-
Notifications
You must be signed in to change notification settings - Fork 578
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Wildcard es_root NotScopes #1202
Comments
Hi, have you considered editing the assignment files? You can use templating and supply your own template file variables. |
Can you clarify how you mean to edit the assignment files? I am aware that we can specify new assignment files in our local /lib/ directory but we want to modify settings in assignment files managed by the upstream module. Regarding templating - can you expand on this? I am aware that we have the option to pass variables to existing assignments but not sure how we would use this method to add a "NotScope" which doesn't appear to accept any variables? There is mention of 'templating' on this wiki page but the link is broken when trying to find this page: Thanks in advance! |
Hi @matt-FFFFFF - are you able to advise on the above? |
just tagging along as I would like to know some more on the "templating" possibility, is there some documentation available on that on how it should be used in the context of this module? |
Hi @matt-FFFFFF - could you clarify your statement regarding editing the assignment files? Interested to see if there is an option I have missed. |
If you look at this file you will see some templating in action: Lines 5 to 10 in c1eef34
The You can extend this replacement with the E.g. template_file_vars = {
my_data = "my_value"
} Then in the policy assignment file (copy it into your custom lib folder), you can edit the values to be static strings or use the |
Community Note
Description
Raising as a feature request but there may already be a suitable way to achieve this which I haven't come across:
We would like to add a "NotScope" to all policy assignments deployed through es_root to stop them being applied to the sandbox management group.
Currently the only ways I can see to do this would be using either archetype_config_overrides.tf or an extension/exclusion file for es_root.
The downside to either of these approaches is that we would have to list all policy assignments that currently exist in es_root and specify the assignment name in the overrides file. If/when an assignment name is updated in the CAF ES module we would then have to update the overrides.
Is your feature request related to a problem?
Customising Policy management
Describe the solution you'd like
Ideally what I would like is the ability to globally add a NotScope or other attribute to ALL policy assignments through a wildcard either in archetype_config_overrides.tf or an extension archetype file.
Is this possible?
Additional context
The text was updated successfully, but these errors were encountered: