Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support VCS Provider configuration #313

Open
tiwood opened this issue Jul 11, 2022 · 3 comments
Open

Support VCS Provider configuration #313

tiwood opened this issue Jul 11, 2022 · 3 comments

Comments

@tiwood
Copy link

tiwood commented Jul 11, 2022

We're using Azure DevOps and have the requirement to rotate the personal access token used for Spacelift.

It would be great, if we could configure VCS Providers via Terraform.

Example for AzDO:

resource "spacelift_vcs_provider_configuration" "this" {
  azure_devops {
    url = "xxx"
    pat = "xxx"
  }
}
@jmfontaine
Copy link
Contributor

Hi @tiwood !

That is a great suggestion. Let me talk to the engineering team.

@wojciech12
Copy link
Contributor

Hi @tiwood, we would like to learn more about your use case. Could you sketch the plan how you would like to initially setup the repo and generate the PAT for the credential rotation? My email is [email protected]. Your input will help us to find the solution and proritize work on the provider.

@tiwood
Copy link
Author

tiwood commented Aug 24, 2022

@wojciech12, we're currently using Azure DevOps, therefore the configuration on the Spacelift side is pretty minimal.

  1. We're generating a Spacelift service user in Azure AD, this user gets the required roles to access AzDO.
  2. We're generating a Personal Access Token for this user and storing it securely (state, HSM..)
  3. This PAT has to be set/updated in Spacelift
  4. The configuration resource should expose the properties, required to finalise configuration in AzDO (aka Webhook endpoint)

Step 3 and 4 are relevant for the development of this provider.

Our relevant use-cases:

  • Configuring Spacelift and connected systems immutable with IaC
  • Rotating credentials if required with IaC

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants