-
Notifications
You must be signed in to change notification settings - Fork 934
configure artifacts.k8s.io to use atlantis + atlantis IAM changes in management account #8686
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
ece877f to
502e127
Compare
|
Ran Plan for 3 projects:
1. dir:
|
| limitations under the License. | ||
| */ | ||
|
|
||
|
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Moved to iam.tf
|
Ran Plan for 3 projects:
1. dir:
|
502e127 to
0754e39
Compare
|
Ran Plan for 3 projects:
1. dir:
|
|
atlantis plan -d infra/aws/terraform/management-account/default |
|
Ran Plan for dir: Plan Error |
|
atlantis plan |
|
Ran Plan for 3 projects:
1. dir:
|
|
Regarding the diff:
Ignore the errors in artifacts.k8s.io |
0754e39 to
7f36738
Compare
|
Ran Plan for 3 projects:
1. dir:
|
|
Ran Plan for 3 projects:
1. dir:
|
|
atlantis plan -d infra/aws/terraform/artifacts.k8s.io |
|
Ran Plan for dir: Plan Error |
…management account
8e958f8 to
fd05d8f
Compare
|
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: upodroid The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Ran Plan for 3 projects:
1. dir:
|
|
/lgtm |
| provider "aws" { | ||
| region = "us-east-2" | ||
| assume_role { | ||
| role_arn = var.atlantis_role_arn |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why not use a data resource for this ?
We could avoid use a tf.vars with a disclosed account ID.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
It has to be specified before the API calls are made. Also, account ids are everywhere in this repo and in test-infra
|
/hold cancel changes have been applied |
Required for #8684