-
Notifications
You must be signed in to change notification settings - Fork 147
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add labels, Bucket Policy Only, Security Admin role #4
Conversation
This allows the service account to manage the state after the initial terraform apply.
6ca228a
to
0016a8a
Compare
Overall it looks good, although I would like to clarify the permissions to ensure that they are required so we can maintain the least permissions required to run CFT. |
This reverts commit 4540293.
We're using Google 2.12.0 to avoid an IAM bug which recently started affecting Terraform deployments.
Looking good from my perspective now @aaron-lane , just need @morgante to review / approve or if you can provide me access I am happy to do it. |
@rjerrems If you "approve" the PR you should be able to merge. |
Thanks @morgante - I have approved, but looks like I don't have permissions to merge the PR. I have a |
@rjerrems Looks like we never added you to the org, just invited you. |
This branch adds inputs for labels, changes the buckets to enforce Bucket Policy Only access, and adds Security Admin to the Terraform service account so that it can manage the created state.
@rjerrems FYI