-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added sts credentials generation per run #98
base: main
Are you sure you want to change the base?
Conversation
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes 2 out of 4 committers have signed the CLA.
Abhishek Verma seems not to be a GitHub user. Have you signed the CLA already but the status is still pending? Recheck it. |
bump go-tfe
@rverma-nsl I was going to create an issue for being able to assume a role prior to running which is a feature I'm implementing with Terragrunt/Atlantis and would love to see as part of this operator. The assume role could be a part of the workspace spec and implemented very similar to how you've implemented the credential work here. Thoughts? edit: Realizing now that the tfc agent is what would be assuming a role per run but I believe that is closed source. I guess the only way forward is to build "assume_role" into the provider block for all our Terraform? |
This pr will enable to use IRSA or any role based credentials with terraform cloud out of box. The way its implemented is it will paas the temporary credentials of the workspace sync runner to the cloud instance before every run.