Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow passing the assume_role ARN via an environment variable #11466

Closed
orf opened this issue Jan 3, 2020 · 3 comments
Closed

Allow passing the assume_role ARN via an environment variable #11466

orf opened this issue Jan 3, 2020 · 3 comments
Labels
enhancement Requests to existing resources that expand the functionality or scope. provider Pertains to the provider itself, rather than any interaction with AWS. stale Old or inactive issues managed by automation, if no further action taken these will get closed.

Comments

@orf
Copy link
Contributor

orf commented Jan 3, 2020

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Description

In some situations it would be very handy to be able to do:

AWS_ASSUME_ROLE_ARN=xyz terraform plan

The "recommended" way is to create a AWS config file with the assume_role key, but there are have seemingly been a lot of bugs around this functionality (and indeed it does not currently work). Creating the config file in CI environments can be tricky and annoying, especially if you have the ARN in an environment variable already.

New or Affected Resource(s)

The AWS provider itself.

References

@orf orf added the enhancement Requests to existing resources that expand the functionality or scope. label Jan 3, 2020
@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label Jan 3, 2020
@bflad bflad added the provider Pertains to the provider itself, rather than any interaction with AWS. label Jan 6, 2020
@bflad
Copy link
Contributor

bflad commented Jan 6, 2020

See also: aws/aws-sdk-go-v2#2867

I would suggest we wait until the AWS SDK team provides some guidance on the naming (for reasons in the mentioned issue), before we go about our own implementation. Though theoretically if the AWS Go SDK implements that feature request, no work should be required in the Terraform AWS Provider beyond just upgrading our AWS Go SDK dependency and cutting a release.

@bflad bflad removed the needs-triage Waiting for first response or review from a maintainer. label Jan 6, 2020
@github-actions
Copy link

Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label.

If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you!

@github-actions github-actions bot added the stale Old or inactive issues managed by automation, if no further action taken these will get closed. label Dec 27, 2021
@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators May 18, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Requests to existing resources that expand the functionality or scope. provider Pertains to the provider itself, rather than any interaction with AWS. stale Old or inactive issues managed by automation, if no further action taken these will get closed.
Projects
None yet
Development

No branches or pull requests

2 participants