Automate creating a postgres user for DB scanning #765
+71
−1
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🗣 Description
Add "Create scan user" to syncdb so the vulnerability scanners can access our schema.
The user will only be created if it doesn't already exist and the name/password are protected in the AWS Systems Manager parameter store.
The user is limited to these permissions:
Database Access:
Schema Access:
Table Access:
💭 Motivation and context
Allow scanners to access the database schema.
Created the user locally with syncdb and tested all of the permissions with these commands:
SELECT schema_name FROM information_schema.schemata WHERE schema_name = 'public';
SELECT table_name FROM information_schema.tables WHERE table_schema = 'public';
SELECT * FROM "domain";
🧪 Testing
Passes pre-commit and github checks.
✅ Pre-approval checklist
in code comments.
to reflect the changes in this PR.
✅ Pre-merge checklist
✅ Post-merge checklist