Add TerraformStateAccess Permission Set#57
Conversation
Added Terraform state access permission set with policies for S3 and DynamoDB.
|
You have reached your Codex usage limits for code reviews. You can see your limits in the Codex usage dashboard. |
📝 WalkthroughWalkthroughThis pull request adds a new Terraform state access permission set to the AWS Identity Center configuration. A new IAM policy document is defined that grants read/write access to an S3 backend bucket, optional DynamoDB table access, and IAM role assumption capabilities. The feature is gated by a Changes
Estimated code review effort🎯 3 (Moderate) | ⏱️ ~20 minutes Possibly related PRs
Suggested labels
Suggested reviewers
Poem
🚥 Pre-merge checks | ✅ 3✅ Passed checks (3 passed)
✏️ Tip: You can configure your own custom pre-merge checks in the settings. 📜 Recent review detailsConfiguration used: defaults Review profile: CHILL Plan: Pro 📒 Files selected for processing (2)
🧰 Additional context used📓 Path-based instructions (2)src/{main,variables,outputs,providers,versions,context}.tf📄 CodeRabbit inference engine (AGENTS.md)
Files:
src/**/*.tf📄 CodeRabbit inference engine (AGENTS.md)
Files:
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
🔇 Additional comments (3)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
|
These changes were released in v1.540.1. |
This pull request introduces a new permission set specifically for managing Terraform state access. The main focus is to allow fine-grained, read/write access to the Terraform state backend (S3 and optionally DynamoDB), without granting broader account permissions. The most important changes are:
New Terraform State Access Permission Set
terraform_state_access_permission_setto thelocalsblock, which is conditionally created when Terraform access is enabled. This permission set provides access only to the Terraform state backend resources.aws_iam_policy_documentdata source,terraform_state_access, which grants S3 read/write permissions for the state bucket, optional DynamoDB table permissions for state locking, and the ability to assume the backend role.terraform_state_access_permission_setin the list of permission sets passed to thepermission_setsmodule, ensuring it is provisioned alongside the other Terraform-related permission sets.Summary by CodeRabbit
✏️ Tip: You can customize this high-level summary in your review settings.