-
Notifications
You must be signed in to change notification settings - Fork 1.2k
feat(TPG>=6.39)!: Fleet app operator permissions custom roles #2377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(TPG>=6.39)!: Fleet app operator permissions custom roles #2377
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @tonybayvas!
I've added a few notes below, also be sure to review the LINT output.
...egration/simple_fleet_app_operator_permissions/simple_fleet_app_operator_permissions_test.go
Outdated
Show resolved
Hide resolved
Thanks @tonybayvas! From the most recent test:
|
/gcbrun |
/gcbrun |
Almost! :)
|
/gcbrun |
/gcbrun |
/gcbrun |
The latest test failures don't seem related to the app-operator tests. |
Could be transitory, or it's possible the API/TPG behavior recently changed. |
Reproduced in #2368, so it's an API/TPG change:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @tonybayvas!
This will be a breaking change due to the bump in minimum provider version, so we'll merge after v37.1 is released.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @tonybayvas!
This PR introduces custom roles to the Terraform module that bundles different permissions (IAM and RBAC Role Bindings) required for Fleet team management.