Skip to content

refactor#101: delegate administrator#102

Merged
sh1220 merged 1 commit intomainfrom
refactor/#101
Jul 29, 2025
Merged

refactor#101: delegate administrator#102
sh1220 merged 1 commit intomainfrom
refactor/#101

Conversation

@sh1220
Copy link
Contributor

@sh1220 sh1220 commented Jul 29, 2025

#️⃣ Related Issues

#101

📝 Work Summary

  • delegate admin으로 권한을 받는 account를 security에서 operation account로 변경

Screenshot (Optional)

💬 Review Notes (Optional)

Add any specific points you would like the reviewers to focus on.

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory identity-team-account/organization/organizations
Executed At 2025-07-29 14:35:45 UTC

Plan Output

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_organizations_delegated_administrator.security_delegates["detective.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:42Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/detective.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["guardduty.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:38Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/guardduty.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["inspector2.amazonaws.com"] will be created
  + resource "aws_organizations_delegated_administrator" "security_delegates" {
      + account_id              = "502676416967"
      + arn                     = (known after apply)
      + delegation_enabled_date = (known after apply)
      + email                   = (known after apply)
      + id                      = (known after apply)
      + joined_method           = (known after apply)
      + joined_timestamp        = (known after apply)
      + name                    = (known after apply)
      + service_principal       = "inspector2.amazonaws.com"
      + status                  = (known after apply)
    }

  # aws_organizations_delegated_administrator.security_delegates["securityhub.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:40Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/securityhub.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

Plan: 4 to add, 0 to change, 3 to destroy.

Plan Error (if any)


@github-actions
Copy link

💰 Infracost report

Monthly estimate generated

Estimate details (includes details of unsupported resources)
──────────────────────────────────
1 project has no cost estimate change.
Run the following command to see its breakdown: infracost breakdown --path=/path/to/code

──────────────────────────────────
12 cloud resources were detected:
∙ 0 were estimated
∙ 6 were free
∙ 6 are not supported yet, see https://infracost.io/requested-resources:
  ∙ 5 x aws_organizations_delegated_administrator
  ∙ 1 x aws_organizations_organization
This comment will be updated when code changes.

Copy link
Contributor

@yunhoch0i yunhoch0i left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

delegation 관련해서 받는 필요한 계정 승인 및 CI 내역 확인했습니다.

@sh1220 sh1220 merged commit 484fd71 into main Jul 29, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants