Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new IAM user(Ryan Sakuma) #47

Merged
merged 1 commit into from
Aug 15, 2024
Merged

Conversation

RSkuma
Copy link
Member

@RSkuma RSkuma commented Jul 22, 2024

Fixes #46

I have followed the pre-work checklist issue template for new Devops members. I have successfully initialized terrraform locally with the architecture specified, and am adding myself to the AWS user files. Please comment or provide any feedback if there is anything that I can do to improve this PR.

Copy link

github-actions bot commented Jul 22, 2024

Terraform plan in terraform

Plan: 3 to add, 0 to change, 0 to destroy.
Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
+   create

Terraform will perform the following actions:

  # module.iam_user_rsakuma.aws_iam_user.user will be created
+   resource "aws_iam_user" "user" {
+       arn           = (known after apply)
+       force_destroy = false
+       id            = (known after apply)
+       name          = "rsakuma"
+       path          = "/"
+       tags          = {
+           "Access Level" = "1"
+           "Project"      = "devops-security"
        }
+       tags_all      = {
+           "Access Level" = "1"
+           "Project"      = "devops-security"
        }
+       unique_id     = (known after apply)
    }

  # module.iam_user_rsakuma.aws_iam_user_group_membership.user_group_membership will be created
+   resource "aws_iam_user_group_membership" "user_group_membership" {
+       groups = [
+           "read-only-group",
        ]
+       id     = (known after apply)
+       user   = "rsakuma"
    }

  # module.iam_user_rsakuma.aws_iam_user_login_profile.user_login will be created
+   resource "aws_iam_user_login_profile" "user_login" {
+       encrypted_password      = (known after apply)
+       id                      = (known after apply)
+       key_fingerprint         = (known after apply)
+       password                = (known after apply)
+       password_length         = 20
+       password_reset_required = true
+       user                    = "rsakuma"
    }

Plan: 3 to add, 0 to change, 0 to destroy.

✅ Plan applied in Apply Terraform changes on merge #13

@chelseybeck
Copy link
Member

chelseybeck commented Aug 15, 2024

Admin: run the following command from the AWS CLI:

aws iam update-login-profile --user-name rsakuma --password PASSWORD --password-reset-required

Copy link
Member

@chelseybeck chelseybeck left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great work, @RSkuma - these changes look good

@chelseybeck chelseybeck merged commit 4c2eb03 into main Aug 15, 2024
1 check passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Requesting IAM user - Ryan Sakuma(devops)
2 participants