Skip to content

Commit a4eea92

Browse files
authored
adding aws vault ci permissions to destroy enos aws engine test resources (#30185)
1 parent a246bda commit a4eea92

File tree

2 files changed

+4
-3
lines changed

2 files changed

+4
-3
lines changed

enos/README.md

+3-3
Original file line numberDiff line numberDiff line change
@@ -227,15 +227,15 @@ Here are the steps to configure the GitHub Actions service user:
227227
- Access can be requested by clicking: `Cloud Access` --> `AWS` --> `Request Account Access`.
228228

229229
1. **Create the Terraform Cloud Workspace** - The name of the workspace to be created depends on the
230-
repository for which it is being created, but the pattern is: `<repository>-ci-service-user-iam`,
231-
e.g. `vault-ci-service-user-iam`. It is important that the execution mode for the workspace be set
230+
repository for which it is being created, but the pattern is: `<repository>-ci-enos-service-user-iam`,
231+
e.g. `vault-ci-enos-service-user-iam`. It is important that the execution mode for the workspace be set
232232
to `local`. For help on setting up the workspace, contact the QT team on Slack (#team-quality)
233233

234234

235235
2. **Execute the Terraform module**
236236
```shell
237237
> cd ./enos/ci/service-user-iam
238-
> export TF_WORKSPACE=<repo name>-ci-service-user-iam
238+
> export TF_WORKSPACE=<repo name>-ci-enos-service-user-iam
239239
> export TF_TOKEN_app_terraform_io=<Terraform Cloud Token>
240240
> export TF_VAR_repository=<repository name>
241241
> terraform init

enos/ci/service-user-iam/main.tf

+1
Original file line numberDiff line numberDiff line change
@@ -74,6 +74,7 @@ data "aws_iam_policy_document" "aws_nuke" {
7474
"iam:ListAccessKeys",
7575
"iam:ListAccountAliases",
7676
"iam:ListGroupsForUser",
77+
"iam:ListMFADevices",
7778
"iam:ListUserPolicies",
7879
"iam:ListUserTags",
7980
"iam:ListUsers",

0 commit comments

Comments
 (0)