Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Assuming current aws account ID when deploying to different account #10

Open
3 tasks done
copyPasteNinja opened this issue Oct 5, 2023 · 0 comments
Open
3 tasks done
Labels
bug Something isn't working triage

Comments

@copyPasteNinja
Copy link

Is there an existing issue for this?

  • I have searched the existing Issues

Current Behavior

I have Jenkins as CI/CD that executes my terraform code. When my pipeline does execute terraform, the aws_iam_policy_document being attached to aws_kms_key is adopting the account ID where Jenkins currently lives while I want the infrastructure to be created in different account, therefore giving me a permission error. Curios enough this only happens in modules/cloudfront-logs yet modules/opennext-revalidation-queue is using the same method to retrieve account ID.

Note: Unless I am doing something wrong... I do have a possible solution I would like to contribute.

Expected Behavior

I would expect the all resources being created by terraform to be created in the account I specify.

Steps To Reproduce

No response

Output

No response

Code of Conduct

  • I agree to follow this project's Code of Conduct

Sensitive Information Declaration

  • I confirm that neither PII/PID nor sensitive data are included in this form
@copyPasteNinja copyPasteNinja added bug Something isn't working triage labels Oct 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working triage
Projects
None yet
Development

No branches or pull requests

1 participant