Closed drew-altana closed 12 hours ago
Appears that a bunch of places have the partition hard coded? https://github.com/search?q=repo%3Adatabricks%2Fterraform-provider-databricks+%22arn%3Aaws%22+path%3Aaws%2F*.go&type=code
I guess it's safe to assume govcloud support isn't available via this terraform provider yet?
@drew-altana can you create a separate feature request to support partitions in the data sources? Or convert current issue into feature request
I am also seeing pretty much the same error following the tutorial instructions here: https://registry.terraform.io/providers/databrickslabs/databricks/latest/docs/guides/aws-workspace
That was my conclusion as well; the principal is hard-coded as "arn:aws:iam::414351767826:root", and is not applicable to the govcloud/us-gov-west-1 partition.
My workaround was:
Instead of setting assume_role_policy to data.databricks_aws_assume_role_policy.this.json
, I defined an inline policy thusly:
assume_role_policy = jsonencode(
{
Version = "2012-10-17"
Statement = [
{
Action = "sts:AssumeRole"
Effect = "Allow"
Sid = ""
Principal = {
AWS = "arn:${data.aws_partition.current.partition}:iam::044793339203:root"
}
Condition = {
"StringEquals" = {
"sts:ExternalId" = "${var.databricks_account_id}"
}
}
}
]
}
)
(also declaring the data source: data "aws_partition" "current" {}
)
okay, made it a feature request.
Configuration
Expected Behavior
Arns generated are in the wrong partiton
Actual Behavior
Steps to Reproduce
terraform apply
-->Terraform and provider versions
1.51.0
Is it a regression?
unknown
Debug Output
Important Factoids
This is for us-gov-west-1 it's obvious the code here is not partition aware:
https://github.com/databricks/terraform-provider-databricks/blob/b827aeccb86c1cd7c5803e8a755d7085ebbdb207/aws/data_aws_bucket_policy.go#L33
Would you like to implement a fix?
No