Rémi FLAMENT
07/12/2023, 12:23 PMatlantis apply
The service side config parameter apply_requirements: [approved] is not evaluated.
I tried 2 ways to add my server-side config using the flag --repo-config or --repo-config-json
This is not working, I can comment an apply, and it's done without the approval protection.
It's important to notice that I successfully set up an approval protection with the deprecated flag --require-approval
But the problem is that this flag fixed the "approved" requirements on plan,apply and import. I only want to configure "approved" on apply
Open issue talking about it :
• https://github.com/runatlantis/atlantis/issues/2605 (October 22 - atlantis 0.20.1)
My env :
• Atlantis latest 0.24.3
• GitLab Enterprise 16.2.0
• Atlantis installed with the binary on EC2
• Permission for Atlantis : group access token with "developer" access
My config :
server configuration
atlantis-url: '<https://atlantis.xxxxxx.io>'
gitlab-token: 'xxxxxxxx'
gitlab-user: 'atlantis'
gitlab-webhook-secret: 'xxxxxxxx'
log-level: 'info'
repo-allowlist: '<http://gitlab.com/xxxx/yyyy/*,gitlab.com/xxxxx/zzzzz/aaaaa/*|gitlab.com/xxxx/yyyy/*,gitlab.com/xxxxx/zzzzz/aaaaa/*>'
repo-config-json: '{"repos":[{"apply_requirements":["approved"],"id":"/.*/","repo_locking":true}]}'
web-basic-auth: 'true'
web-password: 'xxxxxxxxxxxx'
web-username: 'skello'
write-git-creds: 'true'
service side config
repos:
- id: /.*/
repo_locking: true
apply_requirements: [approved]
This is probably the feature I wanted from Atlantis to allow our devs to contribute to our terraform code base in a secure way 😬
If anyone succeeds in doing this in GitLab SaaS, please help 🙏