-
-
Notifications
You must be signed in to change notification settings - Fork 355
feat: Add permissions to access repository credentials to ecs_task_access_secrets
#306
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add permissions to access repository credentials to ecs_task_access_secrets
#306
Conversation
This PR has been automatically marked as stale because it has been open 30 days |
Still relevant |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This makes sense to me and I'm not sure how folks were able to get this to work with private container repos before. I made one suggestion to use try instead of can, but otherwise this looks good!
Co-authored-by: Michael Kania <[email protected]>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks like just a spacing issue from terraform fmt
. @bryantbiggs Let me know if you need me to help push this through.
Repo creds access
fix arn bracketed typo
@szesch I think all you need is to pull in changes from the base branch and this will be good to merge. |
ecs_task_access_secrets
## [3.24.0](v3.23.1...v3.24.0) (2022-11-03) ### Features * Add permissions to access repository credentials to `ecs_task_access_secrets` ([#306](#306)) ([15e9d9b](15e9d9b))
This PR is included in version 3.24.0 🎉 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Add the
credentialsParameter
arn to theecs_task_access_secrets
policy ifvar.repository_credentials
is not null and thecredentialsParameter
key exists invar.repository_credentials
.Motivation and Context
Without this change the access to this secret must be created outside the module and the policy must be passed in via
policies_arn
. Other parameters are currently granted access butcredentialsParameter
is an outlier.Breaking Changes
No
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull requestThis change was tested internally with
credentialsParemeter
configured and without.