-
-
Notifications
You must be signed in to change notification settings - Fork 141
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Noise is generated in terraform plan for OAuthToken #31
Comments
The issue in terraform aws provider, |
Yes, we have seen the same behavior since day one. IMO, terraform should treat it's statefile as the "canonical source of truth" for settings which cannot be read. E.g. RDS passwords, GitHub tokens, etc. That way it could optimistically detect changes. Would love a clever workaround if someone has it. |
Just riffing here... what about always ignoring the token in the lifecycle section, but using AWS secrets manager to set the token? |
I don't know the status of this. However, I am using SSM securestrings to provide the github OAuth and I still see the same consistent changes (This is due the previously pointed issue). |
This worked for me:
|
Using
terraform-aws-cicd
and getting the source code from the private repo in GitHub,and everything is applied already
whenever one executes plan, terraform wants to change OAuthToken every time
Output of terraform plan
Usage
Probably a reason for this is OAuthToken can be only set, not read in AWS CodePipeline.
Are there any approaches to this to have "clean" plan without any changes?
From https://www.terraform.io/docs/providers/aws/r/codepipeline.html:
NOTE on aws_codepipeline: - the GITHUB_TOKEN environment variable must be set if the GitHub provider is specified.
Tried that, nothing happens...
The text was updated successfully, but these errors were encountered: