This repository was archived by the owner on Feb 4, 2026. It is now read-only.
generated from amazon-archives/__template_MIT-0
-
Notifications
You must be signed in to change notification settings - Fork 1
Expand file tree
/
Copy pathmain.tf
More file actions
98 lines (89 loc) · 3.13 KB
/
main.tf
File metadata and controls
98 lines (89 loc) · 3.13 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
data "aws_caller_identity" "current" {}
data "template_file" "kms_key_policy" {
template = file("${path.module}/kms_key_policy.json")
vars = {
account_id = data.aws_caller_identity.current.account_id
region = var.region
admin_user = data.aws_caller_identity.current.user_id
}
}
resource "aws_kms_key" "ssm_key" {
description = "Key Used for encrypting for Iam credential rotation module for ${var.iam_user} "
customer_master_key_spec = var.customer_master_key_spec
is_enabled = true
enable_key_rotation = var.enable_key_rotation
deletion_window_in_days = var.deletion_window
policy = data.template_file.kms_key_policy.rendered
tags = {
purpose = "ROTATING IAM KEYS FOR ${var.iam_user}"
}
}
resource "aws_kms_alias" "this" {
name = "alias/ssm-${var.iam_user}"
target_key_id = aws_kms_key.ssm_key.key_id
}
resource "aws_ssm_parameter" "current_secret_id" {
name = "/${var.iam_user}/iam-key"
description = "ROTATING IAM KEYS FOR ${var.iam_user} - This updates automatically"
type = "SecureString"
key_id = aws_kms_key.ssm_key.id
value = var.iam_key
tags = {
purpose = "ROTATING IAM KEYS FOR ${var.iam_user}"
}
lifecycle {
ignore_changes = [
# Ignore changes to aws_ssm_parameter secret value, because IAM key rotation module will update it.
value,
]
}
}
resource "aws_ssm_parameter" "current_secret_key" {
name = "/${var.iam_user}/iam-secret"
description = "ROTATING IAM KEYS FOR ${var.iam_user} - This updates automatically"
type = "SecureString"
key_id = aws_kms_key.ssm_key.id
value = var.iam_secret
tags = {
purpose = "ROTATING IAM KEYS FOR ${var.iam_user}"
}
lifecycle {
ignore_changes = [
# Ignore changes to aws_ssm_parameter secret value, because IAM key rotation module will update it.
value,
]
}
}
resource "aws_ssm_parameter" "deactivated_key_timestamp" {
name = "/${var.iam_user}/deactivated-key-timestamp"
description = "Timestamp for the deactivated key to be deleted for ${var.iam_user} - This updates automatically"
type = "String"
value = "-1"
tags = {
purpose = "ROTATING IAM KEYS FOR ${var.iam_user}"
}
lifecycle {
ignore_changes = [
# Ignore changes to aws_ssm_parameter value, because IAM key rotation module will update it.
value,
]
}
}
resource "null_resource" "iam_creds_rotation_script" {
triggers = { always_run = "${timestamp()}" }
provisioner "local-exec" {
command = "python3 ${path.module}/scripts/iam_creds_rotation_script.py > ./temp-${var.iam_user}.json"
environment = {
iam_user = var.iam_user
access_key_id = aws_ssm_parameter.current_secret_id.value
secret_key = aws_ssm_parameter.current_secret_key.value
max_age_in_days = var.max_age_days
delete_after_in_days = var.delete_after_days
region = var.region
}
}
}
data "local_sensitive_file" "iam_creds_file" {
filename = "./temp-${var.iam_user}.json"
depends_on = [null_resource.iam_creds_rotation_script]
}