-
-
Since each resource already has a `permissions` block. It would be nice to expose those permissions using the following command
custodian schema aws.ec2
This would allow easier creation of l…
-
### Summary
In order to implement #798 , we need to create user groups for appropriate access control in the Simpler AWS accounts. This task is to determine what those group(s) should be (admin, en…
-
### What happened?
After adding an additional package to the [`pypi_packages`](https://www.pulumi.com/registry/packages/gcp/api-docs/composer/environment/#pypi_packages_python) list of a `gcp.compose…
-
Triage a way to managed a full lz delete and redeploy - with cycled project names (will need random ids in the future)
Issue here is a previously unmet iam role on the log sink is causing issues with…
-
This (non) issue takes a brief look at how we can minimize the permissions granted to the Ray Cluster Launcher when using it with AWS.
The cluster launcher works by launching a single head node and…
-
### Terraform Core Version
1.1.8
### AWS Provider Version
4.56.0
### Affected Resource(s)
aws_lakeformation_permissions
### Expected Behavior
`DESCRIBE` permissions granted to all…
-
Unable to get tests to run by running:
```
gcloud auth application-default login --impersonate-service-account paraglider-cicd@paraglider-cicd.iam.gserviceaccount.com
```
This says I have insu…
-
We have found a possible issue whereby Terraform seems to ignore IAM assignments for deleted service accounts.
Our scenario is as follows:
- A service account in Project A is granted access to a B…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…