Skip to content

Conversation

@hadiqur
Copy link
Contributor

@hadiqur hadiqur commented Feb 2, 2026

What type of PR is this? (check all applicable)

  • Refactor
  • Feature
  • Bug Fix
  • Optimization
  • Documentation Update

What

To ensure best practice:

  • We create a general shared policy document in Terraform
  • Create IAM User Group and attach it to policy
  • Assign User to Group

This now means Digital Landscape will have its own credentials with its service-specific permissions

Testing

Have any new tests been added as part of this issue? If not, try to explain why test coverage is not needed here.

  • Yes
  • No
    Please write a brief description of why test coverage is not necessary here.
  • Not as part of this ticket. (Could be done at a later point)

Documentation

Has any new documentation been written as part of this issue? We should try to keep documentation up to date
as new code is added, rather than leaving it for the future.

  • Yes
  • No
    Please write a brief description of why documentation is not necessary here.
  • Not as part of this ticket. (Could be done at a later point)

Related issues

N/A

How to review

N/A

@sebtheo sebtheo requested a review from a team February 2, 2026 09:58
Copy link
Contributor

@TotalDwarf03 TotalDwarf03 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This looks good to me - Good work.

The only thing left here is key rotation for the IAM user. This is a separate ticket though.

Copy link
Collaborator

@sebtheo sebtheo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

path and tags are optional.

@hadiqur
Copy link
Contributor Author

hadiqur commented Feb 2, 2026

Changed the path to /digital-landscape @sebtheo

@sebtheo
Copy link
Collaborator

sebtheo commented Feb 2, 2026

Changed the path to /digital-landscape @sebtheo

Can you confirm these changes work on sdp-dev? @hadiqur :)

@sebtheo sebtheo mentioned this pull request Feb 2, 2026
11 tasks
@sebtheo sebtheo changed the title KEH-1706: Credential Refactor (AWS) KEH-1706 - Credential Refactor (AWS) Feb 2, 2026
@hadiqur
Copy link
Contributor Author

hadiqur commented Feb 2, 2026

Changed the path to /digital-landscape @sebtheo

Can you confirm these changes work on sdp-dev? @hadiqur :)

Yep! We now have an IAM user for digital landscape with the relevant permissions (managed policies) attached via a user group - check AWS portal :)

They've also been attached to the task definition on ECS. In-line ones now removed

@sebtheo sebtheo self-requested a review February 2, 2026 13:04
@hadiqur
Copy link
Contributor Author

hadiqur commented Feb 2, 2026

Small nit: Can you change this from users to -user-group to stay consistent with naming in dev please :)

Done, re-ran terraform apply.

@sebtheo sebtheo self-requested a review February 2, 2026 13:09
Copy link
Collaborator

@sebtheo sebtheo left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Good job!

@hadiqur hadiqur merged commit 27fc07b into main Feb 2, 2026
5 checks passed
@hadiqur hadiqur deleted the KEH-1706-Credential-Refactor-AWS branch February 2, 2026 13:11
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants