Skip to content

fix(infra): security hardening, DNS test fixes, WI docs and AVP revert#295

Merged
gdrojas merged 6 commits intomainfrom
fix/aws-infra-improvements
Apr 20, 2026
Merged

fix(infra): security hardening, DNS test fixes, WI docs and AVP revert#295
gdrojas merged 6 commits intomainfrom
fix/aws-infra-improvements

Conversation

@gdrojas
Copy link
Copy Markdown
Collaborator

@gdrojas gdrojas commented Apr 20, 2026

Summary

  • Rename output.tfoutputs.tf and provider.tfproviders.tf across all cloud provider modules (AWS, Azure, GCP, OCI) for naming consistency
  • Remove force_destroy = true from Route53 zones and explicitly set force_destroy = false to prevent accidental record deletion; update DNS tests accordingly
  • Revert AVP policy to verifiedpermissions:* — narrowing to BatchIsAuthorizedWithToken was premature without CloudTrail data confirming all required actions

gdrojas added 5 commits April 20, 2026 14:14
…onsistency

- Replace verifiedpermissions:* with least-privilege actions in aws/iam/agent
- Remove force_destroy from Route53 zones in aws/dns
- Migrate GCP artifact registry from service account keys to workload identity
- Remove unused subscription_id variable from azure/acr, azure/dns,
  azure/private_dns
- Rename output.tf -> outputs.tf, provider.tf -> providers.tf,
  variable.tf -> variables.tf across all modules
…ntity docs

- Update aws/dns test to assert force_destroy == false, matching the
  removal of the attribute in 5f1e9fc and documenting the intent to
  protect Route53 records against accidental deletion
- Enrich descriptions on gcp/acr and gcp/artifact-registry so
  terraform-docs surfaces actionable Workload Identity guidance:
  - workload_identity_bindings: document the granted role and principal
  - service_account_email: inline the iam.gke.io/gcp-service-account
    annotation the consumer needs on the Kubernetes ServiceAccount
- Add missing descriptions to artifact-registry outputs
…dation

Reverts the least-privilege hardening of the nullplatform AVP policy
introduced in 5f1e9fc. The narrowed action list and region condition
are still the desired end state, but we lack empirical data to confirm
the runtime agent only invokes the 11 allow-listed actions.

Leaving the wildcard in place until usage can be validated via
CloudTrail analysis of the agent role or a staging deploy. To be
revisited — see in-branch discussion.
@gdrojas gdrojas merged commit d5982fe into main Apr 20, 2026
77 of 79 checks passed
@gdrojas gdrojas deleted the fix/aws-infra-improvements branch April 20, 2026 20:13
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants