Closed kierramarie closed 3 weeks ago
/run pipeline
/run pipeline
@kierramarie ensure changes (including variable descriptions) are consistent with https://github.com/terraform-ibm-modules/terraform-ibm-secrets-manager/pull/147
@ocofaigh this da uses kms for en and cos. should I update the cos part as well to use the external kms (I have already mostly implemented this)?
@kierramarie I don't get you - EN is not deployed in this DA? This is the SCC DA, so KMS key is only used to encrypt the COS bucket used by SCC
sorry wrong PR 🤦♀️
/run pipeline
It appears that the upgrade test is failing because the iam policy is being changed. Is it okay to skip upgrade test?
/run pipeline
@kierramarie why iam policy has been changed? do we know the reason? I guess, if we are not creating cross account policy, then settings for previous iam policy shouldn't change
@akocbek here is what I get when I run the upgrade test:
Test: TestRunUpgradeInstances
Messages: Resource(s) identified to be updated
Name: policy
Address: module.cos[0].module.buckets.ibm_iam_authorization_policy.policy[0]
Actions: [update]
DIFF:
Before:
{}
After:
{}
Change Detail:
{
"actions": [
"update"
],
"after": {
"description": "SECURE_VALUE_HIDDEN_HASH:-09fb55c072157e4ce445bf5fe16b664da39bd068027f4fc931f10a3f",
"id": "55d07cd4-dd7a-4a5e-8eb7-d66d61c2b901",
"resource_attributes": "SECURE_VALUE_HIDDEN_HASH:-3e1d813729df0a021667706febdcd7a7f98124a3b57504bcd816d767",
"roles": "SECURE_VALUE_HIDDEN_HASH:-146edc4d125eee639e7b2fe54f8383e87581ec7ce1e96f015593f0e9",
"source_resource_group_id": "",
"source_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-f017474dd062e5b907ad9905dd613aa0470cb62440fac5a98668e062",
"source_resource_type": "",
"source_service_account": "abac0df06b644a9cabc6e44f55b3880e",
"source_service_name": "cloud-object-storage",
"subject_attributes": "SECURE_VALUE_HIDDEN_HASH:-e8ee7542de3374f851ac974d42106aa6071443c888843351d421031a",
"target_resource_group_id": "",
"target_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-1a38c97b5eeda8e6d0a9f1f9dea2eeadfbc13591f7253905aa260261",
"target_resource_type": "",
"target_service_name": "SECURE_VALUE_HIDDEN_HASH:-4124bfb20e5fe5a42f2fe15d06511d2983eb22432add9b34b9100455",
"transaction_id": "30c7252dd2dd47fd95539f093c21b850",
"version": null
},
"after_sensitive": {
"description": "SECURE_VALUE_HIDDEN_HASH:-e81a5c43627617dcfaa30eb0ce9b7edef70ec15a89d8ef8e48e5169c",
"resource_attributes": "SECURE_VALUE_HIDDEN_HASH:-80fba17a3c5b89dca881a72b334d5c21c13a35850708869c6525ef3b",
"roles": "SECURE_VALUE_HIDDEN_HASH:-586b907cd5391dcac6cd3e60c57743f8b51eb548fe98e2b1223beeec",
"source_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-1139510326c6f8e2f492ea351ab99cda94e2c3c21fb1fe1a7bcdd930",
"subject_attributes": "SECURE_VALUE_HIDDEN_HASH:-48eecc2d75e7d0d9919290d5b0c5ea3cd523e90c0f13b90a2584435d",
"target_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-d62341dcc03ffb1409bb39d039fb977c1a313356318319989abea4a6",
"target_service_name": "SECURE_VALUE_HIDDEN_HASH:-3cfb03ac2394c4854fd9d235c58a61795cae882efd77790875cfb2bb"
},
"after_unknown": {},
"before": {
"description": "SECURE_VALUE_HIDDEN_HASH:-0eb76504eb23a58279c7abeb79a0ae3a5df813335249eac82bb6e7a0",
"id": "55d07cd4-dd7a-4a5e-8eb7-d66d61c2b901",
"resource_attributes": "SECURE_VALUE_HIDDEN_HASH:-e8ca899cbea54ccc842d681d0d4b141c1d24d20474498e1733f53d9b",
"roles": "SECURE_VALUE_HIDDEN_HASH:-6c041bc4eb70851abf01f3f2c30e0782ad77d7fb43123e5f28b32a32",
"source_resource_group_id": "",
"source_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-b819e7a15ecd6b64a1dfd855f0c7ff4254d01491e3ce187a8be842dc",
"source_resource_type": "",
"source_service_account": "abac0df06b644a9cabc6e44f55b3880e",
"source_service_name": "cloud-object-storage",
"subject_attributes": "SECURE_VALUE_HIDDEN_HASH:-22674679420bf72932cbba31231be558f4c250bec8a93934d97d0300",
"target_resource_group_id": "",
"target_resource_instance_id": "SECURE_VALUE_HIDDEN_HASH:-a21ea11290ee6383b51f50e4cb27903d631f67ae8953edec4c179425",
"target_resource_type": "",
"target_service_name": "SECURE_VALUE_HIDDEN_HASH:-9fa85af771ebe26be1e605a7404b13f837902dff9703679aeea6f04b",
"transaction_id": "30c7252dd2dd47fd95539f093c21b850",
"version": null
},
"before_sensitive": {
"resource_attributes": "SECURE_VALUE_HIDDEN_HASH:-f9b28e669e518d0e0f3ea774d4ee0e2e257e8cae370e4fec82df827b",
"roles": "SECURE_VALUE_HIDDEN_HASH:-ce6f5466f1504f402bf3ae201b7e9150ed3f91c176c3983a6e8ab252",
"subject_attributes": "SECURE_VALUE_HIDDEN_HASH:-940ec00567a5a285ded6df85f16a697bd87f4eb4b1e10860a32625bc"
}
}
I am unsure of what exactly is changing but it seems to be doing an update to the policy.
We should not be touching the auth policy being created in cos module, so this needs to be debugged to find out why its updating - suggest to recreate locally
@ocofaigh From what I understand skip_iam_authorization
in main is being set to false (default) but on my branch it is being changed to true to use the external policy. Would this cause a change/update in the upgrade test?
But @kierramarie The test is not setting any value for ibmcloud_kms_api_key
so the value being passed for skip_iam_authorization_policy
should not be changing as part of this PR. If it is, then you may have incorrect logic somewhere
@ocofaigh this is what I got when I ran locally. Its not actually changing but is triggering an update for some reason:
~ resource "ibm_iam_authorization_policy" "policy" {
# Warning: this attribute value will be marked as sensitive and will not
# display in UI output after applying this change. The value is unchanged.
~ description = (sensitive value)
id = "a7d3640e-6ff1-4411-be7c-69a650afe464"
# Warning: this attribute value will be marked as sensitive and will not
# display in UI output after applying this change. The value is unchanged.
~ source_resource_instance_id = (sensitive value)
# Warning: this attribute value will be marked as sensitive and will not
# display in UI output after applying this change. The value is unchanged.
~ target_resource_instance_id = (sensitive value)
# Warning: this attribute value will be marked as sensitive and will not
# display in UI output after applying this change. The value is unchanged.
~ target_service_name = (sensitive value)
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
Failing with:
Error: CreateAttachmentWithContext failed Necessary attachment parameters are not available to create or update attachment.```
@kierramarie Thats a known issue that Jordan is looking at -> https://github.com/terraform-ibm-modules/terraform-ibm-scc-da/issues/177
FYI, a workaround has been added in https://github.com/terraform-ibm-modules/terraform-ibm-scc-da/pull/175 to unblock the pipeline. Once its merged, rebase this PR and re-run tests
/run pipeline
/run pipeline
/run pipeline
@kierramarie hold off on this PR until https://github.com/terraform-ibm-modules/terraform-ibm-scc-da/pull/182 is merged or pipeline will fail
/run pipeline
/run pipeline
/run pipeline
/run pipeline
@kierramarie can we revisit this one please?
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
Moved block method didn't work so trying the method to only use the buckets module when using a cross account kms. Currently testing.
Manual upgrade passed (with same account kms)
/run pipeline
/run pipeline
/run pipeline
/run pipeline
/run pipeline
@ocofaigh is my assumption that if a user passes an existing scc instance, no kms variables are needed, correct?
@kierramarie I think what we agreed was if user is passing an existing SCC, the assumption is its already configured with a COS bucket, and hence no KMS details are required, since we only use KMS to encrypt the COS bucket.
/run pipeline
Description
An external kms key can be used now. If an api key for the external account is passed, new iam policies will be created for COS to communicate with the external kms instance.
Git Issue: https://github.com/terraform-ibm-modules/terraform-ibm-scc-da/issues/107
Release required?
x.x.X
)x.X.x
)X.x.x
)Release notes content
Run the pipeline
If the CI pipeline doesn't run when you create the PR, the PR requires a user with GitHub collaborators access to run the pipeline.
Run the CI pipeline when the PR is ready for review and you expect tests to pass. Add a comment to the PR with the following text:
Checklist for reviewers
For mergers