diff --git a/examples/snippets/stacks/workflows/quickstart/foundation/accounts.yaml b/examples/snippets/stacks/workflows/quickstart/foundation/accounts.yaml index 6074bdbfa..89207b7e0 100644 --- a/examples/snippets/stacks/workflows/quickstart/foundation/accounts.yaml +++ b/examples/snippets/stacks/workflows/quickstart/foundation/accounts.yaml @@ -17,7 +17,6 @@ workflows: description: Deploys all AWS Organization accounts steps: - command: terraform apply account -s core-gbl-root - - command: terraform deploy account-map -s core-gbl-root deploy/account-settings: description: Apply AWS Account settings for best practices. @@ -26,7 +25,6 @@ workflows: - command: terraform deploy account-settings -s core-gbl-audit - command: terraform deploy account-settings -s core-gbl-auto - command: terraform deploy account-settings -s core-gbl-dns - - command: terraform deploy account-settings -s core-gbl-identity - command: terraform deploy account-settings -s core-gbl-network - command: terraform deploy account-settings -s core-gbl-root - command: terraform deploy account-settings -s core-gbl-security diff --git a/examples/snippets/stacks/workflows/quickstart/foundation/baseline.yaml b/examples/snippets/stacks/workflows/quickstart/foundation/baseline.yaml index 9b8af8ae1..1a951662e 100644 --- a/examples/snippets/stacks/workflows/quickstart/foundation/baseline.yaml +++ b/examples/snippets/stacks/workflows/quickstart/foundation/baseline.yaml @@ -13,7 +13,6 @@ workflows: description: Vendor baseline layer components. steps: - command: vendor pull --component account - - command: vendor pull --component account-map - command: vendor pull --component account-quotas - command: vendor pull --component account-settings - command: vendor pull --component cloudtrail @@ -30,10 +29,7 @@ workflows: - command: terraform deploy tfstate-backend -var="access_roles_enabled=false" --stack core-use1-root --init-run-reconfigure=false deploy/tfstate: - description: >- - Deploy Terraform State Backend. - - Finalize Terraform State Backend access, which requires AWS Teams to be deployed first. + description: Deploy Terraform State Backend. steps: - command: terraform deploy tfstate-backend --stack core-use1-root diff --git a/examples/snippets/stacks/workflows/quickstart/foundation/github.yaml b/examples/snippets/stacks/workflows/quickstart/foundation/github.yaml index baddc0a97..af648c7d1 100644 --- a/examples/snippets/stacks/workflows/quickstart/foundation/github.yaml +++ b/examples/snippets/stacks/workflows/quickstart/foundation/github.yaml @@ -11,7 +11,7 @@ workflows: description: | This workflow deploys Github OIDC Provider Configuration for Github Runners steps: - - command: terraform deploy github-oidc-provider -s core-gbl-identity + - command: terraform deploy github-oidc-provider -s core-use1-auto - command: terraform deploy github-oidc-provider -s core-gbl-artifacts - command: terraform deploy github-oidc-provider -s core-gbl-auto - command: terraform deploy github-oidc-provider -s plat-gbl-dev diff --git a/examples/snippets/stacks/workflows/quickstart/foundation/gitops.yaml b/examples/snippets/stacks/workflows/quickstart/foundation/gitops.yaml index 28dce85e1..a53e19e57 100644 --- a/examples/snippets/stacks/workflows/quickstart/foundation/gitops.yaml +++ b/examples/snippets/stacks/workflows/quickstart/foundation/gitops.yaml @@ -10,14 +10,14 @@ workflows: description: Vendor Gitops required components. steps: - command: vendor pull --component github-oidc-provider - - command: vendor pull --component github-oidc-role + - command: vendor pull --component iam-role - command: vendor pull --component dynamodb - command: vendor pull --component s3-bucket deploy: description: Run deployment for Gitops requirements steps: - - command: terraform deploy github-oidc-provider -s core-gbl-identity + - command: terraform deploy github-oidc-provider -s core-use1-auto - command: terraform deploy gitops/s3-bucket --stack core-use1-auto - command: terraform deploy gitops/dynamodb --stack core-use1-auto - - command: terraform deploy github-oidc-role/gitops --stack core-use1-auto \ No newline at end of file + - command: terraform deploy iam-role/gitops --stack core-use1-auto \ No newline at end of file diff --git a/examples/snippets/stacks/workflows/quickstart/foundation/identity.yaml b/examples/snippets/stacks/workflows/quickstart/foundation/identity.yaml index 56c708967..d5c909994 100644 --- a/examples/snippets/stacks/workflows/quickstart/foundation/identity.yaml +++ b/examples/snippets/stacks/workflows/quickstart/foundation/identity.yaml @@ -37,10 +37,7 @@ workflows: vendor/components: description: Vendor identity layer components. steps: - - command: vendor pull --component aws-saml - command: vendor pull --component aws-sso - - command: vendor pull --component aws-team-roles - - command: vendor pull --component aws-teams vendor/aws-config: description: Vendor aws-config script. @@ -59,38 +56,13 @@ workflows: deploy/all: description: Deploy all identity components. steps: - - command: workflow deploy/saml -f quickstart/foundation/identity - command: workflow deploy/sso -f quickstart/foundation/identity - - command: workflow deploy/teams -f quickstart/foundation/identity - - command: workflow update-aws-config -f quickstart/foundation/identity - - deploy/saml: - description: Update aws-saml configuration (when adding a new Identity Provider). - steps: - - command: terraform deploy aws-saml -s core-gbl-identity deploy/sso: description: Update aws-sso configuration. steps: - command: terraform deploy aws-sso -s core-gbl-root - deploy/teams: - description: Establish cross account AWS Teams roles for access. - steps: - - command: terraform deploy aws-teams -s core-gbl-identity - - command: terraform deploy aws-team-roles -s core-gbl-artifacts - - command: terraform deploy aws-team-roles -s core-gbl-audit - - command: terraform deploy aws-team-roles -s core-gbl-auto - - command: terraform deploy aws-team-roles -s core-gbl-dns - - command: terraform deploy aws-team-roles -s core-gbl-identity - - command: terraform deploy aws-team-roles -s core-gbl-network - - command: terraform deploy aws-team-roles -s core-gbl-root - - command: terraform deploy aws-team-roles -s core-gbl-security - - command: terraform deploy aws-team-roles -s plat-gbl-dev - - command: terraform deploy aws-team-roles -s plat-gbl-prod - - command: terraform deploy aws-team-roles -s plat-gbl-sandbox - - command: terraform deploy aws-team-roles -s plat-gbl-staging - update-aws-config: description: Update AWS Config files. steps: diff --git a/examples/snippets/stacks/workflows/quickstart/monitor/compliance.yaml b/examples/snippets/stacks/workflows/quickstart/monitor/compliance.yaml index 2a595afaf..42c62230f 100644 --- a/examples/snippets/stacks/workflows/quickstart/monitor/compliance.yaml +++ b/examples/snippets/stacks/workflows/quickstart/monitor/compliance.yaml @@ -37,39 +37,22 @@ workflows: deploy/aws-config/superadmin: description: Deploy AWS Config into accounts that require SuperAdmin to apply steps: - - command: terraform deploy aws-config-use1 -s core-use1-identity - command: terraform deploy aws-config-use1 -s core-use1-root - - command: terraform deploy aws-config-use2 -s core-use2-identity - command: terraform deploy aws-config-use2 -s core-use2-root - - command: terraform deploy aws-config-usw1 -s core-usw1-identity - command: terraform deploy aws-config-usw1 -s core-usw1-root - - command: terraform deploy aws-config-usw2 -s core-usw2-identity - command: terraform deploy aws-config-usw2 -s core-usw2-root - - command: terraform deploy aws-config-aps1 -s core-aps1-identity - command: terraform deploy aws-config-aps1 -s core-aps1-root - - command: terraform deploy aws-config-apne3 -s core-apne3-identity - command: terraform deploy aws-config-apne3 -s core-apne3-root - - command: terraform deploy aws-config-apne2 -s core-apne2-identity - command: terraform deploy aws-config-apne2 -s core-apne2-root - - command: terraform deploy aws-config-apne1 -s core-apne1-identity - command: terraform deploy aws-config-apne1 -s core-apne1-root - - command: terraform deploy aws-config-apse1 -s core-apse1-identity - command: terraform deploy aws-config-apse1 -s core-apse1-root - - command: terraform deploy aws-config-apse2 -s core-apse2-identity - command: terraform deploy aws-config-apse2 -s core-apse2-root - - command: terraform deploy aws-config-cac1 -s core-cac1-identity - command: terraform deploy aws-config-cac1 -s core-cac1-root - - command: terraform deploy aws-config-euc1 -s core-euc1-identity - command: terraform deploy aws-config-euc1 -s core-euc1-root - - command: terraform deploy aws-config-euw1 -s core-euw1-identity - command: terraform deploy aws-config-euw1 -s core-euw1-root - - command: terraform deploy aws-config-euw2 -s core-euw2-identity - command: terraform deploy aws-config-euw2 -s core-euw2-root - - command: terraform deploy aws-config-euw3 -s core-euw3-identity - command: terraform deploy aws-config-euw3 -s core-euw3-root - - command: terraform deploy aws-config-eun1 -s core-eun1-identity - command: terraform deploy aws-config-eun1 -s core-eun1-root - - command: terraform deploy aws-config-sae1 -s core-sae1-identity - command: terraform deploy aws-config-sae1 -s core-sae1-root deploy/security-hub/step1: