Provisioning tfstate backend roles in refarch #14
Unanswered
rauthur
asked this question in
Questions & Answers
Replies: 2 comments 4 replies
-
We'll likely need to go over this during a workshop call, but just to be clear:
|
Beta Was this translation helpful? Give feedback.
4 replies
-
I was able to move past this by temporarily manually adding the role and creating the necessary S3/Dynamo policies in the root account along with the ability for the SuperAdmin to assume the role. After this, I ran into a second issue in that the component metadata for several accounts was empty so I add a condition in the dynamic-roles.tf of account-map to discard empty objects loaded by the utils helper. |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Spinning my wheels a bit on this one so figured I'd ask.
In the baseline steps there is a note:
And possibly related:
However, none of the steps in the baseline seem to provision the roles for accessing the tfstate. Tracing through it looks like the
-var=access_roles_enabled=false
prevents these roles from being created in the baseline tfstate backend workflow. The full deploy/tfstate workflow isn't run until later in theidentity
phase.The result is that the
atmos workflow deploy/accounts -f accounts
workflow cannot run and does not create the account-map due to an error:The role doesn't exist so the error is clear, however, passing access_roles_enabled=true doesn't work since the account-map needs to be created.
Beta Was this translation helpful? Give feedback.
All reactions