You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Terraform's GCP and Kubernetes providers don't use the gcloud or the kubectl commandline programs to perform changes. But they do honor the GOOGLE_OAUTH_ACCESS_TOKEN and KUBE_CONFIG_PATH environment variables. If the shell is modified to include these two variables, Terraform works transparently!
The text was updated successfully, but these errors were encountered:
lhchavez
added a commit
to replit/ephemeral-iam
that referenced
this issue
Jan 26, 2022
This change adds two environment variables to the shell in
`assume-privileges` so that Terraform can take advantage of this tool:
* `KUBE_CONFIG_PATH`, which Terraform recognizes as a way to override
the kubectl config path.
* `GOOGLE_OAUTH_ACCESS_TOKEN`, which Terraform recognizes as a way to
override the access token to assume the identity of another user.
Fixes: rigup#85
Terraform's GCP and Kubernetes providers don't use the
gcloud
or thekubectl
commandline programs to perform changes. But they do honor theGOOGLE_OAUTH_ACCESS_TOKEN
andKUBE_CONFIG_PATH
environment variables. If the shell is modified to include these two variables, Terraform works transparently!The text was updated successfully, but these errors were encountered: