Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Set org id as a list to allow multiple orgs in the same AWS account Result of tf plan on an existing apply ``` Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # module.sn_managed_cloud.aws_iam_role.bootstrap_role[0] will be updated in-place ~ resource "aws_iam_role" "bootstrap_role" { ~ assume_role_policy = jsonencode( ~ { ~ Statement = [ ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, { Action = "sts:AssumeRoleWithWebIdentity" Condition = { StringEquals = { "accounts.google.com:aud" = "108050666045451143798" } } Effect = "Allow" Principal = { Federated = "accounts.google.com" } Sid = "AllowStreamNativeControlPlaneAccess" }, ] # (1 unchanged attribute hidden) } ) id = "StreamNativeCloudBootstrapRole" name = "StreamNativeCloudBootstrapRole" tags = { "SNVersion" = "3.14.1" "Vendor" = "StreamNative" } # (10 unchanged attributes hidden) } # module.sn_managed_cloud.aws_iam_role.management_role will be updated in-place ~ resource "aws_iam_role" "management_role" { ~ assume_role_policy = jsonencode( ~ { ~ Statement = [ ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, { Action = "sts:AssumeRoleWithWebIdentity" Condition = { StringEquals = { "accounts.google.com:aud" = "108050666045451143798" } } Effect = "Allow" Principal = { Federated = "accounts.google.com" } Sid = "AllowStreamNativeControlPlaneAccess" }, ] # (1 unchanged attribute hidden) } ) id = "StreamNativeCloudManagementRole" name = "StreamNativeCloudManagementRole" tags = { "SNVersion" = "3.14.1" "Vendor" = "StreamNative" } # (10 unchanged attributes hidden) } Plan: 0 to add, 2 to change, 0 to destroy. ``` ### Apply results ``` Terraform used the selected providers to generate the following execution plan. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # module.sn_managed_cloud.aws_iam_role.bootstrap_role[0] will be updated in-place ~ resource "aws_iam_role" "bootstrap_role" { ~ assume_role_policy = jsonencode( ~ { ~ Statement = [ ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, { Action = "sts:AssumeRoleWithWebIdentity" Condition = { StringEquals = { "accounts.google.com:aud" = "108050666045451143798" } } Effect = "Allow" Principal = { Federated = "accounts.google.com" } Sid = "AllowStreamNativeControlPlaneAccess" }, ] # (1 unchanged attribute hidden) } ) id = "StreamNativeCloudBootstrapRole" name = "StreamNativeCloudBootstrapRole" tags = { "SNVersion" = "3.14.1" "Vendor" = "StreamNative" } # (10 unchanged attributes hidden) } # module.sn_managed_cloud.aws_iam_role.management_role will be updated in-place ~ resource "aws_iam_role" "management_role" { ~ assume_role_policy = jsonencode( ~ { ~ Statement = [ ~ { ~ Condition = { + "ForAllValues:StringEquals" = { + "sts:ExternalId" = [ + "o-nd3gv", + "o-z7cmp", ] } - StringEquals = { - "sts:ExternalId" = "o-nd3gv" } } # (4 unchanged attributes hidden) }, { Action = "sts:AssumeRoleWithWebIdentity" Condition = { StringEquals = { "accounts.google.com:aud" = "108050666045451143798" } } Effect = "Allow" Principal = { Federated = "accounts.google.com" } Sid = "AllowStreamNativeControlPlaneAccess" }, ] # (1 unchanged attribute hidden) } ) id = "StreamNativeCloudManagementRole" name = "StreamNativeCloudManagementRole" tags = { "SNVersion" = "3.14.1" "Vendor" = "StreamNative" } # (10 unchanged attributes hidden) } Plan: 0 to add, 2 to change, 0 to destroy. Do you want to perform these actions? Terraform will perform the actions described above. Only 'yes' will be accepted to approve. Enter a value: yes module.sn_managed_cloud.aws_iam_role.bootstrap_role[0]: Modifying... [id=StreamNativeCloudBootstrapRole] module.sn_managed_cloud.aws_iam_role.management_role: Modifying... [id=StreamNativeCloudManagementRole] module.sn_managed_cloud.aws_iam_role.bootstrap_role[0]: Modifications complete after 0s [id=StreamNativeCloudBootstrapRole] module.sn_managed_cloud.aws_iam_role.management_role: Modifications complete after 1s [id=StreamNativeCloudManagementRole] Apply complete! Resources: 0 added, 2 changed, 0 destroyed. ```
- Loading branch information