Skip to content

refactor#101: organization resource 위치 변경#103

Merged
sh1220 merged 2 commits intomainfrom
refactor/#101
Jul 30, 2025
Merged

refactor#101: organization resource 위치 변경#103
sh1220 merged 2 commits intomainfrom
refactor/#101

Conversation

@sh1220
Copy link
Contributor

@sh1220 sh1220 commented Jul 29, 2025

#️⃣ Related Issues

#101

📝 Work Summary

organization 리소스를 management account에서 실행하도록, 폴더 위치 변경
현재 dynamodb를 간단히 s3에 대해서로 설정해두었음.
(이후에 OIDC/iam의 backend.tf와 지금 organzation의 backend.tf의 dynamodb table 설정 필요)

Screenshot (Optional)

💬 Review Notes (Optional)

Add any specific points you would like the reviewers to focus on.

@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory management-team-account/organization/organizations
Executed At 2025-07-29 16:04:01 UTC

Plan Output

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_organizations_delegated_administrator.security_delegates["detective.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:42Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/detective.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["guardduty.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:38Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/guardduty.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["inspector2.amazonaws.com"] will be created
  + resource "aws_organizations_delegated_administrator" "security_delegates" {
      + account_id              = "502676416967"
      + arn                     = (known after apply)
      + delegation_enabled_date = (known after apply)
      + email                   = (known after apply)
      + id                      = (known after apply)
      + joined_method           = (known after apply)
      + joined_timestamp        = (known after apply)
      + name                    = (known after apply)
      + service_principal       = "inspector2.amazonaws.com"
      + status                  = (known after apply)
    }

  # aws_organizations_delegated_administrator.security_delegates["securityhub.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:40Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/securityhub.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

Plan: 4 to add, 0 to change, 3 to destroy.

Plan Error (if any)


@github-actions
Copy link

[Terraform Plan Summary]

항목
Status success
Directory management-team-account/organization/organizations
Executed At 2025-07-30 05:07:21 UTC

Plan Output

Terraform used the selected providers to generate the following execution
plan. Resource actions are indicated with the following symbols:
  + create
-/+ destroy and then create replacement

Terraform will perform the following actions:

  # aws_organizations_delegated_administrator.security_delegates["detective.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:42Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/detective.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["guardduty.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:38Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/guardduty.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

  # aws_organizations_delegated_administrator.security_delegates["inspector2.amazonaws.com"] will be created
  + resource "aws_organizations_delegated_administrator" "security_delegates" {
      + account_id              = "502676416967"
      + arn                     = (known after apply)
      + delegation_enabled_date = (known after apply)
      + email                   = (known after apply)
      + id                      = (known after apply)
      + joined_method           = (known after apply)
      + joined_timestamp        = (known after apply)
      + name                    = (known after apply)
      + service_principal       = "inspector2.amazonaws.com"
      + status                  = (known after apply)
    }

  # aws_organizations_delegated_administrator.security_delegates["securityhub.amazonaws.com"] must be replaced
-/+ resource "aws_organizations_delegated_administrator" "security_delegates" {
      ~ account_id              = "694318440367" -> "502676416967" # forces replacement
      ~ arn                     = "arn:aws:organizations::433331841346:account/o-aew1m4e394/694318440367" -> (known after apply)
      ~ delegation_enabled_date = "2025-06-03T11:55:40Z" -> (known after apply)
      ~ email                   = "whs-cloudfence+security-team@googlegroups.com" -> (known after apply)
      ~ id                      = "694318440367/securityhub.amazonaws.com" -> (known after apply)
      ~ joined_method           = "CREATED" -> (known after apply)
      ~ joined_timestamp        = "2025-06-03T11:55:26Z" -> (known after apply)
      ~ name                    = "security-team-account" -> (known after apply)
      ~ status                  = "ACTIVE" -> (known after apply)
        # (1 unchanged attribute hidden)
    }

Plan: 4 to add, 0 to change, 3 to destroy.

Plan Error (if any)

(no errors)

@github-actions
Copy link

💰 Infracost report

Monthly estimate generated

Estimate details (includes details of unsupported resources)
──────────────────────────────────
1 project has no cost estimate change.
Run the following command to see its breakdown: infracost breakdown --path=/path/to/code

──────────────────────────────────
12 cloud resources were detected:
∙ 0 were estimated
∙ 6 were free
∙ 6 are not supported yet, see https://infracost.io/requested-resources:
  ∙ 5 x aws_organizations_delegated_administrator
  ∙ 1 x aws_organizations_organization
This comment will be updated when code changes.

Copy link
Contributor

@yunhoch0i yunhoch0i left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

폴더 구조 변경 확인했습니다.

@sh1220 sh1220 merged commit e046a80 into main Jul 30, 2025
2 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants