You can use separate AWS accounts for Digger locks and target infrastructure.Documentation Index
Fetch the complete documentation index at: https://docs.opentaco.dev/llms.txt
Use this file to discover all available pages before exploring further.
Locks
-
If you only pass
AWS_ACCESS_KEY_IDandAWS_SECRET_ACCESS_KEYenv vars, same account will be used for both -
If in addition you also pass
DIGGER_AWS_ACCESS_KEY_IDandDIGGER_AWS_SECRET_ACCESS_KEYvars then those will be used for Digger locks, and the first pair will be used as target account
State
In the digger.yml file, to use an alternate account for your state, you can pass the above credentials throughextra_args and use the default AWS credentials as the commands: env_vars:
In the past, setting only the evironment variables would allow this separation but the CLI is not honoring them currently. Weโre looking into why.

