-
Notifications
You must be signed in to change notification settings - Fork 25
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
1 parent
dfe6e3c
commit 1121d95
Showing
28 changed files
with
307 additions
and
57 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,16 +1,19 @@ | ||
sudo: required | ||
language: bash | ||
sudo: false | ||
dist: trusty | ||
language: generic | ||
services: | ||
- docker | ||
|
||
install: | ||
- env | ||
- wget -t 10 -O terraform.zip https://releases.hashicorp.com/terraform/0.11.7/terraform_0.11.7_linux_amd64.zip | ||
- unzip terraform.zip | ||
- mv terraform ~/bin/ | ||
- chmod +x ~/bin/terraform | ||
- wget -t 10 -O terraform-docs https://github.com/segmentio/terraform-docs/releases/download/v0.3.0/terraform-docs_linux_amd64 | ||
- mv terraform-docs ~/bin/terraform-docs | ||
- chmod +x ~/bin/terraform-docs | ||
|
||
jobs: | ||
include: | ||
- stage: check | ||
script: make lint | ||
script: make lint | ||
- stage: check | ||
script: make check-docs |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1 +1,75 @@ | ||
# cztack | ||
# CZtack | ||
|
||
Cztack (pronounced "stack") is CZI's collection of Terraform modules. We use these as way to scale our infrastructure work. | ||
|
||
## Design Principles | ||
|
||
TODO | ||
|
||
## Modules | ||
|
||
### AWS IAM ECS Task Role | ||
|
||
This creates a role for use with an ECS task, you bring your own policy and we create the role for you. | ||
|
||
[Read More](aws-iam-ecs-task-role/README.md) | ||
|
||
### AWS IAM Group assume-role | ||
|
||
This module with create and IAM group, add users to it and grant the grouop permission to assume a role. This is commonly used for cross-account access control. | ||
|
||
[Read More](aws-iam-group-assume-role/README.md) | ||
|
||
### AWS IAM Group console-login | ||
|
||
This will create a group, add users to it, and grant permission to log into the AWS console and manage one's own credentials. | ||
|
||
[Read More](aws-iam-group-console-login/README.md) | ||
|
||
### AWS IAM password policy | ||
|
||
This module will create a good password policy for your AWS account. | ||
|
||
[Read More](aws-iam-password-policy/README.md) | ||
|
||
### AWS IAM cloudwatch logs policy | ||
|
||
This will create a policy that allow writing to cloudwatch logs. | ||
|
||
[Read More](aws-iam-policy-cwlogs/README.md) | ||
|
||
### AWS IAM poweruser role | ||
|
||
This will create a poweruser role, based off the AWS-managed "poweruser" policy, but with a few additions that we find useful. | ||
|
||
[Read More](aws-iam-poweruser/README.md) | ||
|
||
### AWS IAM Role Cloudfront poweruser | ||
|
||
This will create a role that gives "poweruser" level access to cloudfront. | ||
|
||
[Read More](aws-iam-role-cloudfront-poweruser/README.md) | ||
|
||
### AWS IAM Role ECS poweruser | ||
|
||
This will create a role that gives "poweruser" level access to ECS. | ||
|
||
[Read More](aws-iam-role-ecs-poweruser/README.md) | ||
|
||
### AWS IAM Role infraci | ||
|
||
This is a role we find useful for running CI jobs for terraform code. It is based on the AWS-managed policy for readonly, but includes a few additions, like the ability to read secrets. | ||
|
||
[Read More](aws-iam-role-infraci/README.md) | ||
|
||
### AWS IAM role readonly | ||
|
||
This creates a readonly role, based off the AWS-managed readonly policy, but with a few changes. | ||
|
||
[Read More](aws-iam-role-readonly/README.md) | ||
|
||
### AWS IAM role security-audit | ||
|
||
This creates a security-audit role, based off the AWS-managed policy, but with a few changes. | ||
|
||
[Read More](aws-iam-role-security-audit/README.md) |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,3 +1,3 @@ | ||
output "name" { | ||
output "group_name" { | ||
value = "${aws_iam_group.login.name}" | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,9 +1,11 @@ | ||
variable "name" { | ||
type = "string" | ||
default = "console-login" | ||
variable "group_name" { | ||
type = "string" | ||
default = "console-login" | ||
description = "Name of the group to be created." | ||
} | ||
|
||
variable "path" { | ||
type = "string" | ||
default = "/" | ||
variable "iam_path" { | ||
type = "string" | ||
default = "/" | ||
description = "IAM path under which resources will be created." | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file was deleted.
Oops, something went wrong.
Empty file.
Empty file.
Empty file.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,25 @@ | ||
# AWS IAM role poweruser | ||
|
||
This creates a role, `role_name` which is assumable from the account `source_account_id`. | ||
|
||
## Example | ||
|
||
```hcl | ||
module "group" { | ||
source = "github.com/chanzuckerberg/cztack/aws-iam-role-poweruser?ref=master" # FIXME | ||
role_name = "…" # defaults to "poweruser" | ||
source_account_id = "…" | ||
} | ||
``` | ||
|
||
<!-- START --> | ||
|
||
## Inputs | ||
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|:----:|:-----:|:-----:| | ||
| role_name | | string | `poweruser` | no | | ||
| source_account_id | | string | - | yes | | ||
|
||
<!-- END --> |
File renamed without changes.
File renamed without changes.
2 changes: 1 addition & 1 deletion
2
aws-iam-poweruser/variables.tf → aws-iam-role-poweruser/variables.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,4 +1,4 @@ | ||
variable "name" { | ||
variable "role_name" { | ||
type = "string" | ||
default = "poweruser" | ||
} | ||
|
Oops, something went wrong.