terraform.tfstate 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278
  1. {
  2. "version": 4,
  3. "terraform_version": "0.12.25",
  4. "serial": 23,
  5. "lineage": "57457749-c0e1-81c8-cb3c-303f763c24e9",
  6. "outputs": {},
  7. "resources": [
  8. {
  9. "module": "module.mdradmin-bootstrap",
  10. "mode": "data",
  11. "type": "aws_caller_identity",
  12. "name": "current",
  13. "provider": "provider.aws",
  14. "instances": [
  15. {
  16. "schema_version": 0,
  17. "attributes": {
  18. "account_id": "471284459109",
  19. "arn": "arn:aws:iam::471284459109:user/MDRAdmin",
  20. "id": "2020-05-27 00:54:40.602092 +0000 UTC",
  21. "user_id": "AIDAW3OV6EZS5DFJAO7CP"
  22. }
  23. }
  24. ]
  25. },
  26. {
  27. "module": "module.mdradmin-bootstrap",
  28. "mode": "data",
  29. "type": "aws_iam_policy_document",
  30. "name": "mdradmin_tfstate_setup",
  31. "provider": "provider.aws",
  32. "instances": [
  33. {
  34. "schema_version": 0,
  35. "attributes": {
  36. "id": "1838532126",
  37. "json": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"DynamoDBTablesAndLocking\",\n \"Effect\": \"Allow\",\n \"Action\": \"dynamodb:*\",\n \"Resource\": \"arn:aws:dynamodb:us-east-1:471284459109:table/afsxdr-terraform-state\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"DynamoDBTablesAndLocking2\",\n \"Effect\": \"Allow\",\n \"Action\": \"dynamodb:ListTables\",\n \"Resource\": \"arn:aws:dynamodb:us-east-1:471284459109:table/*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"KMSKeyCreate\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:List*\",\n \"kms:DeleteKey\",\n \"kms:DeleteAlias\",\n \"kms:CreateKey\",\n \"kms:CreateAlias\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3AllResources\",\n \"Effect\": \"Allow\",\n \"Action\": \"s3:HeadBucket\",\n \"Resource\": \"*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3ManageStateBucket\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:Put*\",\n \"s3:ListBucket\",\n \"s3:Get*\",\n \"s3:DeleteBucket\",\n \"s3:CreateBucket\"\n ],\n \"Resource\": \"arn:aws:s3:::afsxdr-terraform-state\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3ObjectOperations\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:PutObject*\",\n \"s3:GetObject*\",\n \"s3:DeleteObject*\"\n ],\n \"Resource\": \"arn:aws:s3:::afsxdr-terraform-state/*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}",
  38. "override_json": null,
  39. "policy_id": null,
  40. "source_json": null,
  41. "statement": [
  42. {
  43. "actions": [
  44. "dynamodb:*"
  45. ],
  46. "condition": [
  47. {
  48. "test": "BoolIfExists",
  49. "values": [
  50. "true"
  51. ],
  52. "variable": "aws:MultiFactorAuthPresent"
  53. }
  54. ],
  55. "effect": "Allow",
  56. "not_actions": [],
  57. "not_principals": [],
  58. "not_resources": [],
  59. "principals": [],
  60. "resources": [
  61. "arn:aws:dynamodb:us-east-1:471284459109:table/afsxdr-terraform-state"
  62. ],
  63. "sid": "DynamoDBTablesAndLocking"
  64. },
  65. {
  66. "actions": [
  67. "dynamodb:ListTables"
  68. ],
  69. "condition": [
  70. {
  71. "test": "BoolIfExists",
  72. "values": [
  73. "true"
  74. ],
  75. "variable": "aws:MultiFactorAuthPresent"
  76. }
  77. ],
  78. "effect": "Allow",
  79. "not_actions": [],
  80. "not_principals": [],
  81. "not_resources": [],
  82. "principals": [],
  83. "resources": [
  84. "arn:aws:dynamodb:us-east-1:471284459109:table/*"
  85. ],
  86. "sid": "DynamoDBTablesAndLocking2"
  87. },
  88. {
  89. "actions": [
  90. "kms:CreateAlias",
  91. "kms:CreateKey",
  92. "kms:DeleteAlias",
  93. "kms:DeleteKey",
  94. "kms:List*"
  95. ],
  96. "condition": [
  97. {
  98. "test": "BoolIfExists",
  99. "values": [
  100. "true"
  101. ],
  102. "variable": "aws:MultiFactorAuthPresent"
  103. }
  104. ],
  105. "effect": "Allow",
  106. "not_actions": [],
  107. "not_principals": [],
  108. "not_resources": [],
  109. "principals": [],
  110. "resources": [
  111. "*"
  112. ],
  113. "sid": "KMSKeyCreate"
  114. },
  115. {
  116. "actions": [
  117. "s3:HeadBucket"
  118. ],
  119. "condition": [
  120. {
  121. "test": "BoolIfExists",
  122. "values": [
  123. "true"
  124. ],
  125. "variable": "aws:MultiFactorAuthPresent"
  126. }
  127. ],
  128. "effect": "Allow",
  129. "not_actions": [],
  130. "not_principals": [],
  131. "not_resources": [],
  132. "principals": [],
  133. "resources": [
  134. "*"
  135. ],
  136. "sid": "S3AllResources"
  137. },
  138. {
  139. "actions": [
  140. "s3:CreateBucket",
  141. "s3:DeleteBucket",
  142. "s3:Get*",
  143. "s3:ListBucket",
  144. "s3:Put*"
  145. ],
  146. "condition": [
  147. {
  148. "test": "BoolIfExists",
  149. "values": [
  150. "true"
  151. ],
  152. "variable": "aws:MultiFactorAuthPresent"
  153. }
  154. ],
  155. "effect": "Allow",
  156. "not_actions": [],
  157. "not_principals": [],
  158. "not_resources": [],
  159. "principals": [],
  160. "resources": [
  161. "arn:aws:s3:::afsxdr-terraform-state"
  162. ],
  163. "sid": "S3ManageStateBucket"
  164. },
  165. {
  166. "actions": [
  167. "s3:DeleteObject*",
  168. "s3:GetObject*",
  169. "s3:PutObject*"
  170. ],
  171. "condition": [
  172. {
  173. "test": "BoolIfExists",
  174. "values": [
  175. "true"
  176. ],
  177. "variable": "aws:MultiFactorAuthPresent"
  178. }
  179. ],
  180. "effect": "Allow",
  181. "not_actions": [],
  182. "not_principals": [],
  183. "not_resources": [],
  184. "principals": [],
  185. "resources": [
  186. "arn:aws:s3:::afsxdr-terraform-state/*"
  187. ],
  188. "sid": "S3ObjectOperations"
  189. }
  190. ],
  191. "version": "2012-10-17"
  192. }
  193. }
  194. ]
  195. },
  196. {
  197. "module": "module.mdradmin-bootstrap",
  198. "mode": "data",
  199. "type": "aws_partition",
  200. "name": "current",
  201. "provider": "provider.aws",
  202. "instances": [
  203. {
  204. "schema_version": 0,
  205. "attributes": {
  206. "dns_suffix": "amazonaws.com",
  207. "id": "2020-05-27 00:54:40.329518 +0000 UTC",
  208. "partition": "aws"
  209. }
  210. }
  211. ]
  212. },
  213. {
  214. "module": "module.mdradmin-bootstrap",
  215. "mode": "data",
  216. "type": "aws_region",
  217. "name": "current",
  218. "provider": "provider.aws",
  219. "instances": [
  220. {
  221. "schema_version": 0,
  222. "attributes": {
  223. "current": null,
  224. "description": "US East (N. Virginia)",
  225. "endpoint": "ec2.us-east-1.amazonaws.com",
  226. "id": "us-east-1",
  227. "name": "us-east-1"
  228. }
  229. }
  230. ]
  231. },
  232. {
  233. "module": "module.mdradmin-bootstrap",
  234. "mode": "managed",
  235. "type": "aws_iam_policy",
  236. "name": "mdradmin_tfstate_setup",
  237. "provider": "provider.aws",
  238. "instances": [
  239. {
  240. "schema_version": 0,
  241. "attributes": {
  242. "arn": "arn:aws:iam::471284459109:policy/bootstrap/mdradmmin_tfstate_setup",
  243. "description": "Gives MDRAdmin account rights needed to set up tfstate management",
  244. "id": "arn:aws:iam::471284459109:policy/bootstrap/mdradmmin_tfstate_setup",
  245. "name": "mdradmmin_tfstate_setup",
  246. "name_prefix": null,
  247. "path": "/bootstrap/",
  248. "policy": "{\n \"Version\": \"2012-10-17\",\n \"Statement\": [\n {\n \"Sid\": \"DynamoDBTablesAndLocking\",\n \"Effect\": \"Allow\",\n \"Action\": \"dynamodb:*\",\n \"Resource\": \"arn:aws:dynamodb:us-east-1:471284459109:table/afsxdr-terraform-state\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"DynamoDBTablesAndLocking2\",\n \"Effect\": \"Allow\",\n \"Action\": \"dynamodb:ListTables\",\n \"Resource\": \"arn:aws:dynamodb:us-east-1:471284459109:table/*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"KMSKeyCreate\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:List*\",\n \"kms:DeleteKey\",\n \"kms:DeleteAlias\",\n \"kms:CreateKey\",\n \"kms:CreateAlias\"\n ],\n \"Resource\": \"*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3AllResources\",\n \"Effect\": \"Allow\",\n \"Action\": \"s3:HeadBucket\",\n \"Resource\": \"*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3ManageStateBucket\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:Put*\",\n \"s3:ListBucket\",\n \"s3:Get*\",\n \"s3:DeleteBucket\",\n \"s3:CreateBucket\"\n ],\n \"Resource\": \"arn:aws:s3:::afsxdr-terraform-state\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n },\n {\n \"Sid\": \"S3ObjectOperations\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"s3:PutObject*\",\n \"s3:GetObject*\",\n \"s3:DeleteObject*\"\n ],\n \"Resource\": \"arn:aws:s3:::afsxdr-terraform-state/*\",\n \"Condition\": {\n \"BoolIfExists\": {\n \"aws:MultiFactorAuthPresent\": \"true\"\n }\n }\n }\n ]\n}"
  249. },
  250. "private": "bnVsbA=="
  251. }
  252. ]
  253. },
  254. {
  255. "module": "module.mdradmin-bootstrap",
  256. "mode": "managed",
  257. "type": "aws_iam_user_policy_attachment",
  258. "name": "this",
  259. "each": "map",
  260. "provider": "provider.aws",
  261. "instances": [
  262. {
  263. "index_key": "MDRAdmin",
  264. "schema_version": 0,
  265. "attributes": {
  266. "id": "MDRAdmin-20200525151630712700000001",
  267. "policy_arn": "arn:aws:iam::471284459109:policy/bootstrap/mdradmmin_tfstate_setup",
  268. "user": "MDRAdmin"
  269. },
  270. "private": "bnVsbA==",
  271. "dependencies": [
  272. "module.mdradmin-bootstrap.aws_iam_policy.mdradmin_tfstate_setup"
  273. ]
  274. }
  275. ]
  276. }
  277. ]
  278. }