-
Notifications
You must be signed in to change notification settings - Fork 562
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Allow accessing private terraform modules (github) #296
Comments
Ah indeed this is a good case to handle. Just dropping this here since it seems related to the issue: #111 (comment) |
@motatoes |
I found a way to access private repos with digger ( or any other terraform github workflow ).
|
Thank you so much for sharing this @frank-bee , we will adopt something similar when we get to implementing support for digger for sure! |
Any news here? |
hey @frank-bee haven't had a look at this but it looks like the atlantis-inspired implementation is the way to go, I'll take a look at this but got alot on my plate right now so it might be a bit of time |
You can use env variables to configure git credentials, I think this is even more secure, see my blog post at https://dev.to/ebuildy/use-terraform-module-from-a-private-git-project-with-atlantis-18ak
|
Currently in any github pipeline where you run terraform and access private modules , this is very ugly.
You have to do something like this in your pipeline
Would be great to handle this "natively" in digger.
Related also to #219 ( when running digger locally you also need access to all module repos)
The text was updated successfully, but these errors were encountered: