You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When storing state in aws s3 via terraform remote, the pulling and pushing of the terraform.tfstate file from the s3 bucket is done prior to reading from any aws provider resource - in fact this action is provider-less, and relies on plain vanilla environment based aws credentials to do so.
This is unfortunate as a lot of work has been put into the aws provider to provide different options such as assuming roles.
So to get assume-roles properly working, you have to assume-role in aws cli first, in order to run terraform remote, to get the state, followed by terraforming which then uses the aws provider to assume-role again. This is needlessly complex - why cant the terraform remote use a named aws provider to do its bidding, and define the credentials in the same way?
This is non-ideal!!!!
(terraform all versions)
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 16, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
When storing state in aws s3 via terraform remote, the pulling and pushing of the
terraform.tfstate
file from the s3 bucket is done prior to reading from any aws provider resource - in fact this action is provider-less, and relies on plain vanilla environment based aws credentials to do so.This is unfortunate as a lot of work has been put into the aws provider to provide different options such as assuming roles.
So to get assume-roles properly working, you have to assume-role in aws cli first, in order to run terraform remote, to get the state, followed by terraforming which then uses the aws provider to assume-role again. This is needlessly complex - why cant the terraform remote use a named aws provider to do its bidding, and define the credentials in the same way?
This is non-ideal!!!!
(terraform all versions)
The text was updated successfully, but these errors were encountered: