-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: allow policy customization #23
Merged
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
github-actions
bot
added
feature
Denotes a PR to implement a new feature.
size/XL
Denotes a PR that changes 500-999 lines, ignoring generated files.
labels
Jul 29, 2024
leonsteinhaeuser
added
breaking-change
Denotes a PR that changes CODE that affects the "API"
refactor
Denotes a PR that refactors a specific part of an application.
labels
Jul 29, 2024
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
Signed-off-by: leonsteinhaeuser <[email protected]>
leonsteinhaeuser
force-pushed
the
feat/allow-policy-customization
branch
from
July 29, 2024 14:03
19f42de
to
05b8686
Compare
leonsteinhaeuser
changed the title
Feat/allow policy customization
feat: allow policy customization
Jul 29, 2024
lusitania
reviewed
Jul 30, 2024
lusitania
reviewed
Jul 30, 2024
lusitania
reviewed
Jul 30, 2024
Signed-off-by: leonsteinhaeuser <[email protected]>
leonsteinhaeuser
force-pushed
the
feat/allow-policy-customization
branch
from
July 31, 2024 09:53
05b8686
to
46f65f1
Compare
Signed-off-by: leonsteinhaeuser <[email protected]>
leonsteinhaeuser
force-pushed
the
feat/allow-policy-customization
branch
from
July 31, 2024 09:53
46f65f1
to
9c43d38
Compare
lusitania
reviewed
Jul 31, 2024
Signed-off-by: leonsteinhaeuser <[email protected]>
leonsteinhaeuser
force-pushed
the
feat/allow-policy-customization
branch
from
July 31, 2024 10:58
08d2daf
to
424cf8c
Compare
lusitania
approved these changes
Jul 31, 2024
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
breaking-change
Denotes a PR that changes CODE that affects the "API"
feature
Denotes a PR to implement a new feature.
refactor
Denotes a PR that refactors a specific part of an application.
size/XL
Denotes a PR that changes 500-999 lines, ignoring generated files.
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
This PR refactors the AWS IAM role and policy management for dynamic credential authentication between AWS and Terraform Cloud. The goal of this PR was to support dedicated workspace assignment. This was not possible in the previous implementation.
How Has This Been Tested?
I started a local plan with my temporary credentials for our AWS management account.
Plan Output
Checklist