Skip to content

Conversation

@GavinFrazar
Copy link
Contributor

@GavinFrazar GavinFrazar commented Nov 25, 2025

Changelog: Added Terraform provider support for teleport_integration resources.

Closes #61401

@github-actions
Copy link

github-actions bot commented Nov 25, 2025

Amplify deployment status

Branch Commit Job ID Status Preview Updated (UTC)
gavinfrazar/terraform-aws-oidc-integration 52c22e6 4 ✅SUCCEED gavinfrazar-terraform-aws-oidc-integration 2025-11-26 05:49:53

@public-teleport-github-review-bot

@GavinFrazar - this PR will require admin approval to merge due to its size. Consider breaking it up into a series smaller changes.

@GavinFrazar GavinFrazar requested review from avatus and removed request for bernardjkim, mmcallister, ptgott, r0mant, tigrato and zmb3 November 25, 2025 03:24
Copy link
Contributor

@hugoShaka hugoShaka left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

just a couple of non-blocking questions

# only the "github" integration subkind uses credentials currently, but
# credentials is excluded intentionally so that we dont have to handle plugin credentials, which are stored separately.
- "IntegrationV1.Spec.credentials"
- "IntegrationV1.Spec.GitHub"
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why must we ignore the github integration completely? can we add support for this integration, or at least document that it's not supported and track it in an issue? else we will forget about this and will tell to customers: "yes we support integrations in TF" while we're not.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The github integration is complicated. You specify credentials and then auth modifies the credentials (in the spec) when you create the integration and replaces them with a "credential ref" and creates/stores plugins credentials separately.

On destroy the auth server also deletes the plugin credentials referenced by the integration.

I thought that would cause a lot of problems and it's not necessary to support github integration for our cloud discovery goals.
Maybe we could just mark credentials field as computed though? I'm not sure.
I'll try that now just to see what happens, but if it's not such a trivial thing I'd rather just document it and track it in an issue until someone asks for it.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

ticket created: #61799

Comment on lines +502 to +503
IntegrationV1.Spec.AWSOIDC.audience:
- UseValueIn("", "aws-identity-center")
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

why is this check needed? the server doesn't validate this or do we want to restrict the type of IaC integrations manageable by TF?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It's not needed, just nice to have because terraform will reject bad inputs at planning time

* Also updated the audience field docs and validation error message to
  clarify what values are supported.
@GavinFrazar GavinFrazar force-pushed the gavinfrazar/terraform-aws-oidc-integration branch from 275a4e4 to 52c22e6 Compare November 26, 2025 05:44
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add terraform support for AWS OIDC integration

5 participants