No requirements.
| Name | Version |
|---|---|
| aws | n/a |
No modules.
| Name | Type |
|---|---|
| aws_iam_access_key.iam_user | resource |
| aws_iam_user.iam_user | resource |
| aws_iam_user_policy.iam_policy | resource |
| aws_iam_user_policy_attachment.iam_attach_policy | resource |
| aws_caller_identity.current | data source |
| Name | Description | Type | Default | Required |
|---|---|---|---|---|
| enable_gcci_boundary | toggle for gcci boundary to allow non-gcc accounts to create role | bool |
true |
no |
| pgp_key | pgp key to use to encrypt the access keys - use 'gpg --export %KEY_ID% | base64 -w 0' to get this value | string |
"" |
no |
| purpose | a reason why this user should exist | string |
n/a | yes |
| user_attach_policy | map(string) of existing policies to attach directly to user | map(string) |
{} |
no |
| user_policy | IAM policy attached directly to user | string |
"" |
no |
| username | username for the user | string |
"gcc-default-user" |
no |
| username_prefix | prefix for username | string |
"service" |
no |
| Name | Description |
|---|---|
| access_key | base64-encoded, encrypted access key of the user, use base64 -d to decrypt and gpg -d encrypted.txt |
| access_key_id | id of the access key |
| arn | arn of the created iam user |
| id | id of the created iam user |
| name | username of the created iam user |