#townhall (2018-10)
Town Hall Discussions
Archive: https://archive.sweetops.com/townhall/
2018-10-02
@mallen has joined the channel
2018-10-03
@Steven has joined the channel
wanted to ask about how things were going with CP and Atlantis
There are two hard blockers for using it:
1) https://github.com/runatlantis/atlantis/issues/249 (no response) - to support multiple instances of atlantis in diffferent accounts
We have a repository that contains our live terraform definitions for multiple accounts. We currently have 4 accounts and plan to have an Atlantis node in each account. We've tossed around the …
@Gabe - this one
We have a repository that contains our live terraform definitions for multiple accounts. We currently have 4 accounts and plan to have an Atlantis node in each account. We've tossed around the …
And this one!!! https://github.com/runatlantis/atlantis/pull/310
This allows setting different configs for different instances of atlantis, which is useful when wanting to run different servers for production and staging. Our use case is to have separate product…
one left, and it’s ready for prime time: https://github.com/runatlantis/atlantis/issues/308
what Allow operator to define a list of permitted users who can trigger atlantis commands why Currently, the only way to restrict access is by adding/revoking users from a repository altogether. We…
2) no way to scope who can run plan or apply other than revoking access to repo
awesome name @tamsky
for 2) you’d like to see github groups perform RBAC ?
i would be satisfied with a hardcoded list of usernames in the server
groups would be icing
I’m really enjoying https://github.com/kislyuk/keymaker - and IAM groups <> UNIX groups
Lightweight SSH key management on AWS EC2. Contribute to kislyuk/keymaker development by creating an account on GitHub.
both of those blockers read to me as accurate and missing requirements. I could imagine bypassing 2) by having two Atlantis’s per stage, one RO other R+W.
Perhaps, but how would you scope the access to the r/w and r/o pipelines?
at the oauth proxy?
oh, but all the interaction is via git comments
so what we really need is the google/kubernetes repo bot commands like
ok to test
then I deserve a “whoops”
so i think technically, not too hard to extend
otherwise comment back and say not authorized
i’ve debated if we want to commit the resources to fix 1 & 2
we may just end up using codefresh for v1
prove the concept out
for example, with Zapier, i can act on a comment and trigger a pipeline via webhook
i go back and forth with atlantis b/c we still need to solve the same problem with kops
and helm
(not just terraform
)
@tamsky this was opened/closed today https://github.com/runatlantis/atlantis/pull/306/files
This allows repos to specify different atlantis configs that exist in the same repo, and supports running separate instances of atlantis for staging and production by pointing at different configs.
Addresses (1)
@ankur has joined the channel
2018-10-05
@Gabe has joined the channel
2018-10-10
@Raghu has joined the channel
2018-10-13
@Gaurav has joined the channel