-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add kudo-matic S3 buckets and IAM user #80
Conversation
Release version 4.1.1.
Release 4.2.0
Release 4.2.1
Release version 4.2.2
Release 4.3.0
Hey @JoostSaanen / @pascalw, ik mis nog even de IAM creds. Zal ik kijken of ik die toe kan voegen en kan importeren? |
Ja die heb ik aangemaakt via de console en toegevoegd aan Heroku |
policy_arn = aws_iam_policy.kudo_policy.arn | ||
} | ||
|
||
resource "aws_iam_access_key" "kudo_user_iam_access_key" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@JoostSaanen heb hier ook nog de key toegevoegd.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
What
Added AWS S3 buckets (kudo-o-matic-production, kudo-o-matic-development, kudo-o-matic-staging) and an IAM user with appropriate permissions using Terraform.
Why
Managing S3 buckets and IAM access via Terraform ensures consistency, security, and easier maintenance within the project. This setup allows controlled access to the storage resources needed by Kudo-o-Matic.
Code Review
Please consider the following checklist when reviewing this Pull Request.
More background and details here.