-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS CLI Access Terraform CA module init #28025
Comments
I'm looking into this, but it looks like we do have
This gives you correct randomly changing credentials on each run:
So you can simply do: Your thoughts? |
@Tener In terms of technical flow there is not difference between |
All right, I was confused by the workaround step no. 3 exporting the |
Looking at the Terraform code, the fetch in Reading the
Assuming you are fine with changing the Unfortunately, I don't see a way to make this work without user intervention. I'm not sure if there is a point in changing I have raised PR to add support for Nevertheless, you can easily rebuild Terraform with my change:
Given custom terraform installed to GOPATH, this will work:
|
The Does that sound reasonable ? |
We could prepare this profile, but that is a heavy change. Currently, we use env variables to pass the config, including secrets. It isn't immediately clear what we should put in the profile - only the CA bundle or all of the other settings, too? There are arguments to be made either way. The bigger problem is that even with the profile in place, we have no way to make
There is no way we should be modifying |
What
When terraform module is initialized from S3 bucket using Teleport
tsh proxy aws
The module http flow doesn't respect the
AWS_CA_BUNDLE
env var. In the result the following error is returned:Related:
hashicorp/terraform#28551
Workaround
Export
AWS_SDK_LOAD_CONFIG
and AWS_PROFILE created in step 1.The text was updated successfully, but these errors were encountered: