I am using terraform aws provider against Cloudian S3 system. When using assume_role, terraform fails because Cloudian arn is a different format than aws. Assuming role works fine when using aws cli so I am guessing terraform shouldn't have an issue either.
Is it possible to skip the arn regex validation when using assume_role? Or are there any other workarounds?
References
Error: "assume_role.0.role_arn" (arn:aws:iam::ab8fcacd140e0b128730b1ea80943a4b:role/terraform-testing-role) is an invalid ARN: invalid account ID value (expecting to match regular expression: ^(aws|aws-managed|third-party|\d{12}|cw.{10})$)
│
│ with provider["registry.terraform.io/hashicorp/aws"],
│ on main.tf line 25, in provider "aws":
│ 25: role_arn = "arn:aws:iam::ab8fcacd140e0b128730b1ea80943a4b:role/terraform-testing-role"
Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.
Volunteering to Work on This Issue
If you are interested in working on this issue, please leave a comment.
If this would be your first contribution, please review the contribution guide.
Description
I am using terraform aws provider against Cloudian S3 system. When using assume_role, terraform fails because Cloudian arn is a different format than aws. Assuming role works fine when using aws cli so I am guessing terraform shouldn't have an issue either.
Is it possible to skip the arn regex validation when using assume_role? Or are there any other workarounds?
References
Would you like to implement a fix?
None