-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Fleet app operator permissions #1986
feat: Fleet app operator permissions #1986
Conversation
- added type string to the role variable - changed role maps from variables to locals
…because only one of them is required
…ator_name, is_user_app_operator> With this change, the admin explicitly specifies whether the app operator is a user or group. This can help to not take dependency to the value of the app operator name (i.e., previously whether user != '' or a group != '').
- removed the app operator email input and use a service account created in the module instead - removed the app operator role input and simply use the VIEW role
…ng the app_operator_team input
/gcbrun |
…le module This was changed by my local run of make docker_test_lint.
/gcbrun |
From the CI:
|
When possible, it's suggest to avoid variables in examples (as you will need to provide a value from the integration test). For example, a end to end example could first create a born in fleet cluster, and then pass the fleet project from that. |
…ions and example modules
I defined a new project for fleet testing purposes (though for now, I'm not creating a cluster in the example module). I added the test fixture to provide the project ID. |
/gcbrun |
…st fixtures This should hopefully make the app operator email available at apply time of the example module.
/gcbrun |
…rmissions I'm now building the service account email string explicitly and instead declaring depencency to the service account resource, so that for_each works without the need for applying the service account resource in advance.
/gcbrun |
…d iam service account
/gcbrun |
This seems to be the correct way to grant the necessary permissions.
/gcbrun |
1 similar comment
/gcbrun |
|
…issions The condition is a bit long, and it's possibly included in two lines in the project IAM policy. I'm trying to see if checking subconditions separately works.
/gcbrun |
…ions to just looking for log buckets in the project IAM policy
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the contribution @hosseingolestani!
Just a few final nits and we can get this merged!
… of) principal name in scope rbac role binding id.
Spot checked the most recent CI test for |
This PR introduces a Terraform module that bundles different permissions (IAM and RBAC Role Bindings) required for Fleet team management.