AWS Terraform IAM用户,承担S3后端的角色



为了将Terraform状态文件存储在S3存储桶中,我使用了管理员帐户凭据并进行了配置。现在我已经创建了IAM用户并尝试使用该角色。假设角色附加了管理员策略。

我已经用aws sts assume-role --role-arn命令测试了这个AIM用户设置。我能够获得令牌,并使用该令牌能够使用aws s3 ls命令访问S3存储桶。

现在尝试使用IAM用户访问/密钥,并为地形扮演角色。当我运行terraform refresh命令时,它给出了以下错误。

提供商代码:

provider "aws" {
region  = "us-west-2"
max_retries = 1
assume_role {
role_arn = var.assume_role_arn
}
}

错误

Error: Error acquiring the state lock
│
│ Error message: 2 errors occurred:
│       * AccessDeniedException: User: arn:aws:iam::xxxxxxxx:user/deploy is not authorized to perform: dynamodb:PutItem on resource:
│ arn:aws:dynamodb:us-west-2:xxxxxxxx:table/terraform-state-lock
│       status code: 400, request id: CV4J3JN1LD0KPDGHAOA9UL13ONVV4KQNSO5AEMVJF66Q9ASUAAJG
│       * AccessDeniedException: User: arn:aws:iam::xxxxxxxx:user/deploy is not authorized to perform: dynamodb:GetItem on resource:
│ arn:aws:dynamodb:us-west-2:xxxxxxxx:table/terraform-state-lock
│       status code: 400, request id: BISQQDU4659LLI3CEDP26T8RJ7VV4KQNSO5AEMVJF66Q9ASUAAJG
│
│
│
│ Terraform acquires a state lock to protect the state from being written
│ by multiple users at the same time. Please resolve the issue above and try
│ again. For most commands, you can disable locking with the "-lock=false"
│ flag, but this is not recommended.

为什么这在Terraform中不起作用如何修复这个错误?

谢谢SR-

它似乎甚至没有承担角色,否则错误将显示为assumed-role/deploy identity

我建议您尝试在命令行中导出AWS_SECRET_ACCESS_KEYAWS_ACCESS_KEY_ID变量,然后再次运行Terraform。

几天前,我尝试过使用Terraform Cloud和那里的Terraform用户凭据,这并不完全是你的情况,但它应该以同样的方式运行。

最新更新