Skip to content

Commit

Permalink
fix(pin): module iam-role/aws version ~> 0.3.0
Browse files Browse the repository at this point in the history
Signed-off-by: Salim Afiune Maya <afiune@lacework.net>
  • Loading branch information
afiune committed Sep 18, 2023
1 parent 4bad1c3 commit 870ec29
Show file tree
Hide file tree
Showing 4 changed files with 42 additions and 42 deletions.
5 changes: 5 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,3 +1,8 @@
# v0.12.1

## Bug Fixes
* fix(pin): module iam-role/aws version ~> 0.3.0
---
# v0.12.0

## Features
Expand Down
11 changes: 3 additions & 8 deletions RELEASE_NOTES.md
Original file line number Diff line number Diff line change
@@ -1,10 +1,5 @@
# Release Notes
Another day, another release. These are the release notes for the version `v0.12.0`.
Another day, another release. These are the release notes for the version `v0.12.1`.

## Features
* feat: Add Apigatewayv2 related permissions (#71) (ramgudivada-lacework)([a615061](https://github.com/lacework/terraform-aws-config/commit/a61506128d66c0724547f4f3edf1a83ca2502c5e))
* feat: Add Apigateway related permissions (#70) (ramgudivada-lacework)([4306ac8](https://github.com/lacework/terraform-aws-config/commit/4306ac80436f03a3799f48641e14eed2b96e02db))
* feat: Add ReadOnly access to SSO APIs (#69) (Teddy Reed)([fc891e2](https://github.com/lacework/terraform-aws-config/commit/fc891e25d43ca741f9acd02b697ef24e595bb95e))
* feat: Add ReadOnly access to IdentityStore APIs (#68) (Teddy Reed)([ae70a06](https://github.com/lacework/terraform-aws-config/commit/ae70a06e76a9c1c9adf47fcea90a010ede2b1ea1))
## Other Changes
* ci: version bump to v0.11.1-dev (Lacework)([df9969c](https://github.com/lacework/terraform-aws-config/commit/df9969c8144d981d2a71381b1b08123e4b329edd))
## Bug Fixes
* fix(pin): module iam-role/aws version ~> 0.3.0
2 changes: 1 addition & 1 deletion VERSION
Original file line number Diff line number Diff line change
@@ -1 +1 @@
0.12.0
0.12.1
66 changes: 33 additions & 33 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -13,7 +13,7 @@ resource "random_id" "uniq" {

module "lacework_cfg_iam_role" {
source = "lacework/iam-role/aws"
version = "~> 0.3"
version = "~> 0.3.0"
create = var.use_existing_iam_role ? false : true
iam_role_name = var.iam_role_name
permission_boundary_arn = var.permission_boundary_arn
Expand Down Expand Up @@ -47,54 +47,54 @@ data "aws_iam_policy_document" "lacework_audit_policy" {
}

statement {
sid = "EFS"
actions = ["elasticfilesystem:DescribeFileSystemPolicy",
"elasticfilesystem:DescribeLifecycleConfiguration",
"elasticfilesystem:DescribeAccessPoints",
"elasticfilesystem:DescribeAccountPreferences",
"elasticfilesystem:DescribeBackupPolicy",
"elasticfilesystem:DescribeReplicationConfigurations"]
sid = "EFS"
actions = ["elasticfilesystem:DescribeFileSystemPolicy",
"elasticfilesystem:DescribeLifecycleConfiguration",
"elasticfilesystem:DescribeAccessPoints",
"elasticfilesystem:DescribeAccountPreferences",
"elasticfilesystem:DescribeBackupPolicy",
"elasticfilesystem:DescribeReplicationConfigurations"]
resources = ["*"]
}

statement {
sid = "EMR"
actions = ["elasticmapreduce:ListBootstrapActions",
"elasticmapreduce:ListInstanceFleets",
"elasticmapreduce:ListInstanceGroups"]
sid = "EMR"
actions = ["elasticmapreduce:ListBootstrapActions",
"elasticmapreduce:ListInstanceFleets",
"elasticmapreduce:ListInstanceGroups"]
resources = ["*"]
}

statement {
sid = "SAGEMAKER"
actions = ["sagemaker:GetModelPackageGroupPolicy",
"sagemaker:GetLineageGroupPolicy"]
sid = "SAGEMAKER"
actions = ["sagemaker:GetModelPackageGroupPolicy",
"sagemaker:GetLineageGroupPolicy"]
resources = ["*"]
}

statement {
sid = "IDENTITYSTORE"
actions = ["identitystore:DescribeGroup",
"identitystore:DescribeGroupMembership",
"identitystore:DescribeUser",
"identitystore:ListGroupMemberships",
"identitystore:ListGroupMembershipsForMember",
"identitystore:ListGroups",
"identitystore:ListUsers"]
sid = "IDENTITYSTORE"
actions = ["identitystore:DescribeGroup",
"identitystore:DescribeGroupMembership",
"identitystore:DescribeUser",
"identitystore:ListGroupMemberships",
"identitystore:ListGroupMembershipsForMember",
"identitystore:ListGroups",
"identitystore:ListUsers"]
resources = ["*"]
}

statement {
sid = "SSO"
actions = ["sso:DescribeAccountAssignmentDeletionStatus",
"sso:DescribeInstanceAccessControlAttributeConfiguration",
"sso:GetInlinePolicyForPermissionSet"]
sid = "SSO"
actions = ["sso:DescribeAccountAssignmentDeletionStatus",
"sso:DescribeInstanceAccessControlAttributeConfiguration",
"sso:GetInlinePolicyForPermissionSet"]
resources = ["*"]
}

statement {
sid = "APIGATEWAY"
actions = ["apigateway:GetApiKeys",
sid = "APIGATEWAY"
actions = ["apigateway:GetApiKeys",
"apigateway:GetAuthorizers",
"apigateway:GetBasePathMappings",
"apigateway:GetClientCertificates",
Expand All @@ -114,13 +114,13 @@ data "aws_iam_policy_document" "lacework_audit_policy" {
"apigateway:GetTags",
"apigateway:GetUsagePlanKeys",
"apigateway:GetUsagePlans",
"apigateway:GetVpcLinks"]
"apigateway:GetVpcLinks"]
resources = ["*"]
}

statement {
sid = "APIGATEWAYV2"
actions = ["apigatewayv2:GetApis",
sid = "APIGATEWAYV2"
actions = ["apigatewayv2:GetApis",
"apigatewayv2:GetApiMappings",
"apigatewayv2:GetAuthorizers",
"apigatewayv2:GetDeployments",
Expand All @@ -132,7 +132,7 @@ data "aws_iam_policy_document" "lacework_audit_policy" {
"apigatewayv2:GetRoute",
"apigatewayv2:GetRouteResponses",
"apigatewayv2:GetStages",
"apigatewayv2:GetVpcLinks"]
"apigatewayv2:GetVpcLinks"]
resources = ["*"]
}
}
Expand Down

0 comments on commit 870ec29

Please sign in to comment.