forked from Flaconi/terraform-aws-iam-roles
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathoutputs.tf
118 lines (90 loc) · 3.72 KB
/
outputs.tf
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
# -------------------------------------------------------------------------------------------------
# Account Settings
# -------------------------------------------------------------------------------------------------
output "account_alias" {
description = "Created Account alias."
value = aws_iam_account_alias.default
}
output "account_pass_policy" {
description = "Created Account password policy."
value = aws_iam_account_password_policy.default
}
# -------------------------------------------------------------------------------------------------
# Identity Providers
# -------------------------------------------------------------------------------------------------
output "providers_saml" {
description = "Created SAML providers."
value = aws_iam_saml_provider.default
}
output "providers_oidc" {
description = "Created OpenID Connect providers."
value = aws_iam_openid_connect_provider.default
}
# -------------------------------------------------------------------------------------------------
# Policies
# -------------------------------------------------------------------------------------------------
output "policies" {
description = "Created customer managed IAM policies"
value = aws_iam_policy.policies
}
# -------------------------------------------------------------------------------------------------
# Groups
# -------------------------------------------------------------------------------------------------
output "groups" {
description = "Created IAM groups"
value = aws_iam_group.groups
}
output "group_policy_attachments" {
description = "Attached group customer managed IAM policies"
value = aws_iam_group_policy_attachment.policy_attachments
}
output "group_inline_policy_attachments" {
description = "Attached group inline IAM policies"
value = aws_iam_group_policy.inline_policy_attachments
}
output "group_policy_arn_attachments" {
description = "Attached group IAM policy arns"
value = aws_iam_group_policy_attachment.policy_arn_attachments
}
# -------------------------------------------------------------------------------------------------
# Users
# -------------------------------------------------------------------------------------------------
output "users" {
description = "Created IAM users"
value = aws_iam_user.users
}
output "user_policy_attachments" {
description = "Attached user customer managed IAM policies"
value = aws_iam_user_policy_attachment.policy_attachments
}
output "user_inline_policy_attachments" {
description = "Attached user inline IAM policies"
value = aws_iam_user_policy.inline_policy_attachments
}
output "user_policy_arn_attachments" {
description = "Attached user IAM policy arns"
value = aws_iam_user_policy_attachment.policy_arn_attachments
}
output "user_group_memberships" {
description = "Assigned user/group memberships"
value = aws_iam_user_group_membership.group_membership
}
# -------------------------------------------------------------------------------------------------
# Roles
# -------------------------------------------------------------------------------------------------
output "roles" {
description = "Created IAM roles"
value = aws_iam_role.roles
}
output "role_policy_attachments" {
description = "Attached role customer managed IAM policies"
value = aws_iam_role_policy_attachment.policy_attachments
}
output "role_inline_policy_attachments" {
description = "Attached role inline IAM policies"
value = aws_iam_role_policy.inline_policy_attachments
}
output "role_policy_arn_attachments" {
description = "Attached role IAM policy arns"
value = aws_iam_role_policy_attachment.policy_arn_attachments
}