Skip to content

Commit 12b83a8

Browse files
author
Chris Every
authored
Merge pull request #274 from ovotech/improve-tf-module-perms
Improve tf module perms
2 parents 1816454 + c2a7cd0 commit 12b83a8

File tree

4 files changed

+58
-17
lines changed

4 files changed

+58
-17
lines changed

tf_module/README.md

+8-6
Original file line numberDiff line numberDiff line change
@@ -29,14 +29,16 @@ provider "aws" {
2929
3030
module "cloud-key-rotator" {
3131
source = "terraform.ovotech.org.uk/pe/ckr/aws"
32-
version = "0.0.5"
33-
ckr_version = "0.27.18"
32+
version = "0.1.0"
33+
ckr_version = "0.27.28"
3434
}
3535
```
3636

3737
## Variables
3838

39-
* `version = "0.0.5"` -> The Terraform module version to use
40-
* `ckr_version = "0.27.18"` -> The Cloud Key Rotator binary version to use
41-
* (Optional) `ckr_schedule = "cron(0 10 ? * MON-FRI *)"` -> defaults to triggering 10am Monday-Friday
42-
* (OptionaL) `config_data = <string>` -> Pass a json blob from any source containing your config file.
39+
* `version = "0.1.0"` -> The Terraform module version to use.
40+
* `ckr_version = "0.27.28"` -> The Cloud Key Rotator binary version to use.
41+
* (Optional) `ckr_schedule = "cron(0 10 ? * MON-FRI *)"` -> Defaults to triggering 10am Monday-Friday.
42+
* (Optional) `config_data = <string>` -> Pass a json blob from any source containing your config file.
43+
* (Optional) `enable_ssm_location = false` -> Whether to create an IAM policy allowing `ssm:PutParameter`.
44+
Set this to `true` if using SSM as a `cloud-key-rotator` location.

tf_module/ckr/main.tf

+44-10
Original file line numberDiff line numberDiff line change
@@ -56,8 +56,10 @@ resource "aws_iam_policy" "ckr_log_policy" {
5656
EOF
5757
}
5858

59-
59+
# SSM is a valid location of the cloud-key-rotator, so allow ssm:PutParameter
60+
# if enabled
6061
resource "aws_iam_policy" "ckr_ssm_policy" {
62+
count = var.enable_ssm_location ? 1 : 0
6163
name = "CloudKeyRotatorSsmPolicy"
6264
path = "/"
6365

@@ -79,30 +81,62 @@ resource "aws_iam_policy" "ckr_ssm_policy" {
7981
EOF
8082
}
8183

84+
resource "aws_iam_policy" "ckr_policy" {
85+
name = "CloudKeyRotatorPolicy"
86+
path = "/"
87+
policy = jsonencode(
88+
{
89+
Statement = [
90+
{
91+
Action = [
92+
"iam:DeleteAccessKey",
93+
"iam:CreateAccessKey",
94+
"iam:ListAccessKeys",
95+
]
96+
Effect = "Allow"
97+
Resource = [
98+
"arn:aws:iam::*:user/*",
99+
]
100+
},
101+
{
102+
Action = "iam:ListUsers"
103+
Effect = "Allow"
104+
Resource = "arn:aws:iam::*:*"
105+
},
106+
{
107+
Action = "secretsmanager:GetSecretValue"
108+
Effect = "Allow"
109+
Resource = [
110+
aws_secretsmanager_secret.ckr-config.arn,
111+
]
112+
},
113+
]
114+
Version = "2012-10-17"
115+
}
116+
)
117+
}
82118

83119
resource "aws_iam_role_policy_attachment" "attach-ckr-log-policy" {
84120
role = aws_iam_role.cloudkeyrotator_role.name
85121
policy_arn = aws_iam_policy.ckr_log_policy.arn
86122
}
87123

88-
resource "aws_iam_role_policy_attachment" "attach-ckr-iam-policy" {
89-
role = aws_iam_role.cloudkeyrotator_role.name
90-
policy_arn = "arn:aws:iam::aws:policy/IAMFullAccess"
91-
}
92-
resource "aws_iam_role_policy_attachment" "attach-ckr-secret-policy" {
124+
resource "aws_iam_role_policy_attachment" "attach-ckr-policy" {
93125
role = aws_iam_role.cloudkeyrotator_role.name
94-
policy_arn = "arn:aws:iam::aws:policy/SecretsManagerReadWrite"
126+
policy_arn = aws_iam_policy.ckr_policy.arn
95127
}
96128

129+
# only create ssm attachment if SSM is enabled (indicating it's being used
130+
# as a cloud-key-rotator location)
97131
resource "aws_iam_role_policy_attachment" "attach-ckr-ssm-policy" {
132+
count = var.enable_ssm_location ? 1 : 0
98133
role = aws_iam_role.cloudkeyrotator_role.name
99-
policy_arn = aws_iam_policy.ckr_ssm_policy.arn
134+
policy_arn = aws_iam_policy.ckr_ssm_policy[0].arn
100135
}
101136

102-
# Lambda
103137

104138
resource "aws_lambda_function" "cloud_key_rotator" {
105-
139+
description = "A function for rotating cloud keys"
106140
s3_bucket = "ckr-terraform-module-code"
107141
s3_key = "cloud-key-rotator_${var.ckr_version}_lambda.zip"
108142
function_name = "cloud-key-rotator"

tf_module/ckr/module_version.txt

+1-1
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
0.0.6
1+
0.1.0

tf_module/ckr/vars.tf

+5
Original file line numberDiff line numberDiff line change
@@ -8,3 +8,8 @@ variable "ckr_version" {
88
variable "ckr_schedule" {
99
default = "cron(0 10 ? * MON-FRI *)"
1010
}
11+
12+
variable "enable_ssm_location" {
13+
type = bool
14+
default = false
15+
}

0 commit comments

Comments
 (0)