terraform.tfstate 15 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398
  1. {
  2. "version": 4,
  3. "terraform_version": "0.12.26",
  4. "serial": 9,
  5. "lineage": "98e5e789-5a16-5c08-b9f6-7e8cb242c2a4",
  6. "outputs": {},
  7. "resources": [
  8. {
  9. "module": "module.tfstate",
  10. "mode": "data",
  11. "type": "aws_caller_identity",
  12. "name": "current",
  13. "provider": "provider.aws",
  14. "instances": [
  15. {
  16. "schema_version": 0,
  17. "attributes": {
  18. "account_id": "701290387780",
  19. "arn": "arn:aws-us-gov:sts::701290387780:assumed-role/mdr_terraformer/terraform",
  20. "id": "2020-07-07 14:04:14.074532 +0000 UTC",
  21. "user_id": "AROA2GSBKDFCIT5IHVMAA:terraform"
  22. }
  23. }
  24. ]
  25. },
  26. {
  27. "module": "module.tfstate",
  28. "mode": "data",
  29. "type": "aws_iam_policy_document",
  30. "name": "kms_key_policy_tfstate",
  31. "provider": "provider.aws",
  32. "instances": [
  33. {
  34. "schema_version": 0,
  35. "attributes": {
  36. "id": "3988755204",
  37. "json": "{\n \"Version\": \"2012-10-17\",\n \"Id\": \"key-consolepolicy-3\",\n \"Statement\": [\n {\n \"Sid\": \"Enable IAM User Permissions\",\n \"Effect\": \"Allow\",\n \"Action\": \"kms:*\",\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws-us-gov:iam::701290387780:root\"\n }\n },\n {\n \"Sid\": \"Allow access for Key Administrators\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:Update*\",\n \"kms:UntagResource\",\n \"kms:TagResource\",\n \"kms:ScheduleKeyDeletion\",\n \"kms:Revoke*\",\n \"kms:Put*\",\n \"kms:List*\",\n \"kms:Get*\",\n \"kms:Enable*\",\n \"kms:Disable*\",\n \"kms:Describe*\",\n \"kms:Delete*\",\n \"kms:Create*\",\n \"kms:CancelKeyDeletion\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"\n }\n },\n {\n \"Sid\": \"Allow use of the key\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:ReEncrypt*\",\n \"kms:GenerateDataKey*\",\n \"kms:Encrypt\",\n \"kms:DescribeKey\",\n \"kms:Decrypt\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"\n }\n },\n {\n \"Sid\": \"Allow attachment of persistent resources\",\n \"Effect\": \"Allow\",\n \"Action\": [\n \"kms:RevokeGrant\",\n \"kms:ListGrants\",\n \"kms:CreateGrant\"\n ],\n \"Resource\": \"*\",\n \"Principal\": {\n \"AWS\": \"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"\n },\n \"Condition\": {\n \"Bool\": {\n \"kms:GrantIsForAWSResource\": \"true\"\n }\n }\n }\n ]\n}",
  38. "override_json": null,
  39. "policy_id": "key-consolepolicy-3",
  40. "source_json": null,
  41. "statement": [
  42. {
  43. "actions": [
  44. "kms:*"
  45. ],
  46. "condition": [],
  47. "effect": "Allow",
  48. "not_actions": [],
  49. "not_principals": [],
  50. "not_resources": [],
  51. "principals": [
  52. {
  53. "identifiers": [
  54. "arn:aws-us-gov:iam::701290387780:root"
  55. ],
  56. "type": "AWS"
  57. }
  58. ],
  59. "resources": [
  60. "*"
  61. ],
  62. "sid": "Enable IAM User Permissions"
  63. },
  64. {
  65. "actions": [
  66. "kms:CancelKeyDeletion",
  67. "kms:Create*",
  68. "kms:Delete*",
  69. "kms:Describe*",
  70. "kms:Disable*",
  71. "kms:Enable*",
  72. "kms:Get*",
  73. "kms:List*",
  74. "kms:Put*",
  75. "kms:Revoke*",
  76. "kms:ScheduleKeyDeletion",
  77. "kms:TagResource",
  78. "kms:UntagResource",
  79. "kms:Update*"
  80. ],
  81. "condition": [],
  82. "effect": "Allow",
  83. "not_actions": [],
  84. "not_principals": [],
  85. "not_resources": [],
  86. "principals": [
  87. {
  88. "identifiers": [
  89. "arn:aws-us-gov:iam::701290387780:user/MDRAdmin"
  90. ],
  91. "type": "AWS"
  92. }
  93. ],
  94. "resources": [
  95. "*"
  96. ],
  97. "sid": "Allow access for Key Administrators"
  98. },
  99. {
  100. "actions": [
  101. "kms:Decrypt",
  102. "kms:DescribeKey",
  103. "kms:Encrypt",
  104. "kms:GenerateDataKey*",
  105. "kms:ReEncrypt*"
  106. ],
  107. "condition": [],
  108. "effect": "Allow",
  109. "not_actions": [],
  110. "not_principals": [],
  111. "not_resources": [],
  112. "principals": [
  113. {
  114. "identifiers": [
  115. "arn:aws-us-gov:iam::701290387780:user/MDRAdmin"
  116. ],
  117. "type": "AWS"
  118. }
  119. ],
  120. "resources": [
  121. "*"
  122. ],
  123. "sid": "Allow use of the key"
  124. },
  125. {
  126. "actions": [
  127. "kms:CreateGrant",
  128. "kms:ListGrants",
  129. "kms:RevokeGrant"
  130. ],
  131. "condition": [
  132. {
  133. "test": "Bool",
  134. "values": [
  135. "true"
  136. ],
  137. "variable": "kms:GrantIsForAWSResource"
  138. }
  139. ],
  140. "effect": "Allow",
  141. "not_actions": [],
  142. "not_principals": [],
  143. "not_resources": [],
  144. "principals": [
  145. {
  146. "identifiers": [
  147. "arn:aws-us-gov:iam::701290387780:user/MDRAdmin"
  148. ],
  149. "type": "AWS"
  150. }
  151. ],
  152. "resources": [
  153. "*"
  154. ],
  155. "sid": "Allow attachment of persistent resources"
  156. }
  157. ],
  158. "version": "2012-10-17"
  159. }
  160. }
  161. ]
  162. },
  163. {
  164. "module": "module.tfstate",
  165. "mode": "data",
  166. "type": "aws_partition",
  167. "name": "current",
  168. "provider": "provider.aws",
  169. "instances": [
  170. {
  171. "schema_version": 0,
  172. "attributes": {
  173. "dns_suffix": "amazonaws.com",
  174. "id": "2020-07-07 14:04:13.787107 +0000 UTC",
  175. "partition": "aws-us-gov"
  176. }
  177. }
  178. ]
  179. },
  180. {
  181. "module": "module.tfstate",
  182. "mode": "managed",
  183. "type": "aws_dynamodb_table",
  184. "name": "lock_table",
  185. "provider": "provider.aws",
  186. "instances": [
  187. {
  188. "schema_version": 1,
  189. "attributes": {
  190. "arn": "arn:aws-us-gov:dynamodb:us-gov-east-1:701290387780:table/afsxdr-terraform-state",
  191. "attribute": [
  192. {
  193. "name": "LockID",
  194. "type": "S"
  195. }
  196. ],
  197. "billing_mode": "PAY_PER_REQUEST",
  198. "global_secondary_index": [],
  199. "hash_key": "LockID",
  200. "id": "afsxdr-terraform-state",
  201. "local_secondary_index": [],
  202. "name": "afsxdr-terraform-state",
  203. "point_in_time_recovery": [
  204. {
  205. "enabled": false
  206. }
  207. ],
  208. "range_key": null,
  209. "read_capacity": 0,
  210. "replica": [],
  211. "server_side_encryption": [
  212. {
  213. "enabled": true,
  214. "kms_key_arn": "arn:aws-us-gov:kms:us-gov-east-1:701290387780:key/dddb424f-ebdd-416e-8772-3fc18aa81cb7"
  215. }
  216. ],
  217. "stream_arn": "",
  218. "stream_enabled": false,
  219. "stream_label": "",
  220. "stream_view_type": "",
  221. "tags": {
  222. "Name": "afsxdr-terraform-state"
  223. },
  224. "timeouts": null,
  225. "ttl": [
  226. {
  227. "attribute_name": "",
  228. "enabled": false
  229. }
  230. ],
  231. "write_capacity": 0
  232. },
  233. "private": "eyJlMmJmYjczMC1lY2FhLTExZTYtOGY4OC0zNDM2M2JjN2M0YzAiOnsiY3JlYXRlIjo2MDAwMDAwMDAwMDAsImRlbGV0ZSI6NjAwMDAwMDAwMDAwLCJ1cGRhdGUiOjM2MDAwMDAwMDAwMDB9LCJzY2hlbWFfdmVyc2lvbiI6IjEifQ==",
  234. "dependencies": [
  235. "module.tfstate.aws_kms_key.tfstate"
  236. ]
  237. }
  238. ]
  239. },
  240. {
  241. "module": "module.tfstate",
  242. "mode": "managed",
  243. "type": "aws_kms_alias",
  244. "name": "tfstate",
  245. "provider": "provider.aws",
  246. "instances": [
  247. {
  248. "schema_version": 0,
  249. "attributes": {
  250. "arn": "arn:aws-us-gov:kms:us-gov-east-1:701290387780:alias/tfstate",
  251. "id": "alias/tfstate",
  252. "name": "alias/tfstate",
  253. "name_prefix": null,
  254. "target_key_arn": "arn:aws-us-gov:kms:us-gov-east-1:701290387780:key/dddb424f-ebdd-416e-8772-3fc18aa81cb7",
  255. "target_key_id": "dddb424f-ebdd-416e-8772-3fc18aa81cb7"
  256. },
  257. "private": "bnVsbA==",
  258. "dependencies": [
  259. "module.tfstate.aws_kms_key.tfstate"
  260. ]
  261. }
  262. ]
  263. },
  264. {
  265. "module": "module.tfstate",
  266. "mode": "managed",
  267. "type": "aws_kms_key",
  268. "name": "tfstate",
  269. "provider": "provider.aws",
  270. "instances": [
  271. {
  272. "schema_version": 0,
  273. "attributes": {
  274. "arn": "arn:aws-us-gov:kms:us-gov-east-1:701290387780:key/dddb424f-ebdd-416e-8772-3fc18aa81cb7",
  275. "customer_master_key_spec": "SYMMETRIC_DEFAULT",
  276. "deletion_window_in_days": 30,
  277. "description": "tfstate bucket default S3 SSE-KMS",
  278. "enable_key_rotation": true,
  279. "id": "dddb424f-ebdd-416e-8772-3fc18aa81cb7",
  280. "is_enabled": true,
  281. "key_id": "dddb424f-ebdd-416e-8772-3fc18aa81cb7",
  282. "key_usage": "ENCRYPT_DECRYPT",
  283. "policy": "{\"Id\":\"key-consolepolicy-3\",\"Statement\":[{\"Action\":\"kms:*\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws-us-gov:iam::701290387780:root\"},\"Resource\":\"*\",\"Sid\":\"Enable IAM User Permissions\"},{\"Action\":[\"kms:Update*\",\"kms:UntagResource\",\"kms:TagResource\",\"kms:ScheduleKeyDeletion\",\"kms:Revoke*\",\"kms:Put*\",\"kms:List*\",\"kms:Get*\",\"kms:Enable*\",\"kms:Disable*\",\"kms:Describe*\",\"kms:Delete*\",\"kms:Create*\",\"kms:CancelKeyDeletion\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"},\"Resource\":\"*\",\"Sid\":\"Allow access for Key Administrators\"},{\"Action\":[\"kms:ReEncrypt*\",\"kms:GenerateDataKey*\",\"kms:Encrypt\",\"kms:DescribeKey\",\"kms:Decrypt\"],\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"},\"Resource\":\"*\",\"Sid\":\"Allow use of the key\"},{\"Action\":[\"kms:RevokeGrant\",\"kms:ListGrants\",\"kms:CreateGrant\"],\"Condition\":{\"Bool\":{\"kms:GrantIsForAWSResource\":\"true\"}},\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws-us-gov:iam::701290387780:user/MDRAdmin\"},\"Resource\":\"*\",\"Sid\":\"Allow attachment of persistent resources\"}],\"Version\":\"2012-10-17\"}",
  284. "tags": {}
  285. },
  286. "private": "bnVsbA=="
  287. }
  288. ]
  289. },
  290. {
  291. "module": "module.tfstate",
  292. "mode": "managed",
  293. "type": "aws_s3_bucket",
  294. "name": "tfstate",
  295. "provider": "provider.aws",
  296. "instances": [
  297. {
  298. "schema_version": 0,
  299. "attributes": {
  300. "acceleration_status": "",
  301. "acl": "private",
  302. "arn": "arn:aws-us-gov:s3:::afsxdr-terraform-state",
  303. "bucket": "afsxdr-terraform-state",
  304. "bucket_domain_name": "afsxdr-terraform-state.s3.amazonaws.com",
  305. "bucket_prefix": null,
  306. "bucket_regional_domain_name": "afsxdr-terraform-state.s3.us-gov-east-1.amazonaws.com",
  307. "cors_rule": [],
  308. "force_destroy": false,
  309. "grant": [],
  310. "hosted_zone_id": "Z31GFT0UA1I2HV",
  311. "id": "afsxdr-terraform-state",
  312. "lifecycle_rule": [
  313. {
  314. "abort_incomplete_multipart_upload_days": 7,
  315. "enabled": true,
  316. "expiration": [],
  317. "id": "tf-s3-lifecycle-20200610174352244400000001",
  318. "noncurrent_version_expiration": [
  319. {
  320. "days": 730
  321. }
  322. ],
  323. "noncurrent_version_transition": [
  324. {
  325. "days": 30,
  326. "storage_class": "STANDARD_IA"
  327. }
  328. ],
  329. "prefix": "",
  330. "tags": {},
  331. "transition": []
  332. }
  333. ],
  334. "logging": [],
  335. "object_lock_configuration": [],
  336. "policy": null,
  337. "region": "us-gov-east-1",
  338. "replication_configuration": [],
  339. "request_payer": "BucketOwner",
  340. "server_side_encryption_configuration": [
  341. {
  342. "rule": [
  343. {
  344. "apply_server_side_encryption_by_default": [
  345. {
  346. "kms_master_key_id": "arn:aws-us-gov:kms:us-gov-east-1:701290387780:key/dddb424f-ebdd-416e-8772-3fc18aa81cb7",
  347. "sse_algorithm": "aws:kms"
  348. }
  349. ]
  350. }
  351. ]
  352. }
  353. ],
  354. "tags": {},
  355. "versioning": [
  356. {
  357. "enabled": true,
  358. "mfa_delete": false
  359. }
  360. ],
  361. "website": [],
  362. "website_domain": null,
  363. "website_endpoint": null
  364. },
  365. "private": "bnVsbA==",
  366. "dependencies": [
  367. "module.tfstate.aws_kms_key.tfstate"
  368. ]
  369. }
  370. ]
  371. },
  372. {
  373. "module": "module.tfstate",
  374. "mode": "managed",
  375. "type": "aws_s3_bucket_public_access_block",
  376. "name": "tfstate",
  377. "provider": "provider.aws",
  378. "instances": [
  379. {
  380. "schema_version": 0,
  381. "attributes": {
  382. "block_public_acls": true,
  383. "block_public_policy": true,
  384. "bucket": "afsxdr-terraform-state",
  385. "id": "afsxdr-terraform-state",
  386. "ignore_public_acls": true,
  387. "restrict_public_buckets": true
  388. },
  389. "private": "bnVsbA==",
  390. "dependencies": [
  391. "module.tfstate.aws_kms_key.tfstate",
  392. "module.tfstate.aws_s3_bucket.tfstate"
  393. ]
  394. }
  395. ]
  396. }
  397. ]
  398. }