#atlantis (2021-02)
Discuss the Atlantis (<http://runatlantis.io | runatlantis.io>) |
**Archive: ** https://archive.sweetops.com/atlantis/
2021-02-03

woops. i posted in #terraform when I meant to post here.
https://sweetops.slack.com/archives/CB6GHNLG0/p1612364483242900
how does one set the required_version
to be picked up automatically by atlantis for 0.13 or 0.14 ?
2021-02-05

Atlantis integration for Infracost. Shows cloud cost estimates for Terraform in pull requests. - infracost/infracost-atlantis

Nice one @jose.amengual

Atlantis release is coming today or monday

do you have a changelog yet @jose.amengual would be interested in having a read as i will defo be upgrading

we will publish one

is not yet publish

so i have this atlantis.yaml
in my repo with allow repo configs enabled
version: 3
projects:
- name: iam
dir: aws_accounts/account_a/iam
terraform_version: v0.14.6
I have like 50 modules in my repo and none of them work except for aws_accounts/account_a/iam
how do i set a default workflow for all directories except for the ones specified in my atlantis.yaml

maybe this ?

Atlantis: Terraform Pull Request Automation

not for autoplan but same idea

if it comes with streaming the run to comments the devs in my company are going to love this release

hmm i have that set in my repos.yaml file
# <https://www.runatlantis.io/docs/server-configuration.html#repo-config-json>
repos:
# apply config to repos matching this regex
- id: /.*/
# allow repo level configs to override the following per project
allowed_overrides:
- apply_requirements
- workflow
# `terraform apply` requires the PR to be the following.
# commented out since applies are commented out
#apply_requirements:
# - approved
# # - mergeable
workflow: default

but it seems like my repo atlantis.yaml supplants the /.*/
workflow

it could

it is last match

no i mean, the repo atlantis.yaml file seems to completely supplant the repos.yaml file on the server

so if i codify aws_accounts/account_a/iam
that will use the custom atlantis.yaml
in my repo

but if i dont codify say secrets
dir in that same repo, the repos.yaml
will not use it’s /.*/
default repo workflow

does that make sense ?

so basically i have to choose betw the repos.yaml
on my server and my atlantis.yaml
in my repo instead of having a default set in atlantis.yaml
if a directory is not codified in repos.yaml

server config overwrite repo config only if is allowed in the server side

not sure i follow

you kinda have to have a default and then a specific repo setting

but don’t i already have a default set ?

what do i need to add ?

allowed_overrides: []

that will now allow repos to set those setting

what happens if you do atlantis plan -d aws_accounts/account_a/iam -d aws_accounts/account_a/sgs -d aws_accounts/account_a/pepesucks

does that work?

wait but i want repos to be able to override the workflow

(lol at your example command btw)

ya if i comment on the PR with a manual atlantis plan -d dir_path
then it works correctly

but not the best UX. I’d prefer if the default is /.*/
w/o having to run it manually

I think this is not implemented on atlantis

ahh! ok so im not crazy

i thought i was doing something wrong

and if you do *.tf it will pick every single module

you do not have !/pepe/*.tf

lol i did try that a while back and it planned EVERYTHING

you can create a pr to atlantis

my github PR was insanely commented hahaha

im go nna have to learn how to locally dev atlantis

do you folks have docs on that ?

not really

ah please add them cause i am so confused how to dev it

I use dlv to run atlantis and ngrok for the webhook

if you work with me on setting up a local dev env, id write up the tech docs for it and contrib to atlantis

im not free this week but ill be free next week if youre down


go 1.15 DLV VScode
2021-02-08

Description Few improvements and a number of bug fixes Features/Improvements Add –gh-app-slug which allows fetching of gh app user. (#1334 by @nishkrishnan) (Also fixes #1161) Add –disable-repo-…
2021-02-09

2021-02-17

Anyone know/recommend a terraform module for deploying atlantis to GCP
2021-02-18

Hi everybody, I’d like to use Terraform cross-account, without having the assume_role block in provider and backend. With terragrunt that was easily solved by using –terragrunt-iam-role in the cmdline of the apply/plan steps.
I have state buckets in every account seperately.
What would now be the best way forward ?

We deploy an Atlantis into each AWS account and each atlantis is configured to only listen to certain repos. There is a cost to this in both maintaining a service and $$ for running it. If you have a lot of accounts this can add up, but it is more secure. But it is probably still cheaper than paying for one of those SaaS options

Can still use Terragrunt with Atlantis…

i can dream

i’ll try and use aws sts to assume , see if that works

I use terragrunt + a single atlantis server that assumes roles cross-account and it works great. If done with fine-grained IAM roles the security model is still quite nice.
If you just want to not assume roles locally though you can set up different profiles using aws-vault
and run commands like aws-vault exec some_profile -- terraform apply
.

terragrunt + a single atlantis server < snap

assumes roles into other accounts

what atlantis runs is exactly what users from from local

I have a solution now, but what you are suggesting can be done without terragrunt.hcl ?

It’s a project which I need to dumb down a bit for the target group, flat structures, no workspaces, no tricks, so duplicated vars. Also the reason that I’m not using terragrunt as it’s another thing..
2021-02-22

@jose.amengual Are ya’ll gonna cut a release of Atlantis since merging the OPA stuff?

The policy checks will be released as a pre-release for people to try

Awesome! Any idea when that will be?


Thanks!


Awesome, thanks man
2021-02-24

Feature release. Due to a sizeable refactor and the number of configuration settings supported in Atlantis, this is a pre-release and should not be considered fully stable. Features Add –enable-p…

@joshmyers ^