Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

MLPAB-1570 - create a fault injection simulator template the ecs app #936

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
59 commits
Select commit Hold shift + click to select a range
c2ab4b7
create a fault injection simulator template the ecs app
andrewpearce-digital Dec 19, 2023
8be6471
don't import existing one anymore
andrewpearce-digital Dec 19, 2023
ba940cc
expand abberv
andrewpearce-digital Dec 19, 2023
3e37c33
target names must start with a letter
andrewpearce-digital Dec 19, 2023
e66e85a
add name
andrewpearce-digital Dec 19, 2023
3832a4b
never create experiments for production
andrewpearce-digital Dec 19, 2023
1108a7d
add logging
andrewpearce-digital Dec 19, 2023
37a7c33
fix assume role
andrewpearce-digital Dec 19, 2023
d12692b
add some permissions, remove logs and log encryption
andrewpearce-digital Dec 20, 2023
5a06256
add ssm agent container
andrewpearce-digital Dec 20, 2023
201be00
add ssm agent to task
andrewpearce-digital Dec 20, 2023
4650fd7
add iam pre-reqs for fis
andrewpearce-digital Dec 20, 2023
8332de5
Setup FIS permissions
andrewpearce-digital Dec 22, 2023
00701fc
add task permissions for fis
andrewpearce-digital Dec 22, 2023
221d4e4
consolidate
andrewpearce-digital Dec 22, 2023
cef711e
add managed instance perms
andrewpearce-digital Dec 22, 2023
d77b3f6
use managed policies for fis role
andrewpearce-digital Jan 19, 2024
c991565
configure logging (not working in practice)
andrewpearce-digital Jan 19, 2024
505eca6
update lock
andrewpearce-digital Jan 19, 2024
73ec64a
add role to allow registration of instance
andrewpearce-digital Jan 19, 2024
8aff44d
add resource policy for log group
andrewpearce-digital Jan 19, 2024
980b6c0
select targets using tags
andrewpearce-digital Jan 19, 2024
624add7
test logging configuration
andrewpearce-digital Jan 19, 2024
fe160f3
allow fis role to encrypt logs
andrewpearce-digital Jan 19, 2024
90f808e
refactor role to pull in name and arn
andrewpearce-digital Jan 19, 2024
9bd10eb
resolve permissions message
andrewpearce-digital Jan 22, 2024
7131821
cleanup for suport request
andrewpearce-digital Jan 23, 2024
818d313
add comment to test creds change - unrelated to ticket
andrewpearce-digital Jan 23, 2024
fe3ad36
attache cloudwatch full access policy
andrewpearce-digital Jan 24, 2024
3a58c38
remove region from condition
andrewpearce-digital Jan 24, 2024
fdbb3ed
rename additional permission to create fis service linked role
andrewpearce-digital Jan 24, 2024
cbb47f1
cleanup
andrewpearce-digital Jan 24, 2024
5b3ab3d
fix lock
andrewpearce-digital Jan 25, 2024
4f76a6f
add caller identity
andrewpearce-digital Jan 25, 2024
00a938f
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Jan 29, 2024
8ea80e8
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Jan 29, 2024
4e167fa
readonly root filesystem
andrewpearce-digital Jan 29, 2024
02c0447
root access is needed for now
andrewpearce-digital Jan 29, 2024
3b2081b
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Jan 31, 2024
eedf002
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Feb 2, 2024
fe60c21
clean up
andrewpearce-digital Feb 2, 2024
d4c2909
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Feb 6, 2024
052f30f
create var for enabling fault ionjection experiments
andrewpearce-digital Feb 6, 2024
d4cab80
refactor experiments to it's own module
andrewpearce-digital Feb 6, 2024
0fa0424
make experiements conditional
andrewpearce-digital Feb 6, 2024
b0bd15e
reduce permissions
andrewpearce-digital Feb 6, 2024
a5dddcf
enable experiments
andrewpearce-digital Feb 6, 2024
d62e4fe
rename variable
andrewpearce-digital Feb 6, 2024
9b3167f
add example actions
andrewpearce-digital Feb 7, 2024
e579206
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Feb 7, 2024
ab8a995
conditionally deploy ssm agent container
andrewpearce-digital Feb 7, 2024
cd03f57
ssm role doesn't need passrole
andrewpearce-digital Feb 7, 2024
ef0f718
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Feb 7, 2024
3811a9e
fix conditional container definitions
andrewpearce-digital Feb 7, 2024
82c6283
Merge branch 'main' into MLPAB-1570-organise-a-fault-injection-simula…
andrewpearce-digital Feb 7, 2024
f3778f0
set desired count to autoscaling minimum
andrewpearce-digital Feb 7, 2024
a4b57b7
fix name of action
andrewpearce-digital Feb 7, 2024
0f5b84d
turn off experiments and reset autoscaling
andrewpearce-digital Feb 7, 2024
05e0ad5
cleanup comments
andrewpearce-digital Feb 7, 2024
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
12 changes: 6 additions & 6 deletions terraform/account/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -90,17 +90,17 @@ For terraform_environment, this will be based on your PR and can be found in the

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | 1.7.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | 1.7.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.eu_west_1"></a> [aws.eu\_west\_1](#provider\_aws.eu\_west\_1) | 5.34.0 |
| <a name="provider_aws.eu_west_2"></a> [aws.eu\_west\_2](#provider\_aws.eu\_west\_2) | 5.34.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | 5.34.0 |
| <a name="provider_aws.management_global"></a> [aws.management\_global](#provider\_aws.management\_global) | 5.34.0 |
| <a name="provider_aws.eu_west_1"></a> [aws.eu\_west\_1](#provider\_aws.eu\_west\_1) | 5.35.0 |
| <a name="provider_aws.eu_west_2"></a> [aws.eu\_west\_2](#provider\_aws.eu\_west\_2) | 5.35.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | 5.35.0 |
| <a name="provider_aws.management_global"></a> [aws.management\_global](#provider\_aws.management\_global) | 5.35.0 |

## Modules

Expand Down
10 changes: 5 additions & 5 deletions terraform/account/region/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -4,16 +4,16 @@
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.34.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | ~> 5.34.0 |
| <a name="provider_aws.management"></a> [aws.management](#provider\_aws.management) | ~> 5.34.0 |
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.34.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.35.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | ~> 5.35.0 |
| <a name="provider_aws.management"></a> [aws.management](#provider\_aws.management) | ~> 5.35.0 |
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.35.0 |

## Modules

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,13 @@ This module creates a S3 bucket for antivirus definitions, and a Lambda function
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.34.0 |
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.35.0 |

## Modules

Expand Down
4 changes: 2 additions & 2 deletions terraform/account/region/modules/dns_firewall/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,13 @@ This module creates a DNS Firewall rule group and rule group associations.
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.34.0 |
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.35.0 |

## Modules

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,13 @@ This module creates a S3 bucket for S3 Batch Job Manifests.
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.34.0 |
| <a name="provider_aws.region"></a> [aws.region](#provider\_aws.region) | ~> 5.35.0 |

## Modules

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,13 +8,13 @@ This module creates a S3 bucket event notifications and event notification filte
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.34.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.35.0 |

## Modules

Expand Down
18 changes: 9 additions & 9 deletions terraform/environment/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -113,19 +113,19 @@ For terraform_environment, this will be based on your PR and can be found in the

| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | 1.7.1 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_pagerduty"></a> [pagerduty](#requirement\_pagerduty) | 3.5.2 |
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | 1.7.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |
| <a name="requirement_pagerduty"></a> [pagerduty](#requirement\_pagerduty) | 3.7.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.eu_west_1"></a> [aws.eu\_west\_1](#provider\_aws.eu\_west\_1) | 5.34.0 |
| <a name="provider_aws.eu_west_2"></a> [aws.eu\_west\_2](#provider\_aws.eu\_west\_2) | 5.34.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | 5.34.0 |
| <a name="provider_aws.management_eu_west_1"></a> [aws.management\_eu\_west\_1](#provider\_aws.management\_eu\_west\_1) | 5.34.0 |
| <a name="provider_aws.management_global"></a> [aws.management\_global](#provider\_aws.management\_global) | 5.34.0 |
| <a name="provider_aws.eu_west_1"></a> [aws.eu\_west\_1](#provider\_aws.eu\_west\_1) | 5.35.0 |
| <a name="provider_aws.eu_west_2"></a> [aws.eu\_west\_2](#provider\_aws.eu\_west\_2) | 5.35.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | 5.35.0 |
| <a name="provider_aws.management_eu_west_1"></a> [aws.management\_eu\_west\_1](#provider\_aws.management\_eu\_west\_1) | 5.35.0 |
| <a name="provider_aws.management_global"></a> [aws.management\_global](#provider\_aws.management\_global) | 5.35.0 |

## Modules

Expand Down Expand Up @@ -167,7 +167,7 @@ For terraform_environment, this will be based on your PR and can be found in the
|------|-------------|------|---------|:--------:|
| <a name="input_container_version"></a> [container\_version](#input\_container\_version) | n/a | `string` | `"latest"` | no |
| <a name="input_default_role"></a> [default\_role](#input\_default\_role) | n/a | `string` | `"modernising-lpa-ci"` | no |
| <a name="input_environments"></a> [environments](#input\_environments) | n/a | <pre>map(<br> object({<br> account_id = string<br> account_name = string<br> is_production = bool<br> regions = list(string)<br> app = object({<br> env = object({<br> app_public_url = string<br> auth_redirect_base_url = string<br> notify_is_production = string<br> onelogin_url = string<br> })<br> autoscaling = object({<br> minimum = number<br> maximum = number<br> })<br> dependency_health_check_alarm_enabled = bool<br> service_health_check_alarm_enabled = bool<br> cloudwatch_application_insights_enabled = bool<br> })<br> mock_onelogin_enabled = bool<br> uid_service = object({<br> base_url = string<br> api_arns = list(string)<br> })<br> lpa_store_service = object({<br> base_url = string<br> api_arns = list(string)<br> })<br> backups = object({<br> backup_plan_enabled = bool<br> copy_action_enabled = bool<br> })<br> dynamodb = object({<br> region_replica_enabled = bool<br> stream_enabled = bool<br> })<br> ecs = object({<br> fargate_spot_capacity_provider_enabled = bool<br><br> })<br> cloudwatch_log_groups = object({<br> application_log_retention_days = number<br> })<br> application_load_balancer = object({<br> deletion_protection_enabled = bool<br> })<br> cloudwatch_application_insights_enabled = bool<br> pagerduty_service_name = string<br> event_bus = object({<br> target_event_bus_arn = string<br> receive_account_ids = list(string)<br> })<br> reduced_fees = object({<br> enabled = bool<br> s3_object_replication_enabled = bool<br> target_environment = string<br> destination_account_id = string<br> enable_s3_batch_job_replication_scheduler = bool<br> })<br> s3_antivirus_provisioned_concurrency = number<br> })<br> )</pre> | n/a | yes |
| <a name="input_environments"></a> [environments](#input\_environments) | n/a | <pre>map(<br> object({<br> account_id = string<br> account_name = string<br> is_production = bool<br> regions = list(string)<br> app = object({<br> env = object({<br> app_public_url = string<br> auth_redirect_base_url = string<br> notify_is_production = string<br> onelogin_url = string<br> })<br> autoscaling = object({<br> minimum = number<br> maximum = number<br> })<br> dependency_health_check_alarm_enabled = bool<br> service_health_check_alarm_enabled = bool<br> cloudwatch_application_insights_enabled = bool<br> fault_injection_experiments_enabled = bool<br> })<br> mock_onelogin_enabled = bool<br> uid_service = object({<br> base_url = string<br> api_arns = list(string)<br> })<br> lpa_store_service = object({<br> base_url = string<br> api_arns = list(string)<br> })<br> backups = object({<br> backup_plan_enabled = bool<br> copy_action_enabled = bool<br> })<br> dynamodb = object({<br> region_replica_enabled = bool<br> stream_enabled = bool<br> })<br> ecs = object({<br> fargate_spot_capacity_provider_enabled = bool<br><br> })<br> cloudwatch_log_groups = object({<br> application_log_retention_days = number<br> })<br> application_load_balancer = object({<br> deletion_protection_enabled = bool<br> })<br> cloudwatch_application_insights_enabled = bool<br> pagerduty_service_name = string<br> event_bus = object({<br> target_event_bus_arn = string<br> receive_account_ids = list(string)<br> })<br> reduced_fees = object({<br> enabled = bool<br> s3_object_replication_enabled = bool<br> target_environment = string<br> destination_account_id = string<br> enable_s3_batch_job_replication_scheduler = bool<br> })<br> s3_antivirus_provisioned_concurrency = number<br> })<br> )</pre> | n/a | yes |
| <a name="input_pagerduty_api_key"></a> [pagerduty\_api\_key](#input\_pagerduty\_api\_key) | n/a | `string` | n/a | yes |
| <a name="input_public_access_enabled"></a> [public\_access\_enabled](#input\_public\_access\_enabled) | n/a | `bool` | `false` | no |

Expand Down
19 changes: 16 additions & 3 deletions terraform/environment/global/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -58,14 +58,15 @@ No modules.
| Name | Version |
|------|---------|
| <a name="requirement_terraform"></a> [terraform](#requirement\_terraform) | >= 1.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.34.0 |
| <a name="requirement_pagerduty"></a> [pagerduty](#requirement\_pagerduty) | 3.5.2 |
| <a name="requirement_aws"></a> [aws](#requirement\_aws) | ~> 5.35.0 |
| <a name="requirement_pagerduty"></a> [pagerduty](#requirement\_pagerduty) | 3.7.0 |

## Providers

| Name | Version |
|------|---------|
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | ~> 5.34.0 |
| <a name="provider_aws"></a> [aws](#provider\_aws) | ~> 5.35.0 |
| <a name="provider_aws.global"></a> [aws.global](#provider\_aws.global) | ~> 5.35.0 |

## Modules

Expand All @@ -79,15 +80,27 @@ No modules.
| [aws_iam_role.app_task_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.cross_account_put](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.execution_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.fault_injection_simulator](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.s3_antivirus](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role.ssm_register_instance](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role) | resource |
| [aws_iam_role_policy.execution_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
| [aws_iam_role_policy.fault_injection_simulator_create_fis_service_linked_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
| [aws_iam_role_policy.ssm_register_instance_permissions](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy) | resource |
| [aws_iam_role_policy_attachment.cloudwatch_logs_full_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.fault_injection_simulator_ecs_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.fault_injection_simulator_ssm_access](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_iam_role_policy_attachment.s3_antivirus_execution_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/iam_role_policy_attachment) | resource |
| [aws_resourcegroups_group.environment_global](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/resources/resourcegroups_group) | resource |
| [aws_caller_identity.global](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/caller_identity) | data source |
| [aws_default_tags.current](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/default_tags) | data source |
| [aws_iam_policy_document.cross_account_put_assume_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.execution_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.execution_role_assume_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.fault_injection_simulator_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.fault_injection_simulator_create_fis_service_linked_role](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.lambda_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.ssm_register_instance_assume](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.ssm_register_instance_permissions](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |
| [aws_iam_policy_document.task_role_assume_policy](https://registry.terraform.io/providers/hashicorp/aws/latest/docs/data-sources/iam_policy_document) | data source |

## Inputs
Expand Down
4 changes: 4 additions & 0 deletions terraform/environment/global/data_sources.tf
Original file line number Diff line number Diff line change
@@ -1,3 +1,7 @@
data "aws_default_tags" "current" {
provider = aws.global
}

data "aws_caller_identity" "global" {
provider = aws.global
}
1 change: 1 addition & 0 deletions terraform/environment/global/iam_ecs_task_roles.tf
Original file line number Diff line number Diff line change
Expand Up @@ -16,3 +16,4 @@ data "aws_iam_policy_document" "task_role_assume_policy" {
}
provider = aws.global
}

Loading
Loading