-
Notifications
You must be signed in to change notification settings - Fork 1
feat: Scope KMS policy to the exact KMS key #295
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
@arya-girish-k any update on this? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Lets forget about DA updates in this PR - the DA is being refactored in #300 and it will handle the DA updates
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see comments
1.Added two policies in the rootmodule and DA.
Since it is Known error, removed this line in complete example. |
/run pipeline |
/run pipeline |
/run pipeline |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
see final comments
/run pipeline |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
just realised we don't need the new boolean in the DA - we can parse the CRN (see comment)
/run pipeline |
/run pipeline |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We seem to be missing logic in the module that verifies if is_hpcs_key
is set to true, it matches the instance type in the kms_key_crn
value. Can you add it please?
/run pipeline |
🎉 This PR is included in version 1.26.0 🎉 The release is available on:
Your semantic-release bot 📦🚀 |
Description
Scope KMS policy to the exact KMS key
Git_issue.
Release required?
x.x.X
)x.X.x
)X.x.x
)Release notes content
As part of addressing this issue,made the following modification:
is_hpcs_key
to create the second policy.kms_instance_guid
fromkms_key_crn_parser
, removing theexisting_kms_instance_guid
.Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers