-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature request: IAM Service Specific credentials #3233
Comments
Need that feature, too. We have a project with high security requirements and no service must call the internet directly (only using http proxies). To work with code commit, auto generated https git credentials are mandatory. |
+1 |
As a short term workaround for anyone in need:
|
@colin-lyman thanks for your sugestion, works fine for me. I added more lines to policy entry
|
Note, these work-arounds don't really work very well because the API to manipulate the credentials will only display the ServicePassword field once during creation ala iam access keys. There doesn't seem to be any way I can determine to have terraform hold on to that output since null_resource/local-exec doesn't have a way of saving it's output in the state. It seems that an API update to include this as a managed resource is definitely required. If someone has a work-around that works well, I'd be very interested to see how it was accomplished. edit: Additionally, local-exec's show the sensitive values in the logs. |
@bflad Any way to bump this up? The work-around won't work on TF Cloud and I'd really like to be able to manage a service account for codecommit with terraform. |
Service specific credentials are also required to access aws managed cassandra. It would be great if there was a resource similar to aws_iam_access_keys that could also encrypt the secret so its available in tf output:
|
This would be a great feature, especially for aws keyspaces / cassandra |
Waiting for it! |
With Keyspaces now a service on AWS I have a requirement for this feature, along with the option to return a password encrypted with a PGP key. |
@dekimsey You can try to save output of "aws iam create-service-specific-credential..." to aws secret manager with "aws secretsmanager create-secret..." and then get it with terraform: "data.aws_secretsmanager_secret_version.myname" |
Anyone looking at this? There's already a PR from a few months ago: #16185 |
Any update on this one? |
This functionality has been released in v4.1.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
worked! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Hi guys,
Service specific credentials could be used for HTTPS access to CodeCommit right now, assuming wider usage later on.
Terraform Version
Affected Resource(s)
Terraform Configuration Files
Could be derived from https://docs.aws.amazon.com/IAM/latest/APIReference/API_ServiceSpecificCredential.html
Expected Behavior
The text was updated successfully, but these errors were encountered: