-
-
Notifications
You must be signed in to change notification settings - Fork 1k
Unable to use Terraform modules stored in a private S3 bucket #3294
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I think can be investigated approach of updating getter to inject session details or replace existing ones with one that can use AWS details References: |
To be honest, if I could understand what credentials chain is being used I could solve this problem myself but it seems to be a super obscure thing at the moment It works fine on Terraform but not on Terragrunt this could be a blocker adopting Terragrunt if we haven't been using it heavily already... creating a publicly accessible bucket is not an option and using simple auth User/Pass is a heavy step down on security from IAM It's also awful to debug 😓 |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for raising this issue. |
if anyone comes across this... the only workaround I found is to add a configuration to your But this is not the ideal scenario! |
Hey @carlosjgp , Have you tried using the auth provider command? |
I haven't explore this option but it looks like it overrides my setup for AWS credentials to run Terraform itself
I'm only interested on the "modules get" command that runs on a different thread so I can't specify what AWS profile runs this It's not a problem on CI/CD pipeline because there is only 1 profile: "default" but locally I would like to have a different "default" profile for... well convenience To illustrate this On CI
Locally
I hope this helps |
Describe the bug
Storing private Terraform modules into an S3 bucket is not supported with Terragrunt
This works just fine with Terraform
Steps To Reproduce
Upload a Terraform module to a private S3 bucket that can only be accessed with AWS credentials
Expected behavior
Similar behaviour as seen when using Terraform where this works just fine
Maybe make use the
iam_role
to download the modules from S3https://terragrunt.gruntwork.io/docs/reference/config-blocks-and-attributes/#iam_role
Nice to haves
Versions
Additional context
More problems with
go-getter
The text was updated successfully, but these errors were encountered: