-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Provide CI to verify Terraform changes #1
Comments
Maybe we can't follow this flow exactly because for |
I'm not sure if that problem is a problem when doing #2 |
it is, because GH doesn't have non-secret variables, I mean, if we want to avoid having to hardcode any value (like clientId for instance), we need to use secrets, it's the only way. I know, GH is really particular... |
To clarify, I'm not saying that we can't do anything, but maybe our CI checks are quite different |
But isn't read all that we need?
I don't see much of a problem here to be honest. A client ID is an ID and not a secret. |
it's an example, but we wil have the same situation with AWS and GCP, and also with the GH_PAT to write secrets in the other repo. |
Provide CI to verify Terraform changes are still semantically valid, ie by doing a terraform plan.
Example per docs:
The text was updated successfully, but these errors were encountered: