You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SSPROD-26919: Add TF module for GCP CSPM only (single and org) (#1)
* SSPROD-26919: Add TF module for GCP CSPM only (single and org)
- Adding CSPM (trust-relationship) TF module for GCP
- Adding the module for both single-project and org (following same structure as terraform aws repo for consistency)
- The module exports sa_email and sa_key as outputs
Note:
- Using and adding sysdig provider will be a separate PR (phase-2)
Testing done:
- Validated using terraform plan so far, with the following sample TF snippets
* SSPROD-26919: Fix role permissions and default sa name variable
* SSPROD-26919: Make service_account_key output sensitive
* Bump up go version and go deps in ci-pull-request actions
* Fix ginkgo version in go install
* Remove ci-master.yaml and comment go build step in github action
Change summary:
-----------------
1. Removing ci-master.yaml as it is not required.
2. Commenting out go build step since we don't have any *.go files
in the terraform repo to build.
Note: Both above can be added back after getting details on whether
they are needed. For now they don't seem to be required.
* Add Makefile and misc fixes to linting and formatting
* Fix role_id used in testing
* SSPROD-26919: Adding only required predefined GCP roles
Change summary:
-----------------
- Updated the CSPM roles to include latest set of roles required.
- Updated the CIEM roles to be only required predefined GCP roles for now.
Removing the custom role since all those permissions are already available
in the predefined/built-in roles in GCP. After confirming with the CIEM
team, if we do require custom roles with custom narrowed-down permissions,
will push a subsequent PR.
* SSPROD-26919: Update service account roles
Change summary:
---------------
1. Updated the roles and removed the redundant ones since some of
the roles have a subset of permissions already present in other
roles.
2. Updated both single-project and org case.
Note: Confirmed with CIEM team. No custom roles required.
0 commit comments