Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid hardcoded thumbprint_list in aws_iam_openid_connect_provider #270

Closed

Conversation

tillkuhn
Copy link
Contributor

With hashicorp/terraform-provider-tls#62 we can now read the fingerprints from the server certificate chain dynamically, so there's no longer a need to hardcode thumbprint_list in the aws_iam_openid_connect_provider resource. This should make the code more compatible and robust, see also Enabling IAM Roles for Service Accounts in the official terraform documentation. Thanks for your project, it is a great source of inspiration for setting up EKS with Terraform.

Copy link
Owner

@Young-ook Young-ook left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Great!

@tillkuhn
Copy link
Contributor Author

@Young-ook sorry, I did not know that commit signing is mandatory. I tried to "git commit amend" the previous commit in my branch, but git is giving me a hard time with the history. I think the easiest way for me is to create a fresh PR with a signed commit. I'll try now!

@tillkuhn
Copy link
Contributor Author

@Young-ook See new PR #271 (same code but with signed commit), this one should work!

@tillkuhn tillkuhn closed this Apr 14, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants