I hereby claim:
- I am fields on github.
- I am fields (https://keybase.io/fields) on keybase.
- I have a public key whose fingerprint is 0E0B B45D 237B FACC 8D0D B47C DF7E 7EE8 7C19 81F5
To claim this, I am signing this object:
Even after terraform apply, terraform plan still sees policy changes: | |
~ aws_s3_bucket.bucketname | |
policy: "{\"Statement\":[{\"Action\":\"s3:PutObject\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::xxxxx:root\"},\"Resource\":\"arn:aws:s3:::bucketname/*\",\"Sid\":\"\"}],\"Version\":\"2012-10-17\"}" => "{\"Statement\":[{\"Action\":\"s3:PutObject\",\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam:xxxx:root\"},\"Resource\":\"arn:aws:s3:::bucketname/*\"}],\"Version\":\"2012-10-17\"}" | |
The policy file I’m specifying doesn’t have a SID, because a) I don’t want to hardcode that (and it should be optional), and b) it may be applied to multiple buckets. | |
This is the policy file: |
I hereby claim:
To claim this, I am signing this object:
class RegisterFinish(luigi.Task):
item_id = luigi.IntParameter()
run_id = luigi.IntParameter()
def requires(self):
return [RunSubJob(self.item_id, self.run_id), NodepJob(self.item_id, self.run_id)]
def output(self):
# Two input variables (1 array of hashes, 1 hash) | |
[ | |
{ | |
"key1": "value1a", | |
"key2": "value2a" | |
}, | |
{ | |
"key1": "value1b", | |
"key2": "value2b" |