You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi Team,
We are using the "phillbaker/elasticsearch" module in our TF code. Our pipeline and the terraform execution role are in 2 different aws accounts. When we pass the aws_assume_role_arn, we are getting an access denied error. As the terraform-privilaged role is having an external id in the sts policy. If we remove that external id condition in the sts policy, the code works as expected.
"errorCode": "AccessDenied",
"errorMessage": "User: arn:aws:sts::<PIPE_LINE_AWS>:assumed-role/gitlab-runner/1679911173656119075 is not authorized to perform: sts:AssumeRole on resource: arn:aws:iam::<CLUSTER_RESIDING_AWS>:role/terraform-privilaged",
Is there a way to pass the external id in the provider.tf? Like the aws provider?
Hi Team,
We are using the "phillbaker/elasticsearch" module in our TF code. Our pipeline and the terraform execution role are in 2 different aws accounts. When we pass the aws_assume_role_arn, we are getting an access denied error. As the terraform-privilaged role is having an external id in the sts policy. If we remove that external id condition in the sts policy, the code works as expected.
Error
Is there a way to pass the external id in the provider.tf? Like the aws provider?
The text was updated successfully, but these errors were encountered: