-
Notifications
You must be signed in to change notification settings - Fork 186
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ability to allow ssh commands only for specific users #141
base: master
Are you sure you want to change the base?
Add ability to allow ssh commands only for specific users #141
Conversation
Hi, just wondering if anyone has had a chance to look at this PR in the past few months? |
Could you please fix your conflict and I'll review it. Thanks 🙏 |
Signed-off-by: Mario de Frutos <[email protected]>
In Terraform AWS provider vestion 5 the acl option in the aws_s3_object doesn't have default value set to private so we need to add it explicitly Signed-off-by: Mario de Frutos <[email protected]>
@@ -13,6 +13,7 @@ data "aws_kms_alias" "kms-ebs" { | |||
} | |||
|
|||
resource "aws_s3_object" "bucket_public_keys_readme" { | |||
acl = "private" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Pretty sure this was missing and is needed, but not sure if it belongs in the PR.
Hi @Guimove, Thanks for the note. Finally got around to resolving the conflicts, hope it's OK to review, let me know if anything else is needed. Thanks! 🙏 |
Hi @Guimove , Any chance you've had a look at this PR yet? Would be great to not have to maintain our fork! Thanks again. |
This PR will allow only certain users (eg. CI, ansible) to run ssh commands on bastions, rather than blanket allowing all users.