-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Add create_custom_role_trust_policy
to control when a custom_role_trust_policy
should be used
#321
feat: Add create_custom_role_trust_policy
to control when a custom_role_trust_policy
should be used
#321
Conversation
This PR has been automatically marked as stale because it has been open 30 days |
@antonbabenko can you please take a look at this? |
…licy Fix an issue that allowed to created a trusted policy even when create_custom_role_trust_policy was false. A new local variable was added to grant the proper value based on a condition
a13baaf
to
1d9c0e4
Compare
This PR has been automatically marked as stale because it has been open 30 days |
@antonbabenko would you mind checking again, please |
Hey all, @egarbi: I think you need to mark the changes that @antonbabenko requested as done in order to move forward with the process. @bryantbiggs: any guidance on how to help get this merged ? Thanks a lot ! Bests. |
This PR has been automatically marked as stale because it has been open 30 days |
This PR was automatically closed because of stale in 10 days |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
create_custom_role_trust_policy
to control when a custom_role_trust_policy
should be used
@antonbabenko ok from your end? |
## [5.30.0](v5.29.2...v5.30.0) (2023-08-31) ### Features * Add `create_custom_role_trust_policy` to control when a `custom_role_trust_policy` should be used ([#321](#321)) ([481095e](481095e))
This PR is included in version 5.30.0 🎉 |
Hi mates, small note here from my side. |
In my defence, I will say that the breaking change was mentioned in the description. |
I'm not trying to blame so you no need to defend :) |
I agree |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Fixes #320
Motivation and Context
This is needed to prevent errors when trying to add a computed value for
custom_role_trust_policy
Breaking Changes
Those already passing valid values into
custom_role_trust_policy
will need toadd an extra input
create_custom_role_trust_policy = true
to prevent Terraformfrom trying to destroy policies.
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request