terraform.tfstate 16 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404
  1. {
  2. "version": 4,
  3. "terraform_version": "0.12.25",
  4. "serial": 62,
  5. "lineage": "a5b3f3fc-da94-9f2f-5793-230f4da09eb8",
  6. "outputs": {},
  7. "resources": [
  8. {
  9. "module": "module.tfstate",
  10. "mode": "data",
  11. "type": "aws_caller_identity",
  12. "name": "current",
  13. "provider": "provider.aws",
  14. "instances": [
  15. {
  16. "schema_version": 0,
  17. "attributes": {
  18. "account_id": "471284459109",
  19. "arn": "arn:aws:iam::471284459109:user/MDRAdmin",
  20. "id": "2020-05-26 02:14:19.837763 +0000 UTC",
  21. "user_id": "AIDAW3OV6EZS5DFJAO7CP"
  22. }
  23. }
  24. ]
  25. },
  26. {
  27. "module": "module.tfstate",
  28. "mode": "data",
  29. "type": "aws_iam_policy_document",
  30. "name": "kms_key_policy_tfstate",
  31. "provider": "provider.aws",
  32. "instances": [
  33. {
  34. "schema_version": 0,
  35. "attributes": {
  36. "id": "716496905",
  37. "json": "{\n \"Version\": \"2012-10-17\",\n \"Id\": \"key-consolepolicy-3\",\n \"Statement\": [\n {\n \"Sid\": \"Enable IAM User Permissions\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws:iam::471284459109:root\"\n }\n },\n {\n \"Sid\": \"Allow access for Key Administrators\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:Update*\",\n \"kms:UntagResource\",\n \"kms:TagResource\",\n \"kms:ScheduleKeyDeletion\",\n \"kms:Revoke*\",\n \"kms:Put*\",\n \"kms:List*\",\n \"kms:Get*\",\n \"kms:Enable*\",\n \"kms:Disable*\",\n \"kms:Describe*\",\n \"kms:Delete*\",\n \"kms:Create*\",\n \"kms:CancelKeyDeletion\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::471284459109:user/MDRAdmin\",\n \"arn:aws:iam::471284459109:role/user/mdr_iam_admin\",\n \"arn:aws:iam::471284459109:role/user/mdr_engineer\"\n ]\n }\n },\n {\n \"Sid\": \"Allow use of the key\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::471284459109:user/MDRAdmin\",\n \"arn:aws:iam::471284459109:role/user/mdr_iam_admin\",\n \"arn:aws:iam::471284459109:role/user/mdr_engineer\"\n ]\n }\n },\n {\n \"Sid\": \"Allow attachment of persistent resources\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:RevokeGrant\",\n \"kms:ListGrants\",\n \"kms:CreateGrant\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": [\n \"arn:aws:iam::471284459109:user/MDRAdmin\",\n \"arn:aws:iam::471284459109:role/user/mdr_iam_admin\",\n \"arn:aws:iam::471284459109:role/user/mdr_engineer\"\n ]\n },\n \"Condition\": {\n \"Bool\": {\n \"kms:GrantIsForAWSResource\": \"true\"\n }\n }\n }\n ]\n}",
  38. "override_json": null,
  39. "policy_id": "key-consolepolicy-3",
  40. "source_json": null,
  41. "statement": [
  42. {
  43. "actions": [
  44. "kms:*"
  45. ],
  46. "condition": [],
  47. "effect": "Allow",
  48. "not_actions": [],
  49. "not_principals": [],
  50. "not_resources": [],
  51. "principals": [
  52. {
  53. "identifiers": [
  54. "arn:aws:iam::471284459109:root"
  55. ],
  56. "type": "AWS"
  57. }
  58. ],
  59. "resources": [
  60. "*"
  61. ],
  62. "sid": "Enable IAM User Permissions"
  63. },
  64. {
  65. "actions": [
  66. "kms:CancelKeyDeletion",
  67. "kms:Create*",
  68. "kms:Delete*",
  69. "kms:Describe*",
  70. "kms:Disable*",
  71. "kms:Enable*",
  72. "kms:Get*",
  73. "kms:List*",
  74. "kms:Put*",
  75. "kms:Revoke*",
  76. "kms:ScheduleKeyDeletion",
  77. "kms:TagResource",
  78. "kms:UntagResource",
  79. "kms:Update*"
  80. ],
  81. "condition": [],
  82. "effect": "Allow",
  83. "not_actions": [],
  84. "not_principals": [],
  85. "not_resources": [],
  86. "principals": [
  87. {
  88. "identifiers": [
  89. "arn:aws:iam::471284459109:role/user/mdr_engineer",
  90. "arn:aws:iam::471284459109:role/user/mdr_iam_admin",
  91. "arn:aws:iam::471284459109:user/MDRAdmin"
  92. ],
  93. "type": "AWS"
  94. }
  95. ],
  96. "resources": [
  97. "*"
  98. ],
  99. "sid": "Allow access for Key Administrators"
  100. },
  101. {
  102. "actions": [
  103. "kms:Decrypt",
  104. "kms:DescribeKey",
  105. "kms:Encrypt",
  106. "kms:GenerateDataKey*",
  107. "kms:ReEncrypt*"
  108. ],
  109. "condition": [],
  110. "effect": "Allow",
  111. "not_actions": [],
  112. "not_principals": [],
  113. "not_resources": [],
  114. "principals": [
  115. {
  116. "identifiers": [
  117. "arn:aws:iam::471284459109:role/user/mdr_engineer",
  118. "arn:aws:iam::471284459109:role/user/mdr_iam_admin",
  119. "arn:aws:iam::471284459109:user/MDRAdmin"
  120. ],
  121. "type": "AWS"
  122. }
  123. ],
  124. "resources": [
  125. "*"
  126. ],
  127. "sid": "Allow use of the key"
  128. },
  129. {
  130. "actions": [
  131. "kms:CreateGrant",
  132. "kms:ListGrants",
  133. "kms:RevokeGrant"
  134. ],
  135. "condition": [
  136. {
  137. "test": "Bool",
  138. "values": [
  139. "true"
  140. ],
  141. "variable": "kms:GrantIsForAWSResource"
  142. }
  143. ],
  144. "effect": "Allow",
  145. "not_actions": [],
  146. "not_principals": [],
  147. "not_resources": [],
  148. "principals": [
  149. {
  150. "identifiers": [
  151. "arn:aws:iam::471284459109:role/user/mdr_engineer",
  152. "arn:aws:iam::471284459109:role/user/mdr_iam_admin",
  153. "arn:aws:iam::471284459109:user/MDRAdmin"
  154. ],
  155. "type": "AWS"
  156. }
  157. ],
  158. "resources": [
  159. "*"
  160. ],
  161. "sid": "Allow attachment of persistent resources"
  162. }
  163. ],
  164. "version": "2012-10-17"
  165. }
  166. }
  167. ]
  168. },
  169. {
  170. "module": "module.tfstate",
  171. "mode": "data",
  172. "type": "aws_partition",
  173. "name": "current",
  174. "provider": "provider.aws",
  175. "instances": [
  176. {
  177. "schema_version": 0,
  178. "attributes": {
  179. "dns_suffix": "amazonaws.com",
  180. "id": "2020-05-26 02:14:19.583075 +0000 UTC",
  181. "partition": "aws"
  182. }
  183. }
  184. ]
  185. },
  186. {
  187. "module": "module.tfstate",
  188. "mode": "managed",
  189. "type": "aws_dynamodb_table",
  190. "name": "lock_table",
  191. "provider": "provider.aws",
  192. "instances": [
  193. {
  194. "schema_version": 1,
  195. "attributes": {
  196. "arn": "arn:aws:dynamodb:us-east-1:471284459109:table/afsxdr-terraform-state",
  197. "attribute": [
  198. {
  199. "name": "LockID",
  200. "type": "S"
  201. }
  202. ],
  203. "billing_mode": "PAY_PER_REQUEST",
  204. "global_secondary_index": [],
  205. "hash_key": "LockID",
  206. "id": "afsxdr-terraform-state",
  207. "local_secondary_index": [],
  208. "name": "afsxdr-terraform-state",
  209. "point_in_time_recovery": [
  210. {
  211. "enabled": false
  212. }
  213. ],
  214. "range_key": null,
  215. "read_capacity": 0,
  216. "replica": [],
  217. "server_side_encryption": [
  218. {
  219. "enabled": true,
  220. "kms_key_arn": "arn:aws:kms:us-east-1:471284459109:key/5f348d15-d45c-434a-99ee-362970e0e5b0"
  221. }
  222. ],
  223. "stream_arn": "",
  224. "stream_enabled": false,
  225. "stream_label": "",
  226. "stream_view_type": "",
  227. "tags": {
  228. "Name": "afsxdr-terraform-state"
  229. },
  230. "timeouts": null,
  231. "ttl": [
  232. {
  233. "attribute_name": "",
  234. "enabled": false
  235. }
  236. ],
  237. "write_capacity": 0
  238. },
  239. "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjM2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==",
  240. "dependencies": [
  241. "module.tfstate.aws_kms_key.tfstate"
  242. ]
  243. }
  244. ]
  245. },
  246. {
  247. "module": "module.tfstate",
  248. "mode": "managed",
  249. "type": "aws_kms_alias",
  250. "name": "tfstate",
  251. "provider": "provider.aws",
  252. "instances": [
  253. {
  254. "schema_version": 0,
  255. "attributes": {
  256. "arn": "arn:aws:kms:us-east-1:471284459109:alias/tfstate",
  257. "id": "alias/tfstate",
  258. "name": "alias/tfstate",
  259. "name_prefix": null,
  260. "target_key_arn": "arn:aws:kms:us-east-1:471284459109:key/5f348d15-d45c-434a-99ee-362970e0e5b0",
  261. "target_key_id": "5f348d15-d45c-434a-99ee-362970e0e5b0"
  262. },
  263. "private": "bnVsbA==",
  264. "dependencies": [
  265. "module.tfstate.aws_kms_key.tfstate"
  266. ]
  267. }
  268. ]
  269. },
  270. {
  271. "module": "module.tfstate",
  272. "mode": "managed",
  273. "type": "aws_kms_key",
  274. "name": "tfstate",
  275. "provider": "provider.aws",
  276. "instances": [
  277. {
  278. "schema_version": 0,
  279. "attributes": {
  280. "arn": "arn:aws:kms:us-east-1:471284459109:key/5f348d15-d45c-434a-99ee-362970e0e5b0",
  281. "customer_master_key_spec": "SYMMETRIC_DEFAULT",
  282. "deletion_window_in_days": 30,
  283. "description": "tfstate bucket default S3 SSE-KMS",
  284. "enable_key_rotation": true,
  285. "id": "5f348d15-d45c-434a-99ee-362970e0e5b0",
  286. "is_enabled": true,
  287. "key_id": "5f348d15-d45c-434a-99ee-362970e0e5b0",
  288. "key_usage": "ENCRYPT_DECRYPT",
  289. "policy": "{\"Id\":\"key-consolepolicy-3\",\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::471284459109:root\"},\"Resource\":\"*\",\"Sid\":\"Enable IAM User Permissions\"},{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:Put*\",\"kms:List*\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::471284459109:role/user/mdr_engineer\",\"arn:aws:iam::471284459109:user/MDRAdmin\",\"arn:aws:iam::471284459109:role/user/mdr_iam_admin\"]},\"Resource\":\"*\",\"Sid\":\"Allow access for Key Administrators\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::471284459109:role/user/mdr_engineer\",\"arn:aws:iam::471284459109:user/MDRAdmin\",\"arn:aws:iam::471284459109:role/user/mdr_iam_admin\"]},\"Resource\":\"*\",\"Sid\":\"Allow use of the key\"},{\"Action\":[\"kms:RevokeGrant\",\"kms:ListGrants\",\"kms:CreateGrant\"],\"Condition\":{\"Bool\":{\"kms:GrantIsForAWSResource\":\"true\"}},\"Effect\":\"Allow\",\"Principal\":{\"AWS\":[\"arn:aws:iam::471284459109:role/user/mdr_engineer\",\"arn:aws:iam::471284459109:user/MDRAdmin\",\"arn:aws:iam::471284459109:role/user/mdr_iam_admin\"]},\"Resource\":\"*\",\"Sid\":\"Allow attachment of persistent resources\"}],\"Version\":\"2012-10-17\"}",
  290. "tags": null
  291. },
  292. "private": "bnVsbA=="
  293. }
  294. ]
  295. },
  296. {
  297. "module": "module.tfstate",
  298. "mode": "managed",
  299. "type": "aws_s3_bucket",
  300. "name": "tfstate",
  301. "provider": "provider.aws",
  302. "instances": [
  303. {
  304. "schema_version": 0,
  305. "attributes": {
  306. "acceleration_status": "",
  307. "acl": "private",
  308. "arn": "arn:aws:s3:::afsxdr-terraform-state",
  309. "bucket": "afsxdr-terraform-state",
  310. "bucket_domain_name": "afsxdr-terraform-state.s3.amazonaws.com",
  311. "bucket_prefix": null,
  312. "bucket_regional_domain_name": "afsxdr-terraform-state.s3.amazonaws.com",
  313. "cors_rule": [],
  314. "force_destroy": false,
  315. "grant": [],
  316. "hosted_zone_id": "Z3AQBSTGFYJSTF",
  317. "id": "afsxdr-terraform-state",
  318. "lifecycle_rule": [
  319. {
  320. "abort_incomplete_multipart_upload_days": 7,
  321. "enabled": true,
  322. "expiration": [],
  323. "id": "tf-s3-lifecycle-20200526021436652500000001",
  324. "noncurrent_version_expiration": [
  325. {
  326. "days": 730
  327. }
  328. ],
  329. "noncurrent_version_transition": [
  330. {
  331. "days": 30,
  332. "storage_class": "STANDARD_IA"
  333. }
  334. ],
  335. "prefix": "",
  336. "tags": null,
  337. "transition": []
  338. }
  339. ],
  340. "logging": [],
  341. "object_lock_configuration": [],
  342. "policy": null,
  343. "region": "us-east-1",
  344. "replication_configuration": [],
  345. "request_payer": "BucketOwner",
  346. "server_side_encryption_configuration": [
  347. {
  348. "rule": [
  349. {
  350. "apply_server_side_encryption_by_default": [
  351. {
  352. "kms_master_key_id": "arn:aws:kms:us-east-1:471284459109:key/5f348d15-d45c-434a-99ee-362970e0e5b0",
  353. "sse_algorithm": "aws:kms"
  354. }
  355. ]
  356. }
  357. ]
  358. }
  359. ],
  360. "tags": null,
  361. "versioning": [
  362. {
  363. "enabled": true,
  364. "mfa_delete": false
  365. }
  366. ],
  367. "website": [],
  368. "website_domain": null,
  369. "website_endpoint": null
  370. },
  371. "private": "bnVsbA==",
  372. "dependencies": [
  373. "module.tfstate.aws_kms_key.tfstate"
  374. ]
  375. }
  376. ]
  377. },
  378. {
  379. "module": "module.tfstate",
  380. "mode": "managed",
  381. "type": "aws_s3_bucket_public_access_block",
  382. "name": "tfstate",
  383. "provider": "provider.aws",
  384. "instances": [
  385. {
  386. "schema_version": 0,
  387. "attributes": {
  388. "block_public_acls": true,
  389. "block_public_policy": true,
  390. "bucket": "afsxdr-terraform-state",
  391. "id": "afsxdr-terraform-state",
  392. "ignore_public_acls": true,
  393. "restrict_public_buckets": true
  394. },
  395. "private": "bnVsbA==",
  396. "dependencies": [
  397. "module.tfstate.aws_kms_key.tfstate",
  398. "module.tfstate.aws_s3_bucket.tfstate"
  399. ]
  400. }
  401. ]
  402. }
  403. ]
  404. }