Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix: Use customer managed policy instead of inline policy for cluster_elb_sl_role_creation #1039

Merged
merged 1 commit into from
Oct 6, 2020

Conversation

wlonkly
Copy link
Contributor

@wlonkly wlonkly commented Oct 6, 2020

Description

Uses a customer-managed policy, not an inline policy, for the cluster_elb_sl_role_creation policy. It is common for "enterprise" AWS users to disallow inline policies with an SCP rule for auditing-related reasons, and this accomplishes the same thing.

Verified iam:CreatePolicy is already listed in docs/iam-permissions.md.

Fixes #1035.

Checklist

@barryib barryib changed the title fix: Use managed policy, not inline, for cluster_elb_sl_role_creation fix: Use customer managed policy instead of inline policy for cluster_elb_sl_role_creation Oct 6, 2020
@barryib barryib merged commit c799fec into terraform-aws-modules:master Oct 6, 2020
@barryib
Copy link
Member

barryib commented Oct 6, 2020

Thanks @wlonkly for your contribution.

barryib pushed a commit to Polyconseil/terraform-aws-eks that referenced this pull request Oct 25, 2020
…r_elb_sl_role_creation` (terraform-aws-modules#1039)

NOTE: The usage of customer managed policy, not an inline policy, for the `cluster_elb_sl_role_creation policy` is common for "enterprise" AWS users to disallow inline policies with an SCP rule for auditing-related reasons, and this accomplishes the same thing.
@github-actions
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 17, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Avoid inline policy for cluster_elb_sl_role_creation?
2 participants