Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide CI to verify Terraform changes #1

Closed
tomkerkhove opened this issue Oct 5, 2022 · 7 comments
Closed

Provide CI to verify Terraform changes #1

tomkerkhove opened this issue Oct 5, 2022 · 7 comments

Comments

@tomkerkhove
Copy link
Member

tomkerkhove commented Oct 5, 2022

Provide CI to verify Terraform changes are still semantically valid, ie by doing a terraform plan.

Example per docs:
image

@JorTurFer
Copy link
Member

Maybe we can't follow this flow exactly because for init and plan we need the secrets and PRs from forks can't access to them.
Let's discuss if repo will be public or not and based on that, I'll update the CI

@tomkerkhove
Copy link
Member Author

I'm not sure if that problem is a problem when doing #2

@JorTurFer
Copy link
Member

I'm not sure if that problem is a problem when doing #2

it is, because GH doesn't have non-secret variables, I mean, if we want to avoid having to hardcode any value (like clientId for instance), we need to use secrets, it's the only way.
We have the same issue with OIDC permission inside GITHUB_TOKEN, depending on if the PR comes from a fork or not, the maximum access is different, read is the max access from forks
image

I know, GH is really particular...

@JorTurFer
Copy link
Member

To clarify, I'm not saying that we can't do anything, but maybe our CI checks are quite different

@tomkerkhove
Copy link
Member Author

But isn't read all that we need?

it is, because GH doesn't have non-secret variables, I mean, if we want to avoid having to hardcode any value (like clientId for instance), we need to use secrets, it's the only way.

I don't see much of a problem here to be honest. A client ID is an ID and not a secret.

@JorTurFer
Copy link
Member

it's an example, but we wil have the same situation with AWS and GCP, and also with the GH_PAT to write secrets in the other repo.
I need to think better in how to test this. maybe with atlantis bot having the secrets in our ARM machine or similar

@JorTurFer
Copy link
Member

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants