-
Notifications
You must be signed in to change notification settings - Fork 26
/
users.tf
138 lines (131 loc) · 3.42 KB
/
users.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
resource "aws_iam_user" "cf_user" {
name = "cf_user"
tags = {
type = "api-user"
}
}
resource "aws_iam_access_key" "cf_user_access_key" {
user = aws_iam_user.cf_user.name
}
output "keyid" {
value = aws_iam_access_key.cf_user_access_key.id
}
output "secret" {
value = aws_iam_access_key.cf_user_access_key.secret
}
resource "aws_iam_user_policy" "cloudfront_user_policy" {
name = "cf_user_policy"
user = aws_iam_user.cf_user.name
policy = <<EOF
{
"Version": "2012-10-17",
"Statement":[
{
"Effect":"Allow",
"Action":[
"acm:ListCertificates",
"cloudfront:*",
"cloudwatch:DescribeAlarms",
"cloudwatch:PutMetricAlarm",
"cloudwatch:GetMetricStatistics",
"elasticloadbalancing:DescribeLoadBalancers",
"iam:ListServerCertificates",
"sns:ListSubscriptionsByTopic",
"sns:ListTopics",
"waf:GetWebACL",
"waf:ListWebACLs"
],
"Resource":"*"
},
{
"Effect":"Allow",
"Action":[
"s3:ListAllMyBuckets",
"s3:PutBucketPolicy"
],
"Resource":"arn:aws:s3:::*"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::dev-admin.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::dev-admin.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::dev.webmap.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::dev.webmap.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::dev.wallet.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::dev.wallet.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::test.webmap.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::test.webmap.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::webmap.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::webmap.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::test.admin.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::test.admin.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::staging-admin.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::staging-admin.treetracker.org"
},
{
"Effect":"Allow",
"Action": "s3:*Object",
"Resource":"arn:aws:s3:::admin.treetracker.org/*"
},
{
"Effect": "Allow",
"Action": "s3:ListBucket",
"Resource": "arn:aws:s3:::admin.treetracker.org"
}
]
}
EOF
}