fix: Conditionally create default NonSecureTransportAccessedViaMountTarget
policy statement
#35
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
The statement for
NonSecureTransportAccessedViaMountTarget
overrides any restricted permissions to IAM principals and actions that are passed intopolicy_statements
. We can check ifpolicy_statements
are passed in and if not then create the mentioned statement.Other options would be to create a separate new variable like
use_default_deny_nonsecure_transport_policy
but this may be redundant if we pass inpolicy_statement
to customize access. We could also remove theNonSecureTransportAccessedViaMountTarget
statement altogether and require users to pass in any additional permissions viapolicy_statement
. That would make it a breaking change though.Motivation and Context
Closes: #30
Breaking Changes
Potentially if users are passing in
policy_statements
to restrict IAM principals but are still making use of the allow all IAM principals (and related actions) thatNonSecureTransportAccessedViaMountTarget
provides instead. In that case, theNonSecureTransportAccessedViaMountTarget
statement will be removed.How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request