Commit 72c3b055 authored by Anton Babenko's avatar Anton Babenko Committed by GitHub

feat: Shorten outputs (removing this_) (#150)

parent 7b9ddc8a
repos:
- repo: git://github.com/antonbabenko/pre-commit-terraform
rev: v1.48.0
rev: v1.50.0
hooks:
- id: terraform_fmt
- id: terraform_validate
......
......@@ -44,6 +44,6 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_this_caller_identity_account_id"></a> [this\_caller\_identity\_account\_id](#output\_this\_caller\_identity\_account\_id) | The ID of the AWS account |
| <a name="output_this_iam_account_password_policy_expire_passwords"></a> [this\_iam\_account\_password\_policy\_expire\_passwords](#output\_this\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
| <a name="output_caller_identity_account_id"></a> [caller\_identity\_account\_id](#output\_caller\_identity\_account\_id) | The ID of the AWS account |
| <a name="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_caller_identity_account_id" {
output "caller_identity_account_id" {
description = "The ID of the AWS account"
value = module.iam_account.this_caller_identity_account_id
value = module.iam_account.caller_identity_account_id
}
output "this_iam_account_password_policy_expire_passwords" {
output "iam_account_password_policy_expire_passwords" {
description = "Indicates whether passwords in the account expire. Returns true if max_password_age contains a value greater than 0. Returns false if it is 0 or not present."
value = module.iam_account.this_iam_account_password_policy_expire_passwords
value = module.iam_account.iam_account_password_policy_expire_passwords
}
......@@ -44,8 +44,8 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_arn
value = module.iam_assumable_role_admin.iam_role_arn
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_name
value = module.iam_assumable_role_admin.iam_role_name
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_path
value = module.iam_assumable_role_admin.iam_role_path
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_unique_id
}
\ No newline at end of file
value = module.iam_assumable_role_admin.iam_role_unique_id
}
......@@ -49,8 +49,8 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_arn
value = module.iam_assumable_role_admin.iam_role_arn
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_name
value = module.iam_assumable_role_admin.iam_role_name
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_path
value = module.iam_assumable_role_admin.iam_role_path
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_unique_id
value = module.iam_assumable_role_admin.iam_role_unique_id
}
......@@ -49,9 +49,9 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_role_requires_mfa"></a> [role\_requires\_mfa](#output\_role\_requires\_mfa) | Whether admin IAM role requires MFA |
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_arn
value = module.iam_assumable_role_admin.iam_role_arn
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_name
value = module.iam_assumable_role_admin.iam_role_name
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_path
value = module.iam_assumable_role_admin.iam_role_path
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = module.iam_assumable_role_admin.this_iam_role_unique_id
value = module.iam_assumable_role_admin.iam_role_unique_id
}
output "role_requires_mfa" {
......
......@@ -49,7 +49,7 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_this_assumable_roles"></a> [this\_assumable\_roles](#output\_this\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_this_group_users"></a> [this\_group\_users](#output\_this\_group\_users) | List of IAM users in IAM group |
| <a name="output_this_policy_arn"></a> [this\_policy\_arn](#output\_this\_policy\_arn) | Assume role policy ARN for IAM group |
| <a name="output_assumable_roles"></a> [assumable\_roles](#output\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
| <a name="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn) | Assume role policy ARN for IAM group |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
......@@ -30,8 +30,8 @@ module "iam_group_complete" {
assumable_roles = ["arn:aws:iam::111111111111:role/admin"]
group_users = [
module.iam_user1.this_iam_user_name,
module.iam_user2.this_iam_user_name,
module.iam_user1.iam_user_name,
module.iam_user2.iam_user_name,
]
}
......
output "this_group_users" {
output "group_users" {
description = "List of IAM users in IAM group"
value = module.iam_group_complete.this_group_users
value = module.iam_group_complete.group_users
}
output "this_assumable_roles" {
output "assumable_roles" {
description = "List of ARNs of IAM roles which members of IAM group can assume"
value = module.iam_group_complete.this_assumable_roles
value = module.iam_group_complete.assumable_roles
}
output "this_policy_arn" {
output "policy_arn" {
description = "Assume role policy ARN for IAM group"
value = module.iam_group_complete.this_policy_arn
value = module.iam_group_complete.policy_arn
}
......@@ -56,9 +56,9 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_assumable_roles"></a> [assumable\_roles](#output\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
| <a name="output_iam_account_id"></a> [iam\_account\_id](#output\_iam\_account\_id) | IAM AWS account id (this code is managing resources in this account) |
| <a name="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn) | Assume role policy ARN for IAM group |
| <a name="output_production_account_id"></a> [production\_account\_id](#output\_production\_account\_id) | Production AWS account id |
| <a name="output_this_assumable_roles"></a> [this\_assumable\_roles](#output\_this\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_this_group_users"></a> [this\_group\_users](#output\_this\_group\_users) | List of IAM users in IAM group |
| <a name="output_this_policy_arn"></a> [this\_policy\_arn](#output\_this\_policy\_arn) | Assume role policy ARN for IAM group |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
......@@ -15,7 +15,7 @@ provider "aws" {
data "aws_caller_identity" "iam" {}
data "aws_caller_identity" "production" {
provider = "aws.production"
provider = aws.production
}
############
......@@ -57,7 +57,7 @@ module "iam_assumable_roles_in_prod" {
readonly_role_requires_mfa = false
providers = {
aws = "aws.production"
aws = aws.production
}
}
......@@ -79,7 +79,7 @@ module "iam_assumable_role_custom" {
]
providers = {
aws = "aws.production"
aws = aws.production
}
}
......@@ -95,8 +95,8 @@ module "iam_group_with_assumable_roles_policy_production_readonly" {
assumable_roles = [module.iam_assumable_roles_in_prod.readonly_iam_role_arn]
group_users = [
module.iam_user1.this_iam_user_name,
module.iam_user2.this_iam_user_name,
module.iam_user1.iam_user_name,
module.iam_user2.iam_user_name,
]
}
......@@ -112,7 +112,7 @@ module "iam_group_with_assumable_roles_policy_production_admin" {
assumable_roles = [module.iam_assumable_roles_in_prod.admin_iam_role_arn]
group_users = [
module.iam_user1.this_iam_user_name,
module.iam_user1.iam_user_name,
]
}
......@@ -125,9 +125,9 @@ module "iam_group_with_assumable_roles_policy_production_custom" {
name = "production-custom"
assumable_roles = [module.iam_assumable_role_custom.this_iam_role_arn]
assumable_roles = [module.iam_assumable_role_custom.iam_role_arn]
group_users = [
module.iam_user2.this_iam_user_name,
module.iam_user2.iam_user_name,
]
}
......@@ -8,17 +8,17 @@ output "production_account_id" {
value = data.aws_caller_identity.production.account_id
}
output "this_group_users" {
output "group_users" {
description = "List of IAM users in IAM group"
value = module.iam_group_with_assumable_roles_policy_production_readonly.this_group_users
value = module.iam_group_with_assumable_roles_policy_production_readonly.group_users
}
output "this_assumable_roles" {
output "assumable_roles" {
description = "List of ARNs of IAM roles which members of IAM group can assume"
value = module.iam_group_with_assumable_roles_policy_production_readonly.this_assumable_roles
value = module.iam_group_with_assumable_roles_policy_production_readonly.assumable_roles
}
output "this_policy_arn" {
output "policy_arn" {
description = "Assume role policy ARN for IAM group"
value = module.iam_group_with_assumable_roles_policy_production_readonly.this_policy_arn
value = module.iam_group_with_assumable_roles_policy_production_readonly.policy_arn
}
......@@ -51,7 +51,7 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_group_name"></a> [group\_name](#output\_group\_name) | IAM group name |
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
| <a name="output_iam_account_id"></a> [iam\_account\_id](#output\_iam\_account\_id) | IAM AWS account id |
| <a name="output_this_group_name"></a> [this\_group\_name](#output\_this\_group\_name) | IAM group name |
| <a name="output_this_group_users"></a> [this\_group\_users](#output\_this\_group\_users) | List of IAM users in IAM group |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
......@@ -28,8 +28,8 @@ module "iam_group_superadmins" {
name = "superadmins"
group_users = [
module.iam_user1.this_iam_user_name,
module.iam_user2.this_iam_user_name,
module.iam_user1.iam_user_name,
module.iam_user2.iam_user_name,
]
custom_group_policy_arns = [
......@@ -46,8 +46,8 @@ module "iam_group_with_custom_policies" {
name = "custom"
group_users = [
module.iam_user1.this_iam_user_name,
module.iam_user2.this_iam_user_name,
module.iam_user1.iam_user_name,
module.iam_user2.iam_user_name,
]
custom_group_policy_arns = [
......
......@@ -3,12 +3,12 @@ output "iam_account_id" {
value = module.iam_group_superadmins.aws_account_id
}
output "this_group_users" {
output "group_users" {
description = "List of IAM users in IAM group"
value = module.iam_group_superadmins.this_group_users
value = module.iam_group_superadmins.group_users
}
output "this_group_name" {
output "group_name" {
description = "IAM group name"
value = module.iam_group_superadmins.this_group_name
value = module.iam_group_superadmins.group_name
}
......@@ -46,20 +46,20 @@ No inputs.
| Name | Description |
|------|-------------|
| <a name="output_iam_access_key_encrypted_secret"></a> [iam\_access\_key\_encrypted\_secret](#output\_iam\_access\_key\_encrypted\_secret) | The encrypted secret, base64 encoded |
| <a name="output_iam_access_key_id"></a> [iam\_access\_key\_id](#output\_iam\_access\_key\_id) | The access key ID |
| <a name="output_iam_access_key_key_fingerprint"></a> [iam\_access\_key\_key\_fingerprint](#output\_iam\_access\_key\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the secret |
| <a name="output_iam_access_key_secret"></a> [iam\_access\_key\_secret](#output\_iam\_access\_key\_secret) | The access key secret |
| <a name="output_iam_access_key_ses_smtp_password_v4"></a> [iam\_access\_key\_ses\_smtp\_password\_v4](#output\_iam\_access\_key\_ses\_smtp\_password\_v4) | The secret access key converted into an SES SMTP password |
| <a name="output_iam_access_key_status"></a> [iam\_access\_key\_status](#output\_iam\_access\_key\_status) | Active or Inactive. Keys are initially active, but can be made inactive by other means. |
| <a name="output_iam_user_arn"></a> [iam\_user\_arn](#output\_iam\_user\_arn) | The ARN assigned by AWS for this user |
| <a name="output_iam_user_login_profile_encrypted_password"></a> [iam\_user\_login\_profile\_encrypted\_password](#output\_iam\_user\_login\_profile\_encrypted\_password) | The encrypted password, base64 encoded |
| <a name="output_iam_user_login_profile_key_fingerprint"></a> [iam\_user\_login\_profile\_key\_fingerprint](#output\_iam\_user\_login\_profile\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the password |
| <a name="output_iam_user_name"></a> [iam\_user\_name](#output\_iam\_user\_name) | The user's name |
| <a name="output_iam_user_unique_id"></a> [iam\_user\_unique\_id](#output\_iam\_user\_unique\_id) | The unique ID assigned by AWS |
| <a name="output_keybase_password_decrypt_command"></a> [keybase\_password\_decrypt\_command](#output\_keybase\_password\_decrypt\_command) | Decrypt user password command |
| <a name="output_keybase_password_pgp_message"></a> [keybase\_password\_pgp\_message](#output\_keybase\_password\_pgp\_message) | Encrypted password |
| <a name="output_keybase_secret_key_decrypt_command"></a> [keybase\_secret\_key\_decrypt\_command](#output\_keybase\_secret\_key\_decrypt\_command) | Decrypt access secret key command |
| <a name="output_keybase_secret_key_pgp_message"></a> [keybase\_secret\_key\_pgp\_message](#output\_keybase\_secret\_key\_pgp\_message) | Encrypted access secret key |
| <a name="output_pgp_key"></a> [pgp\_key](#output\_pgp\_key) | PGP key used to encrypt sensitive data for this user (if empty - secrets are not encrypted) |
| <a name="output_this_iam_access_key_encrypted_secret"></a> [this\_iam\_access\_key\_encrypted\_secret](#output\_this\_iam\_access\_key\_encrypted\_secret) | The encrypted secret, base64 encoded |
| <a name="output_this_iam_access_key_id"></a> [this\_iam\_access\_key\_id](#output\_this\_iam\_access\_key\_id) | The access key ID |
| <a name="output_this_iam_access_key_key_fingerprint"></a> [this\_iam\_access\_key\_key\_fingerprint](#output\_this\_iam\_access\_key\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the secret |
| <a name="output_this_iam_access_key_secret"></a> [this\_iam\_access\_key\_secret](#output\_this\_iam\_access\_key\_secret) | The access key secret |
| <a name="output_this_iam_access_key_ses_smtp_password_v4"></a> [this\_iam\_access\_key\_ses\_smtp\_password\_v4](#output\_this\_iam\_access\_key\_ses\_smtp\_password\_v4) | The secret access key converted into an SES SMTP password |
| <a name="output_this_iam_access_key_status"></a> [this\_iam\_access\_key\_status](#output\_this\_iam\_access\_key\_status) | Active or Inactive. Keys are initially active, but can be made inactive by other means. |
| <a name="output_this_iam_user_arn"></a> [this\_iam\_user\_arn](#output\_this\_iam\_user\_arn) | The ARN assigned by AWS for this user |
| <a name="output_this_iam_user_login_profile_encrypted_password"></a> [this\_iam\_user\_login\_profile\_encrypted\_password](#output\_this\_iam\_user\_login\_profile\_encrypted\_password) | The encrypted password, base64 encoded |
| <a name="output_this_iam_user_login_profile_key_fingerprint"></a> [this\_iam\_user\_login\_profile\_key\_fingerprint](#output\_this\_iam\_user\_login\_profile\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the password |
| <a name="output_this_iam_user_name"></a> [this\_iam\_user\_name](#output\_this\_iam\_user\_name) | The user's name |
| <a name="output_this_iam_user_unique_id"></a> [this\_iam\_user\_unique\_id](#output\_this\_iam\_user\_unique\_id) | The unique ID assigned by AWS |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_user_name" {
output "iam_user_name" {
description = "The user's name"
value = module.iam_user.this_iam_user_name
value = module.iam_user.iam_user_name
}
output "this_iam_user_arn" {
output "iam_user_arn" {
description = "The ARN assigned by AWS for this user"
value = module.iam_user.this_iam_user_arn
value = module.iam_user.iam_user_arn
}
output "this_iam_user_unique_id" {
output "iam_user_unique_id" {
description = "The unique ID assigned by AWS"
value = module.iam_user.this_iam_user_unique_id
value = module.iam_user.iam_user_unique_id
}
output "this_iam_user_login_profile_key_fingerprint" {
output "iam_user_login_profile_key_fingerprint" {
description = "The fingerprint of the PGP key used to encrypt the password"
value = module.iam_user.this_iam_user_login_profile_key_fingerprint
value = module.iam_user.iam_user_login_profile_key_fingerprint
}
output "this_iam_user_login_profile_encrypted_password" {
output "iam_user_login_profile_encrypted_password" {
description = "The encrypted password, base64 encoded"
value = module.iam_user.this_iam_user_login_profile_encrypted_password
value = module.iam_user.iam_user_login_profile_encrypted_password
}
output "this_iam_access_key_id" {
output "iam_access_key_id" {
description = "The access key ID"
value = module.iam_user.this_iam_access_key_id
value = module.iam_user.iam_access_key_id
}
output "this_iam_access_key_key_fingerprint" {
output "iam_access_key_key_fingerprint" {
description = "The fingerprint of the PGP key used to encrypt the secret"
value = module.iam_user.this_iam_access_key_key_fingerprint
value = module.iam_user.iam_access_key_key_fingerprint
}
output "this_iam_access_key_encrypted_secret" {
output "iam_access_key_encrypted_secret" {
description = "The encrypted secret, base64 encoded"
value = module.iam_user.this_iam_access_key_encrypted_secret
value = module.iam_user.iam_access_key_encrypted_secret
}
output "this_iam_access_key_secret" {
output "iam_access_key_secret" {
description = "The access key secret"
value = module.iam_user.this_iam_access_key_secret
value = module.iam_user.iam_access_key_secret
sensitive = true
}
output "this_iam_access_key_ses_smtp_password_v4" {
output "iam_access_key_ses_smtp_password_v4" {
description = "The secret access key converted into an SES SMTP password"
value = module.iam_user.this_iam_access_key_ses_smtp_password_v4
value = module.iam_user.iam_access_key_ses_smtp_password_v4
sensitive = true
}
output "this_iam_access_key_status" {
output "iam_access_key_status" {
description = "Active or Inactive. Keys are initially active, but can be made inactive by other means."
value = module.iam_user.this_iam_access_key_status
value = module.iam_user.iam_access_key_status
}
output "pgp_key" {
......
......@@ -68,8 +68,8 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_this_caller_identity_account_id"></a> [this\_caller\_identity\_account\_id](#output\_this\_caller\_identity\_account\_id) | The AWS Account ID number of the account that owns or contains the calling entity |
| <a name="output_this_caller_identity_arn"></a> [this\_caller\_identity\_arn](#output\_this\_caller\_identity\_arn) | The AWS ARN associated with the calling entity |
| <a name="output_this_caller_identity_user_id"></a> [this\_caller\_identity\_user\_id](#output\_this\_caller\_identity\_user\_id) | The unique identifier of the calling entity |
| <a name="output_this_iam_account_password_policy_expire_passwords"></a> [this\_iam\_account\_password\_policy\_expire\_passwords](#output\_this\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
| <a name="output_caller_identity_account_id"></a> [caller\_identity\_account\_id](#output\_caller\_identity\_account\_id) | The AWS Account ID number of the account that owns or contains the calling entity |
| <a name="output_caller_identity_arn"></a> [caller\_identity\_arn](#output\_caller\_identity\_arn) | The AWS ARN associated with the calling entity |
| <a name="output_caller_identity_user_id"></a> [caller\_identity\_user\_id](#output\_caller\_identity\_user\_id) | The unique identifier of the calling entity |
| <a name="output_iam_account_password_policy_expire_passwords"></a> [iam\_account\_password\_policy\_expire\_passwords](#output\_iam\_account\_password\_policy\_expire\_passwords) | Indicates whether passwords in the account expire. Returns true if max\_password\_age contains a value greater than 0. Returns false if it is 0 or not present. |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_caller_identity_account_id" {
output "caller_identity_account_id" {
description = "The AWS Account ID number of the account that owns or contains the calling entity"
value = element(concat(data.aws_caller_identity.this.*.account_id, [""]), 0)
}
output "this_caller_identity_arn" {
output "caller_identity_arn" {
description = "The AWS ARN associated with the calling entity"
value = element(concat(data.aws_caller_identity.this.*.arn, [""]), 0)
}
output "this_caller_identity_user_id" {
output "caller_identity_user_id" {
description = "The unique identifier of the calling entity"
value = element(concat(data.aws_caller_identity.this.*.user_id, [""]), 0)
}
output "this_iam_account_password_policy_expire_passwords" {
output "iam_account_password_policy_expire_passwords" {
description = "Indicates whether passwords in the account expire. Returns true if max_password_age contains a value greater than 0. Returns false if it is 0 or not present."
value = element(concat(aws_iam_account_password_policy.this.*.expire_passwords, [""]), 0)
}
......
......@@ -59,8 +59,8 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = element(concat(aws_iam_role.this.*.arn, [""]), 0)
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = element(concat(aws_iam_role.this.*.name, [""]), 0)
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = element(concat(aws_iam_role.this.*.path, [""]), 0)
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = element(concat(aws_iam_role.this.*.unique_id, [""]), 0)
}
......@@ -54,8 +54,8 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = element(concat(aws_iam_role.this.*.arn, [""]), 0)
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = element(concat(aws_iam_role.this.*.name, [""]), 0)
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = element(concat(aws_iam_role.this.*.path, [""]), 0)
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = element(concat(aws_iam_role.this.*.unique_id, [""]), 0)
}
\ No newline at end of file
}
......@@ -67,13 +67,13 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_iam_instance_profile_arn"></a> [iam\_instance\_profile\_arn](#output\_iam\_instance\_profile\_arn) | ARN of IAM instance profile |
| <a name="output_iam_instance_profile_name"></a> [iam\_instance\_profile\_name](#output\_iam\_instance\_profile\_name) | Name of IAM instance profile |
| <a name="output_iam_instance_profile_path"></a> [iam\_instance\_profile\_path](#output\_iam\_instance\_profile\_path) | Path of IAM instance profile |
| <a name="output_iam_role_arn"></a> [iam\_role\_arn](#output\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_iam_role_name"></a> [iam\_role\_name](#output\_iam\_role\_name) | Name of IAM role |
| <a name="output_iam_role_path"></a> [iam\_role\_path](#output\_iam\_role\_path) | Path of IAM role |
| <a name="output_iam_role_unique_id"></a> [iam\_role\_unique\_id](#output\_iam\_role\_unique\_id) | Unique ID of IAM role |
| <a name="output_role_requires_mfa"></a> [role\_requires\_mfa](#output\_role\_requires\_mfa) | Whether IAM role requires MFA |
| <a name="output_role_sts_externalid"></a> [role\_sts\_externalid](#output\_role\_sts\_externalid) | STS ExternalId condition value to use with a role |
| <a name="output_this_iam_instance_profile_arn"></a> [this\_iam\_instance\_profile\_arn](#output\_this\_iam\_instance\_profile\_arn) | ARN of IAM instance profile |
| <a name="output_this_iam_instance_profile_name"></a> [this\_iam\_instance\_profile\_name](#output\_this\_iam\_instance\_profile\_name) | Name of IAM instance profile |
| <a name="output_this_iam_instance_profile_path"></a> [this\_iam\_instance\_profile\_path](#output\_this\_iam\_instance\_profile\_path) | Path of IAM instance profile |
| <a name="output_this_iam_role_arn"></a> [this\_iam\_role\_arn](#output\_this\_iam\_role\_arn) | ARN of IAM role |
| <a name="output_this_iam_role_name"></a> [this\_iam\_role\_name](#output\_this\_iam\_role\_name) | Name of IAM role |
| <a name="output_this_iam_role_path"></a> [this\_iam\_role\_path](#output\_this\_iam\_role\_path) | Path of IAM role |
| <a name="output_this_iam_role_unique_id"></a> [this\_iam\_role\_unique\_id](#output\_this\_iam\_role\_unique\_id) | Unique ID of IAM role |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_iam_role_arn" {
output "iam_role_arn" {
description = "ARN of IAM role"
value = element(concat(aws_iam_role.this.*.arn, [""]), 0)
}
output "this_iam_role_name" {
output "iam_role_name" {
description = "Name of IAM role"
value = element(concat(aws_iam_role.this.*.name, [""]), 0)
}
output "this_iam_role_path" {
output "iam_role_path" {
description = "Path of IAM role"
value = element(concat(aws_iam_role.this.*.path, [""]), 0)
}
output "this_iam_role_unique_id" {
output "iam_role_unique_id" {
description = "Unique ID of IAM role"
value = element(concat(aws_iam_role.this.*.unique_id, [""]), 0)
}
......@@ -23,17 +23,17 @@ output "role_requires_mfa" {
value = var.role_requires_mfa
}
output "this_iam_instance_profile_arn" {
output "iam_instance_profile_arn" {
description = "ARN of IAM instance profile"
value = element(concat(aws_iam_instance_profile.this.*.arn, [""]), 0)
}
output "this_iam_instance_profile_name" {
output "iam_instance_profile_name" {
description = "Name of IAM instance profile"
value = element(concat(aws_iam_instance_profile.this.*.name, [""]), 0)
}
output "this_iam_instance_profile_path" {
output "iam_instance_profile_path" {
description = "Path of IAM instance profile"
value = element(concat(aws_iam_instance_profile.this.*.path, [""]), 0)
}
......
......@@ -42,9 +42,9 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_assumable_roles"></a> [assumable\_roles](#output\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_group_arn"></a> [group\_arn](#output\_group\_arn) | IAM group arn |
| <a name="output_group_name"></a> [group\_name](#output\_group\_name) | IAM group name |
| <a name="output_this_assumable_roles"></a> [this\_assumable\_roles](#output\_this\_assumable\_roles) | List of ARNs of IAM roles which members of IAM group can assume |
| <a name="output_this_group_users"></a> [this\_group\_users](#output\_this\_group\_users) | List of IAM users in IAM group |
| <a name="output_this_policy_arn"></a> [this\_policy\_arn](#output\_this\_policy\_arn) | Assume role policy ARN of IAM group |
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
| <a name="output_policy_arn"></a> [policy\_arn](#output\_policy\_arn) | Assume role policy ARN of IAM group |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
output "this_group_users" {
output "group_users" {
description = "List of IAM users in IAM group"
value = flatten(aws_iam_group_membership.this.*.users)
}
output "this_assumable_roles" {
output "assumable_roles" {
description = "List of ARNs of IAM roles which members of IAM group can assume"
value = var.assumable_roles
}
output "this_policy_arn" {
output "policy_arn" {
description = "Assume role policy ARN of IAM group"
value = aws_iam_policy.this.arn
}
......
......@@ -53,6 +53,6 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_aws_account_id"></a> [aws\_account\_id](#output\_aws\_account\_id) | IAM AWS account id |
| <a name="output_this_group_name"></a> [this\_group\_name](#output\_this\_group\_name) | IAM group name |
| <a name="output_this_group_users"></a> [this\_group\_users](#output\_this\_group\_users) | List of IAM users in IAM group |
| <a name="output_group_name"></a> [group\_name](#output\_group\_name) | IAM group name |
| <a name="output_group_users"></a> [group\_users](#output\_group\_users) | List of IAM users in IAM group |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
......@@ -3,12 +3,12 @@ output "aws_account_id" {
value = local.aws_account_id
}
output "this_group_users" {
output "group_users" {
description = "List of IAM users in IAM group"
value = flatten(aws_iam_group_membership.this.*.users)
}
output "this_group_name" {
output "group_name" {
description = "IAM group name"
value = element(concat(aws_iam_group.this.*.name, [var.name]), 0)
}
......
......@@ -69,22 +69,22 @@ No modules.
| Name | Description |
|------|-------------|
| <a name="output_iam_access_key_encrypted_secret"></a> [iam\_access\_key\_encrypted\_secret](#output\_iam\_access\_key\_encrypted\_secret) | The encrypted secret, base64 encoded |
| <a name="output_iam_access_key_id"></a> [iam\_access\_key\_id](#output\_iam\_access\_key\_id) | The access key ID |
| <a name="output_iam_access_key_key_fingerprint"></a> [iam\_access\_key\_key\_fingerprint](#output\_iam\_access\_key\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the secret |
| <a name="output_iam_access_key_secret"></a> [iam\_access\_key\_secret](#output\_iam\_access\_key\_secret) | The access key secret |
| <a name="output_iam_access_key_ses_smtp_password_v4"></a> [iam\_access\_key\_ses\_smtp\_password\_v4](#output\_iam\_access\_key\_ses\_smtp\_password\_v4) | The secret access key converted into an SES SMTP password by applying AWS's Sigv4 conversion algorithm |
| <a name="output_iam_access_key_status"></a> [iam\_access\_key\_status](#output\_iam\_access\_key\_status) | Active or Inactive. Keys are initially active, but can be made inactive by other means. |
| <a name="output_iam_user_arn"></a> [iam\_user\_arn](#output\_iam\_user\_arn) | The ARN assigned by AWS for this user |
| <a name="output_iam_user_login_profile_encrypted_password"></a> [iam\_user\_login\_profile\_encrypted\_password](#output\_iam\_user\_login\_profile\_encrypted\_password) | The encrypted password, base64 encoded |
| <a name="output_iam_user_login_profile_key_fingerprint"></a> [iam\_user\_login\_profile\_key\_fingerprint](#output\_iam\_user\_login\_profile\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the password |
| <a name="output_iam_user_name"></a> [iam\_user\_name](#output\_iam\_user\_name) | The user's name |
| <a name="output_iam_user_ssh_key_fingerprint"></a> [iam\_user\_ssh\_key\_fingerprint](#output\_iam\_user\_ssh\_key\_fingerprint) | The MD5 message digest of the SSH public key |
| <a name="output_iam_user_ssh_key_ssh_public_key_id"></a> [iam\_user\_ssh\_key\_ssh\_public\_key\_id](#output\_iam\_user\_ssh\_key\_ssh\_public\_key\_id) | The unique identifier for the SSH public key |
| <a name="output_iam_user_unique_id"></a> [iam\_user\_unique\_id](#output\_iam\_user\_unique\_id) | The unique ID assigned by AWS |
| <a name="output_keybase_password_decrypt_command"></a> [keybase\_password\_decrypt\_command](#output\_keybase\_password\_decrypt\_command) | Decrypt user password command |
| <a name="output_keybase_password_pgp_message"></a> [keybase\_password\_pgp\_message](#output\_keybase\_password\_pgp\_message) | Encrypted password |
| <a name="output_keybase_secret_key_decrypt_command"></a> [keybase\_secret\_key\_decrypt\_command](#output\_keybase\_secret\_key\_decrypt\_command) | Decrypt access secret key command |
| <a name="output_keybase_secret_key_pgp_message"></a> [keybase\_secret\_key\_pgp\_message](#output\_keybase\_secret\_key\_pgp\_message) | Encrypted access secret key |
| <a name="output_pgp_key"></a> [pgp\_key](#output\_pgp\_key) | PGP key used to encrypt sensitive data for this user (if empty - secrets are not encrypted) |
| <a name="output_this_iam_access_key_encrypted_secret"></a> [this\_iam\_access\_key\_encrypted\_secret](#output\_this\_iam\_access\_key\_encrypted\_secret) | The encrypted secret, base64 encoded |
| <a name="output_this_iam_access_key_id"></a> [this\_iam\_access\_key\_id](#output\_this\_iam\_access\_key\_id) | The access key ID |
| <a name="output_this_iam_access_key_key_fingerprint"></a> [this\_iam\_access\_key\_key\_fingerprint](#output\_this\_iam\_access\_key\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the secret |
| <a name="output_this_iam_access_key_secret"></a> [this\_iam\_access\_key\_secret](#output\_this\_iam\_access\_key\_secret) | The access key secret |
| <a name="output_this_iam_access_key_ses_smtp_password_v4"></a> [this\_iam\_access\_key\_ses\_smtp\_password\_v4](#output\_this\_iam\_access\_key\_ses\_smtp\_password\_v4) | The secret access key converted into an SES SMTP password by applying AWS's Sigv4 conversion algorithm |
| <a name="output_this_iam_access_key_status"></a> [this\_iam\_access\_key\_status](#output\_this\_iam\_access\_key\_status) | Active or Inactive. Keys are initially active, but can be made inactive by other means. |
| <a name="output_this_iam_user_arn"></a> [this\_iam\_user\_arn](#output\_this\_iam\_user\_arn) | The ARN assigned by AWS for this user |
| <a name="output_this_iam_user_login_profile_encrypted_password"></a> [this\_iam\_user\_login\_profile\_encrypted\_password](#output\_this\_iam\_user\_login\_profile\_encrypted\_password) | The encrypted password, base64 encoded |
| <a name="output_this_iam_user_login_profile_key_fingerprint"></a> [this\_iam\_user\_login\_profile\_key\_fingerprint](#output\_this\_iam\_user\_login\_profile\_key\_fingerprint) | The fingerprint of the PGP key used to encrypt the password |
| <a name="output_this_iam_user_name"></a> [this\_iam\_user\_name](#output\_this\_iam\_user\_name) | The user's name |
| <a name="output_this_iam_user_ssh_key_fingerprint"></a> [this\_iam\_user\_ssh\_key\_fingerprint](#output\_this\_iam\_user\_ssh\_key\_fingerprint) | The MD5 message digest of the SSH public key |
| <a name="output_this_iam_user_ssh_key_ssh_public_key_id"></a> [this\_iam\_user\_ssh\_key\_ssh\_public\_key\_id](#output\_this\_iam\_user\_ssh\_key\_ssh\_public\_key\_id) | The unique identifier for the SSH public key |
| <a name="output_this_iam_user_unique_id"></a> [this\_iam\_user\_unique\_id](#output\_this\_iam\_user\_unique\_id) | The unique ID assigned by AWS |
<!-- END OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
......@@ -3,32 +3,32 @@ locals {
has_encrypted_secret = length(compact(aws_iam_access_key.this.*.encrypted_secret)) > 0
}
output "this_iam_user_name" {
output "iam_user_name" {
description = "The user's name"
value = element(concat(aws_iam_user.this.*.name, [""]), 0)
}
output "this_iam_user_arn" {
output "iam_user_arn" {
description = "The ARN assigned by AWS for this user"
value = element(concat(aws_iam_user.this.*.arn, [""]), 0)
}
output "this_iam_user_unique_id" {
output "iam_user_unique_id" {
description = "The unique ID assigned by AWS"
value = element(concat(aws_iam_user.this.*.unique_id, [""]), 0)
}
output "this_iam_user_login_profile_key_fingerprint" {
output "iam_user_login_profile_key_fingerprint" {
description = "The fingerprint of the PGP key used to encrypt the password"
value = element(concat(aws_iam_user_login_profile.this.*.key_fingerprint, [""]), 0)
}
output "this_iam_user_login_profile_encrypted_password" {
output "iam_user_login_profile_encrypted_password" {
description = "The encrypted password, base64 encoded"
value = element(concat(aws_iam_user_login_profile.this.*.encrypted_password, [""]), 0)
}
output "this_iam_access_key_id" {
output "iam_access_key_id" {
description = "The access key ID"
value = element(
concat(
......@@ -40,23 +40,23 @@ output "this_iam_access_key_id" {
)
}
output "this_iam_access_key_secret" {
output "iam_access_key_secret" {
description = "The access key secret"
value = element(concat(aws_iam_access_key.this_no_pgp.*.secret, [""]), 0)
sensitive = true
}
output "this_iam_access_key_key_fingerprint" {
output "iam_access_key_key_fingerprint" {
description = "The fingerprint of the PGP key used to encrypt the secret"
value = element(concat(aws_iam_access_key.this.*.key_fingerprint, [""]), 0)
}
output "this_iam_access_key_encrypted_secret" {
output "iam_access_key_encrypted_secret" {
description = "The encrypted secret, base64 encoded"
value = element(concat(aws_iam_access_key.this.*.encrypted_secret, [""]), 0)
}
output "this_iam_access_key_ses_smtp_password_v4" {
output "iam_access_key_ses_smtp_password_v4" {
description = "The secret access key converted into an SES SMTP password by applying AWS's Sigv4 conversion algorithm"
value = element(
concat(
......@@ -69,7 +69,7 @@ output "this_iam_access_key_ses_smtp_password_v4" {
sensitive = true
}
output "this_iam_access_key_status" {
output "iam_access_key_status" {
description = "Active or Inactive. Keys are initially active, but can be made inactive by other means."
value = element(
concat(
......@@ -128,12 +128,12 @@ EOF
}
output "this_iam_user_ssh_key_ssh_public_key_id" {
output "iam_user_ssh_key_ssh_public_key_id" {
description = "The unique identifier for the SSH public key"
value = element(concat(aws_iam_user_ssh_key.this.*.ssh_public_key_id, [""]), 0)
}
output "this_iam_user_ssh_key_fingerprint" {
output "iam_user_ssh_key_fingerprint" {
description = "The MD5 message digest of the SSH public key"
value = element(concat(aws_iam_user_ssh_key.this.*.fingerprint, [""]), 0)
}
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment