private-ddn: update byoc permission #175
Merged
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This pull request updates the documentation for creating a data plane in a Bring Your Own Cloud (BYOC) setup. The changes include enhancements to the CloudFormation template, updates to AWS permissions, and adjustments to GCP configurations, ensuring improved flexibility and clarity for users.
AWS CloudFormation Template Enhancements:
bash
toyaml
and added a newExternalId
parameter for trust relationships. This parameter allows customization with validation rules for length and allowed characters.sts:ExternalId
in the trust relationship to reference the newly addedExternalId
parameter instead of the hardcoded value.AWS Permissions Updates:
ec2:DescribeVpcEndpoints
,rds:DescribeDBInstances
,ec2:CreateSecurityGroup
, andiam:UpdateAssumeRolePolicy
. These changes expand the scope of supported operations. [1] [2] [3]rds.amazonaws.com
in the list of trusted service principals and addedrds:*
to the allowed actions, enabling support for RDS-related operations.GCP Configuration Adjustments:
sqladmin.googleapis.com
andservicenetworking.googleapis.com
to the list of enabled APIs for GCP projects.roles/cloudsql.admin
IAM role to the service account for managing Cloud SQL resources.Documentation Updates:
ExternalId
parameter with Hasura, emphasizing its importance when customized./16
to/16-/19
for both AWS and GCP, providing more flexibility in network configurations. [1] [2]