-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Scope Policy To Exact KMS Key #270
Conversation
/run pipeline |
/run pipeline |
@Vipin654, in PR template
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
See comment #270 (comment).
@Ak-sky UPGRADE test has to be skipped because Auth Policy will be destroyed and re-created which is a breaking change. I have Pasted screenshot for your reference. |
/run pipeline |
main.tf
Outdated
count = (var.kms_encryption_enabled && !var.skip_iam_authorization_policy) ? 1 : 0 | ||
source_service_name = "appid" | ||
source_resource_group_id = var.resource_group_id | ||
description = "Allow all AppID instances in the given resource group reader access to KMS instance ${var.existing_kms_instance_guid}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Description should be like this if source is scoped to resource group id.
description = "Allow all AppID instances in the given resource group reader access to KMS instance ${var.existing_kms_instance_guid}" | |
description = "Allow all AppID instances in the given resource group ${var.resource_group_id} to read the ${local.kms_service} key ${local.kms_key_id} from instance ${var.existing_kms_instance_guid}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Description has been changed.
/run pipeline |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see comment, there is a bug in count logic
/run pipeline |
🎉 This PR is included in version 1.3.0 🎉 The release is available on GitHub release Your semantic-release bot 📦🚀 |
Description
Scoping IAM Auth Policy to a specific key in the key protect instance instead of targeting the whole instance.
[Git Issue] : #243
Release required?
x.x.X
)x.X.x
)X.x.x
)Release notes content
Scoping IAM Auth Policy to a specific key in the key protect instance instead of targeting the whole instance.
Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers