-
-
Couldn't load subscription status.
- Fork 3
Add toggle for provisioning default permission sets #50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Add toggle for provisioning default permission sets #50
Conversation
WalkthroughTwo files modified: a new boolean variable controls whether default AWS SSO permission sets are provisioned. The permission_sets configuration in main.tf now conditionally includes sensible defaults based on this variable, using a ternary operator to either concatenate the defaults or return an empty list. Changes
Sequence DiagramsequenceDiagram
actor User
participant Config as Terraform Config
participant Module as cloudposse/sso/aws Module
User->>Config: Set provision_sensible_permission_sets = true/false
activate Config
alt provision_sensible_permission_sets == true
Config->>Config: Include sensible permission sets<br/>(admin, billing, DNS, poweruser, read-only)
else provision_sensible_permission_sets == false
Config->>Config: Skip sensible permission sets
end
Config->>Config: Concatenate all permission set lists:<br/>- overridable_additional<br/>- identity_access<br/>- terraform_update_access<br/>- sensible (conditional)
deactivate Config
Config->>Module: Provide final permission_sets list
Module->>Module: Provision SSO permission sets
Estimated code review effort🎯 2 (Simple) | ⏱️ ~10 minutes The changes are straightforward: a new boolean variable and conditional wrapping logic. Minimal scope affecting only two files with clear, consistent patterns. No complex domain logic or cross-cutting concerns. Suggested labels
Suggested reviewers
Poem
Pre-merge checks and finishing touches✅ Passed checks (3 passed)
✨ Finishing touches🧪 Generate unit tests (beta)
📜 Recent review detailsConfiguration used: CodeRabbit UI Review profile: CHILL Plan: Pro 📒 Files selected for processing (2)
🧰 Additional context used📓 Path-based instructions (2)src/{main,variables,outputs,providers,versions,context}.tf📄 CodeRabbit inference engine (AGENTS.md)
Files:
src/**/*.tf📄 CodeRabbit inference engine (AGENTS.md)
Files:
⏰ Context from checks skipped due to timeout of 90000ms. You can increase the timeout in your CodeRabbit configuration to a maximum of 15 minutes (900000ms). (1)
🔇 Additional comments (2)
Thanks for using CodeRabbit! It's free for OSS, and your support helps us grow. If you like it, consider giving us a shout-out. Comment |
Summary
This PR introduces a new option that lets users control whether the default permission sets are automatically provisioned. The change is primarily cosmetic, intended to accommodate different naming conventions for these standard permission sets, rather than to alter core functionality.
Details
provision_sensible_permission_sets, has been added.Default:
true- preserves the existing behavior.false, the following permission sets will not be provisioned:AdministratorAccessBillingAdministratorAccessBillingReadOnlyAccessDNSRecordAdministratorAccessPowerUserAccessReadOnlyAccessSummary by CodeRabbit