-
-
Notifications
You must be signed in to change notification settings - Fork 337
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add an IAM policy to grant the runner access to the KMS key #778
Conversation
Fixes some issues with accessing the S3 bucket when the bucket has KMS encryption enabled.
Hey @jasonjanderson! 👋 Thank you for your contribution to the project. Please refer to the contribution rules for a quick overview of the process. Make sure that this PR clearly explains:
With submitting this PR you confirm that you hold the rights of the code added and agree that it will published under this LICENSE. The following ChatOps commands are supported:
Simply add a comment with the command in the first line. If you need to pass more information, separate it with a blank line from the command. This message was generated automatically. You are welcome to improve it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good job! Thanks for implementing the KMS policy in the module. Makes the module easier to use.
@npalm Any chance to test this change (have no access to a computer right now)? It looks good to me. I think we have to create a release note so users can remove their own KMS policy. |
will do my best to test it today or tomorrow. Thx for the ping |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jasonjanderson thx for the contribution.
- Tested with a deployment without KMS key, all fine
- When setting
enable_kms
and not provide a manged key the module failes. See inline comment.
Dit not have the time to explore solution right now.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@jasonjanderson thanks for your work, all looks good. @kayman-mk for me the PR is ready.
🤖 I have created a release *beep* *boop* --- ## [6.3.0](6.2.0...6.3.0) (2023-04-21) ### Features * add an IAM policy to grant the runner access to the KMS key ([#778](#778)) ([df25b6a](df25b6a)) * **spotfleet:** add supports spot fleets for spot instances allowing us to use multiple instance types and AZs ([#777](#777)) ([1bb7e11](1bb7e11)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --------- Signed-off-by: Niek Palm <[email protected]> Co-authored-by: cattle-ops-releaser[bot] <126345536+cattle-ops-releaser[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
Description
Fixes some issues with accessing the S3 bucket when the bucket has KMS encryption enabled.
Allowing the runner role the ability to use the KMS key. We mainly ran into issue with this around access to the caching S3 bucket. Without access to the KMS key, the runners can't pull from or push to the S3 bucket created by this project.
In case
var.enable_kms
is set totrue
, the module automatically adds a policy to access the KMS key.Migrations required
No
Verification
Custom: