Advertisement
Guest User

Untitled

a guest
Jul 24th, 2019
92
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.01 KB | None | 0 0
  1. terraform {
  2. required_version = ">=0.11.0"
  3. }
  4.  
  5. provider "aws" {
  6. version = "~> 2.0"
  7. }
  8.  
  9. resource "aws_iam_user" "user" {
  10. name = "testuser"
  11. }
  12.  
  13. resource "aws_iam_user_policy_attachment" "user" {
  14. user = "${aws_iam_user.user.name}"
  15. policy_arn = "${aws_iam_policy.user.arn}"
  16. }
  17.  
  18. resource "aws_iam_access_key" "user" {
  19. user = "${aws_iam_user.user.name}"
  20. }
  21.  
  22. resource "aws_iam_policy" "user" {
  23. policy = "${data.aws_iam_policy_document.user.json}"
  24. }
  25.  
  26. data "aws_iam_policy_document" "user" {
  27. statement {
  28. actions = [
  29. "s3:CreateBucket",
  30. "s3:DeleteBucket",
  31. "s3:DeleteObject",
  32. "s3:DeleteObjectVersion",
  33. "s3:Get*",
  34. "s3:ListBucket",
  35. "s3:ListBucketVersions",
  36. "s3:PutBucketVersioning",
  37. "s3:PutObject",
  38. ]
  39.  
  40. resources = ["*"]
  41. }
  42. }
  43.  
  44. data "aws_region" "current" {}
  45.  
  46. output "exports" {
  47. value = "\n\nexport AWS_ACCESS_KEY_ID='${aws_iam_access_key.user.id}'\nexport AWS_SECRET_ACCESS_KEY='${aws_iam_access_key.user.secret}'\nexport AWS_REGION=${data.aws_region.current.name}"
  48. }
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement