GithubHelp home page GithubHelp logo

privacysandbox / coordinator-services-and-shared-libraries Goto Github PK

View Code? Open in Web Editor NEW
7.0 7.0 6.0 3.87 MB

License: Apache License 2.0

Starlark 10.23% Shell 0.90% HCL 12.65% C++ 53.13% C 0.01% Python 0.60% Java 17.74% HTML 4.70% Dockerfile 0.04%

coordinator-services-and-shared-libraries's People

Contributors

hostirosti avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar

coordinator-services-and-shared-libraries's Issues

Issue when enable_user_provided_vpc is used

I tried to host resources in the already configured VPC and got the following errors:

│ Error: Invalid index
│
│   on ../../../../submodules/coordinator-services-and-shared-libraries/operator/terraform/aws/applications/operator-service/main.tf line 205, in module "worker_service":
│  205:   dynamodb_vpc_endpoint_id = module.vpc[0].dynamodb_vpc_endpoint_id
│     ├────────────────
│     │ module.vpc is empty tuple
│
│ The given key does not identify an element in this collection value: the collection has no elements.
╵
╷
│ Error: Invalid index
│
│   on ../../../../submodules/coordinator-services-and-shared-libraries/operator/terraform/aws/applications/operator-service/main.tf line 206, in module "worker_service":
│  206:   s3_vpc_endpoint_id       = module.vpc[0].s3_vpc_endpoint_id
│     ├────────────────
│     │ module.vpc is empty tuple
│
│ The given key does not identify an element in this collection value: the collection has no elements.

How to reproduce

Specify the following variables:

enable_user_provided_vpc = true
user_provided_vpc_subnet_ids = ["subnet-todo1", "subnet-todo2"]
user_provided_vpc_security_group_ids = ["sg-todo3"]

Looks like the worker_service module tried to use internal VPC even if I configured it to not do that

Make deploy service account optional for GCP templates

We (Google Ads) use a different security model for deploy production changes and do not wish to instantiate a deploy service account with token based authentication as this is not compatible with our security policies.

Our automation/deploy users are already instantiated and granted sufficient roles to perform all the actions in the deploy role.

Can we make it optional to instantiate the deploy account AND all of the downstream roles, iam, serviceTokenCreator iam?

PR with suggested changes incoming shortly

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.