-
Notifications
You must be signed in to change notification settings - Fork 9.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
deps: Bump github.com/aws/[email protected] #27620
Conversation
Changes: ``` * backend/s3: Support for AWS Single-Sign On (SSO) cached credentials ``` Updated via: ``` go get github.com/aws/[email protected] go mod tidy ``` Please note that Terraform CLI will not initiate or perform the AWS SSO login flow. It is expected that you have already performed the SSO login flow using AWS CLI using the `aws sso login` command, or by some other mechanism before executing Terraform. More precisely, this credential handling must find a valid non-expired access token for the AWS SSO user portal URL in `~/.aws/sso/cache`. If a cached token is not found, is expired, or the file is malformed an error will be returned. You can use configure AWS SSO credentials from the AWS shared configuration file by specifying the required keys in the profile: ``` sso_account_id sso_region sso_role_name sso_start_url ``` For example, the following defines a profile "devsso" and specifies the AWS SSO parameters that defines the target account, role, sign-on portal, and the region where the user portal is located. Note: all SSO arguments must be provided, or an error will be returned. ``` [profile devsso] sso_start_url = https:my-sso-portal.awsapps.com/start sso_role_name = SSOReadOnlyRole sso_region = us-east-1 sso_account_id = 123456789012 ``` Additional Resources * [Configuring the AWS CLI to use AWS Single Sign-On](https:docs.aws.amazon.com/cli/latest/userguide/cli-configure-sso.html) * [AWS Single Sign-On User Guide](https:docs.aws.amazon.com/singlesignon/latest/userguide/what-is.html)
Codecov Report
|
If there are plans to cut another Terraform 0.14 release, this is a good candidate for backport. 👍 The equivalent functionality in the Terraform AWS Provider has been merged and will release with version 3.26.0, expected later today. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Changes:
Updated via:
Please note that Terraform CLI will not initiate or perform the AWS SSO login flow. It is expected that you have already performed the SSO login flow using AWS CLI using the
aws sso login
command, or by some other mechanism before executing Terraform. More precisely, this credential handling must find a valid non-expired access token for the AWS SSO user portal URL in~/.aws/sso/cache
. If a cached token is not found, is expired, or the file is malformed an error will be returned.You can use configure AWS SSO credentials from the AWS shared configuration file by specifying the required keys in the profile:
For example, the following defines a profile "devsso" and specifies the AWS SSO parameters that defines the target account, role, sign-on portal, and the region where the user portal is located. Note: all SSO arguments must be provided, or an error will be returned.
Additional Resources