Bryan Stuwart Recinos
Bryan Stuwart Recinos
I also would like to have this feature, on my use case we have tag immutability, so if the job is rerun and the image has been pushed it will...
you could also modify the `.sops.yaml` file and add the role you want to assume, however the AWS credentials used while running terraform must have permissions to assume the other...
@sfozz have you configured a `.sops.yaml` file? it should be located where your encrypted file is
I have not get this error, could you share how does your .sops.yaml file looks like?
@rsavage-nozominetworks I tested on M1 and works great, can you try deleting your folder `.terraform` and `terraform.lock.hcl` and run the terraform init again ?
this would be great, I'm looking for --ignore-unfixed option, since currently this blocks pipelines even if vulnerability can't be fixed
hello @debora-ito we are having the same issue, this is adding latency to our application while moving to EKS, is there any workaround? we are using credentials with roles +...
I'm having the same issue, is there any other workaround?
@apparentlymart I was not talking about adding it to a module, I was talking to add this as a flag we could define and change through a variable or something...