-
Notifications
You must be signed in to change notification settings - Fork 913
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vpc sc allow null for identity type #1632
Vpc sc allow null for identity type #1632
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @LudovicEmo. I left a comment below.
Can you please run tools/tfdoc.py
to update the readme?
@LudovicEmo can you provide a code example where the module fails today. The example you listed in (1) doesn't use null but |
not sure what is needed here, already updated README with tfdoc in commit 65b32ea |
The example of the Google documentation uses identityType: ANY_USER_ACCOUNT (https://cloud.google.com/bigquery/docs/connected-sheets#vpc-service-controls). However here we are not opening for any user account, we are controlling the list of identities.
|
Understood. Thanks for the context, I think it makes sense.
Run it again because the linter is complaining. |
Thank you for being thorough and making our job easy! :) |
Hello,
modules/vpc-sc is already supporting null for ingress_policies.identity_type.
This PR adds support for null for egress_policies.identity_type.
Example
This is required for example to implement an egress rule for using Connected sheets with Bigquery for a selected list of identities (refer to [1]).
In the following example, egressFrom.identityType is absent (hence null), and the list of identities is managed through identities.
As mentioned here [2], the egress_from.identity_type is optional, specifies the type of identities that are allowed access to outside the perimeter. If left unspecified, then members of identities field will be allowed access.
Changes
References
[1] https://cloud.google.com/bigquery/docs/connected-sheets#vpc-service-controls
[2] https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/access_context_manager_service_perimeter