-
Notifications
You must be signed in to change notification settings - Fork 985
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unauthorized during apply when using a plan-file and AWS kubernetes token. #2065
Comments
I'm using this script as a workaround right now, called via exec in the Kubernetes provider.
|
Bumping, I'm having the same problem, even when using exec. |
Same problem, using any configuration method. |
For anyone using roles, and having persistent issues check this out. This ended up being the cause of my problems. |
We seem to have the same issue but with google authentication to kubernetes as described here: https://registry.terraform.io/providers/hashicorp/google/latest/docs/guides/using_gke_with_terraform#using-the-kubernetes-and-helm-providers |
Have the same issue using exec and the roles seem to be ok. Any idea on any other permanent workaroud? |
Terraform Version, Provider Version and Kubernetes Version
Affected Resource(s)
It's a general provide issue.
Terraform Configuration Files
Debug Output
https://gist.github.com/perj/4783ccfa69812f1eb0fb329bb8fc9aa0
Panic Output
Steps to Reproduce
terraform plan -out=plan
sleep $((20 * 60))
terraform apply plan
Expected Behavior
Successful apply
Actual Behavior
Error from apply:
Important Factoids
We're using Atlantis. The plan is done when the PR is opened, the apply after it has been approved, which can take several hours.
References
This is basically a request to re-open #918
We can't use the workaround suggested there because we do an assume-role in the AWS provider so the same credentials are not available outside of the Terraform process.
Community Note
The text was updated successfully, but these errors were encountered: