-
-
Notifications
You must be signed in to change notification settings - Fork 839
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: privileged principal arns with condition #211
Conversation
@okstart1 hi, can you execute the following?
|
@okstart1 Thanks for this contribution. I don't think you need to duplicate the role to path mapping. The way the module is set up, principals are defined separately to actions, so potentially you could add a new variable to define conditions to be applied to the statement. |
/terratest |
This pull request now has conflicts. Could you fix it @okstart1? 🙏 |
Important Title is necessary and should not be empty.Kindly provide a meaningful title for this Pull Request. |
This PR has been closed due to inactivity and merge conflicts. |
Thanks @okstart1 for creating this pull request! A maintainer will review your changes shortly. Please don't be discouraged if it takes a while. While you wait, make sure to review our contributor guidelines. Tip Need help or want to ask for a PR review to be expedited?Join us on Slack in the |
what
terraform-aws-s3-bucket
module.privileged_principal_arns
.why
references