Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

chore(deps): update terraform cloudposse/codebuild/aws to v2 (main) #118

Closed
wants to merge 2 commits into from

Conversation

renovate[bot]
Copy link
Contributor

@renovate renovate bot commented Nov 11, 2023

Mend Renovate

This PR contains the following updates:

Package Type Update Change
cloudposse/codebuild/aws (source) module major 1.0.0 -> 2.0.2

Release Notes

cloudposse/terraform-aws-codebuild (cloudposse/codebuild/aws)

v2.0.2

Compare Source

🚀 Enhancements

feat: custom policy + hardened trust relationship @​bt-macole (#​132)

what

Updated trust policy so only the codebuild project in this module can use the iam role.
Added ability to toggle on/off default permissions
Added support for attaching a custom policy

Fully backward compatible

why

fe75886

adding a condition on the trust policy for the codebuild project arn ensures
the iam role can not be used by any other codebuild project.

codebuild projects could be extremely permissive, even when least privileged
so enforcing the role can only be used by the intended codebuild project
limits to ability for a threat actor to quietly take control of a powerful
role and do threat actory things.

9f0163f

the default permissions are good for getting up and running, however, they are far more
permissive than any least privileged policy would like, being `*` for all resources for
anything in the default list + any and all additional_permissions.

this allows users to still utilize the quick up and running policy, while also being able
to disable it and replace it with a least privileged custom policy.

the lifecycle rule ensure that users don't get confused by additional permissions and custom
policy variables, failing on a plan if they attempt to use additional_permissions with
default_permissions_enabled set to `false`.
Test Output:
    --- PASS: TestExamplesCustom (62.77s)
    --- PASS: TestExamplesComplete (62.87s)
    --- PASS: TestExamplesVPC (78.32s)
    PASS
    ok      github.com/cloudposse/terraform-aws-codebuild   78.790s

references

resolves: #​131

v2.0.1

Compare Source

🚀 Enhancements

Fix bucket settings @​max-lobur (#​130)

what

Use standalone resource for bucket ACL

why

Regression after AWS v5 upgrade

v2.0.0

Compare Source

Support AWS Provider V5 @​max-lobur (#​126)

what

Support AWS Provider V5
Linter fixes

why

Maintenance

references

https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.0.0

Sync github @​max-lobur (#​122)

Rebuild github dir from the template


Configuration

📅 Schedule: Branch creation - At any time (no schedule defined), Automerge - At any time (no schedule defined).

🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

Rebasing: Whenever PR becomes conflicted, or you tick the rebase/retry checkbox.

🔕 Ignore: Close this PR and you won't be reminded about this update again.


  • If you want to rebase/retry this PR, check this box

This PR has been generated by Mend Renovate. View repository job log here.

@renovate renovate bot requested a review from a team as a code owner November 11, 2023 00:20
@renovate renovate bot added the auto-update This PR was automatically generated label Nov 11, 2023
@renovate renovate bot requested review from a team as code owners November 11, 2023 00:20
@renovate renovate bot requested review from Gowiem and woz5999 November 11, 2023 00:20
@renovate renovate bot force-pushed the renovate/main-cloudposse-codebuild-aws-2.x branch from bd9d7aa to d6ccb93 Compare March 2, 2024 17:00
@hans-d
Copy link

hans-d commented Mar 2, 2024

/terratest

Copy link
Contributor Author

renovate bot commented Mar 2, 2024

Edited/Blocked Notification

Renovate will not automatically rebase this PR, because it does not recognize the last commit author and assumes somebody else may have edited the PR.

You can manually request rebase by checking the rebase/retry box above.

Warning: custom changes will be lost.

@mergify mergify bot added the readme Improvements or additions to the README label Apr 1, 2024
Copy link

mergify bot commented Apr 1, 2024

/terratest

Copy link

mergify bot commented Apr 1, 2024

💥 This pull request now has conflicts. Could you fix it @renovate[bot]? 🙏

@mergify mergify bot added the conflict This PR has conflicts label Apr 1, 2024
@mergify mergify bot closed this Apr 1, 2024
Copy link

mergify bot commented Apr 1, 2024

This automated PR was closed due to merge conflicts.

Copy link
Contributor Author

renovate bot commented Apr 1, 2024

Renovate Ignore Notification

Because you closed this PR without merging, Renovate will ignore this update. You will not get PRs for any future 2.x releases. But if you manually upgrade to 2.x then Renovate will re-enable minor and patch updates automatically.

If you accidentally closed this PR, or if you changed your mind: rename this PR to get a fresh replacement PR.

@renovate renovate bot deleted the renovate/main-cloudposse-codebuild-aws-2.x branch April 1, 2024 17:58
@mergify mergify bot removed readme Improvements or additions to the README conflict This PR has conflicts labels Apr 1, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
auto-update This PR was automatically generated
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants