Skip to content

Add IAM policy to allow Brainstore to assume export roles with bt:* ExternalId#242

Open
Jeff McCollum (jeffmccollum) wants to merge 4 commits intomainfrom
codex/add-optional-iam-permission-to-terraform-module
Open

Add IAM policy to allow Brainstore to assume export roles with bt:* ExternalId#242
Jeff McCollum (jeffmccollum) wants to merge 4 commits intomainfrom
codex/add-optional-iam-permission-to-terraform-module

Conversation

@jeffmccollum
Copy link
Copy Markdown
Contributor

@jeffmccollum Jeff McCollum (jeffmccollum) commented May 7, 2026

Motivation

  • Grant the Brainstore IAM role the ability to assume export roles that present an external ID prefixed with bt: to support cross-account export workflows.

Description

  • Introduces aws_iam_role_policy.brainstore_export_assume_role which allows sts:AssumeRole on all resources with a StringLike condition sts:ExternalId = "bt:*".
  • Attaches the new JSON-encoded policy to the existing aws_iam_role.brainstore_role alongside existing S3, SecretsManager, and CloudWatch policies.

Testing

  • No automated tests were run as part of this change.

Copy link
Copy Markdown

@chatgpt-codex-connector chatgpt-codex-connector Bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

💡 Codex Review

Here are some automated review suggestions for this pull request.

Reviewed commit: 62d3072eac

ℹ️ About Codex in GitHub

Your team has set up Codex to review pull requests in this repo. Reviews are triggered when you

  • Open a pull request for review
  • Mark a draft as ready
  • Comment "Codex (@codex) review".

If Codex has suggestions, it will comment; otherwise it will react with 👍.

Codex can also answer questions or update the PR. Try commenting "Codex (@codex) address that feedback".

Comment thread modules/services-common/iam-brainstore.tf
Comment thread modules/services-common/iam-brainstore.tf Outdated
Co-authored-by: Kevin Green <kevin.green@braintrust.dev>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants