hackforla / devops-security

Management of Hack for L.A.'s AWS IAM resources
https://github.com/orgs/hackforla/projects/73/views/4
MIT License
0 stars 12 forks source link

Add new IAM user(Ryan Sakuma) #47

Closed RSkuma closed 3 months ago

RSkuma commented 3 months ago

Fixes #46

I have followed the pre-work checklist issue template for new Devops members. I have successfully initialized terrraform locally with the architecture specified, and am adding myself to the AWS user files. Please comment or provide any feedback if there is anything that I can do to improve this PR.

github-actions[bot] commented 3 months ago

Terraform plan in terraform

Plan: 3 to add, 0 to change, 0 to destroy. ```diff Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: + create Terraform will perform the following actions: # module.iam_user_rsakuma.aws_iam_user.user will be created + resource "aws_iam_user" "user" { + arn = (known after apply) + force_destroy = false + id = (known after apply) + name = "rsakuma" + path = "/" + tags = { + "Access Level" = "1" + "Project" = "devops-security" } + tags_all = { + "Access Level" = "1" + "Project" = "devops-security" } + unique_id = (known after apply) } # module.iam_user_rsakuma.aws_iam_user_group_membership.user_group_membership will be created + resource "aws_iam_user_group_membership" "user_group_membership" { + groups = [ + "read-only-group", ] + id = (known after apply) + user = "rsakuma" } # module.iam_user_rsakuma.aws_iam_user_login_profile.user_login will be created + resource "aws_iam_user_login_profile" "user_login" { + encrypted_password = (known after apply) + id = (known after apply) + key_fingerprint = (known after apply) + password = (known after apply) + password_length = 20 + password_reset_required = true + user = "rsakuma" } Plan: 3 to add, 0 to change, 0 to destroy. ```

:white_check_mark: Plan applied in Apply Terraform changes on merge #13

chelseybeck commented 3 months ago

Admin: run the following command from the AWS CLI:

aws iam update-login-profile --user-name rsakuma --password PASSWORD --password-reset-required