generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 19
Open
Labels
enhancementNew feature or requestNew feature or request
Description
Github handle
devops-rob
Please describe the feature you would like added to TerraCurl.
Add an auth method that mints SigV4 sigantures and passes it as an auth Header
Please detail the use case for this feature request?
Currently TerraCurl can not be used with AWS due to the fact that every API call needs a SigV4 signature. This stops normal CRUD operations from working and blocks retries as each attampt would require its own signature
Please add any pseudo code to demonstrate how this feature would work
resource "terracurl_request" "digest_auth_example" {
url = "https://api.example.com/protected/resource"
method = "GET"
# Digest Authentication credentials
auth {
type = "SigV4"
service = "ssm"
region = "eu-west-1"
# optional auth sources (default = AWS default chain)
profile = "prod" # ~/.aws/config profile
role_arn = "arn:aws:iam::123:role/Deploy" # assume role
session_name = "terracurl" # optional, default auto
external_id = null # optional
# web_identity = true # auto-picks envs if present
}
# The rest of request config...
}
Access key and secret ID will be read from environment variablesAre you interested in working on this feature?
Yes
jgrumboe
Metadata
Metadata
Assignees
Labels
enhancementNew feature or requestNew feature or request