-
-
Notifications
You must be signed in to change notification settings - Fork 133
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add optional policy allowing push access #98
Conversation
/test all |
Thanks for the contribution. I'm just trying to get a second set of eyes on this to make sure it's what we want in this module. |
Use distinct function for override policy document |
Either we should move lambda condition to independent or add in push policy as welll I prefer it should be independent |
I'm not sure I follow. Where do you think there should be a distinct function? |
Main.tf line no 250 |
Maybe I'm missing something but I think that would require restructuring the module so that the all (push, readonly, full) Or I'm looking at the wrong thing... |
main.tf
Outdated
override_policy_documents = local.principals_full_access_non_empty ? [data.aws_iam_policy_document.resource_full_access[0].json] : [data.aws_iam_policy_document.empty[0].json] | ||
count = module.this.enabled ? 1 : 0 | ||
source_policy_documents = local.principals_readonly_access_non_empty ? [data.aws_iam_policy_document.resource_readonly_access[0].json] : [data.aws_iam_policy_document.empty[0].json] | ||
override_policy_documents = [ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
override_policy_documents = [ | |
override_policy_documents = distinct([]) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
You mean to wrap distinct([
around lines 253 and 254 ?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Also adding lambda principal policy as whole would be great so if someone wants a repo with lambda ran can be done as well without others statements policy
i see the bridgecrew code analysis is failing but i'm not able to see the output of the job |
/test all |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@kpankonen please see comments
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
please see comments
@kpankonen currently lambda access is granted using dynamic statements in each group and it may be problematic if someone want to create and ECR with just lambda access as resource policy. then policy might be missing because we are checking if the system has push or pull or full variables then only create not based on lambda too. We should have independent staement for lambda access policy. |
@aknysh @nitrocode is there anything else i can do to help get this merged? |
/test all |
/rebuild-readme |
/test all |
958e12a
to
291e7c4
Compare
done! |
/test all |
anything else needed? |
Argh @kpankonen -- we're doing you wrong here with multiple of us trying to move it forward, but then dropping the ball (we get drowned in a sea of GH notification emails as part of being on the maintainer team, so that is our excuse 😅 ). Can you please address the conflicts or try rebasing again? Once this is ready to go, ping me here or better yet in the SweetOps slack and I will be sure to get this over the line for you. Thanks for the work and patience! |
Co-authored-by: nitrocode <7775707+nitrocode@users.noreply.github.com>
291e7c4
to
7dc3b63
Compare
/terratest |
Co-authored-by: Matt Gowie <matt@masterpoint.io>
c5a82a6
to
e20bdcd
Compare
@Gowiem updated |
/terratest |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@aknysh I believe we need your approval to move this forward. FYI, I am going to do a fast follow on this PR today or tomorrow to break out the |
what
why
principals_push_access
to give push-only access.references