generated from hackforla/.github-hackforla-base-repo-template
-
-
Notifications
You must be signed in to change notification settings - Fork 13
Open
Description
Overview
To reduce risk and not allow terraform plan operations to make changes, we should separate the plan and apply roles that incubator assumes for various operations
Action Items
- in the
devops-securityrepo, create the roleincubator-tf-plan, with theReadOnlyAccesspolicy applied. The trust policy, should remain the same as the existinggha-incubatorrole - in the
role-to-assumein `/.github/workflows/terraform-plan.yaml', change the role to the newly created role in the previous step - in the
devops-securityrepo, create the roleincubator-tf-apply, with theAdminstatorAccesspolicy applied. The trust policy should only include"repo:hackforla/incubator:ref:refs/heads/main", - in the
role-to-assumein `/.github/workflows/terraform-apply.yaml', change the role to the newly created role in the previous step