Uploaded image for project: 'Red Hat Advanced Cluster Security'
  1. Red Hat Advanced Cluster Security
  2. ROX-32794

Add an ability to use Terraform plan with personal ocm token

    • Icon: Task Task
    • Resolution: Unresolved
    • Icon: Normal Normal
    • None
    • None
    • ACS Cloud Service
    • None
    • Future Sustainability
    • False
    • Hide

      None

      Show
      None
    • False
    • Not Selected

      Overview:

      We can currently run Terraform plans either via GitHub Actions or locally using organization admin credentials. The latter is used for updating the provider lock files or debugging the remote state. This is not only inconvenient ("ocm login --use-device-code" > Private tab > Enter the code and credentials) but also increases the risk of errors due to elevated privileges.

      Acceptance Criteria:

      • ACS CS team (possibly expand to On Call) can run terraform plan with their own credentials.
      • Runbooks, documentation updated

              ykovalev@redhat.com Yury Kovalev
              ykovalev@redhat.com Yury Kovalev
              ACS Cloud Service
              Votes:
              0 Vote for this issue
              Watchers:
              2 Start watching this issue

                Created:
                Updated: