizations:DescribeOrganization",
"organizations:List*",
]
Effect = "Allow"
Resource = "*"
},
])
Statement = concat(
length(var.assume_role_account_names) > 0 ? [
{ # Assume roles in AWS sub-accounts
Action = "sts:AssumeRole"
Effect = "Allow"
Resource = [for name in var.assume_role_account_names :
format(
"arn:aws:iam::%s:role/%s",
local.aws_account_ids[name],
var.name,
)
]
}
] : [],
[
{
Action = [
# Manage the user's own IAM access key
"iam:CreateAccessKey",
"iam:DeleteAccessKey",
"iam:UpdateAccessKey",
# Read only access to the user's IAM object
"iam:Get*",
"iam:List*",
]
Effect = "Allow"
Resource = aws_iam_user.main.arn
},
{
Action = [
# Necessary for removing an IAM user
"iam:ListVirtualMFADevices",
# Describe and list the organization accounts
"organizations:DescribeOrganization",
"organizations:List*",
]
Effect = "Allow"
Resource = "*"
},
]
)
Version = "2012-10-17"
})
user = aws_iam_user.main.name

15
main.tftest.hcl Normal file
View file

@ -0,0 +1,15 @@
provider "aws" {
profile = "tests"
region = "eu-west-3"
}
run "main" {
assert {
condition = output.access_key_id != null
error_message = "invalid IAM access key ID"
}
}
variables {
name = "tftest-user"
}

View file

@ -1,4 +1,5 @@
variable "assume_role_account_names" {
default = []
description = "The names of the AWS sub-accounts this IAM user can assume roles in."
nullable = false
type = list(string)