-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Implementation of the create_custom_role_trust_policy flag to control custom_role_trust_policy creation #360
Conversation
…ontrol custom_role_trust_policy creation
Hello @antonbabenko and @bryantbiggs, Thanks in advance. Bests ! |
Update fork to keep it in sync with upstream. |
Update fork to keep it in sync with upstream. |
Synced Forked with Upstream repository. |
Thanks for your efforts on this PR. I am also hitting this same problem and would benefit from seeing this get merged, cheers |
hello @bryantbiggs, Any luck for the review of this PR ? Thanks a lot for your valuable support. Bests. |
This PR has been automatically marked as stale because it has been open 30 days |
Hello @antonbabenko Thanks a lot for your valuable help. |
@egarbi : Yes I saw that, but it looks like your PR only fixes this for the submodule iam assumable role. Issue is that I see that some of the changes that @bryantbiggs recommended are conflicting with the merge on #321 as I deleted the variable "create_custom_trust_policy" in this iteration in favor of the variable "assume_role_policy". Hopefully this helps converge to a single solution for all. Bests. |
@@ -82,16 +82,10 @@ variable "custom_role_policy_arns" { | |||
default = [] | |||
} | |||
|
|||
variable "custom_role_trust_policy" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is a breaking change so we won't be making that here. a lot of these changes and nuanced differences will be resolved at the next breaking change (ref https://github.com/clowdhaus/terraform-aws-iam)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
So, I reverted back my changes to remove the breaking chages.
Thanks.
This PR has been automatically marked as stale because it has been open 30 days |
Commenting this to make sure it does not become stale! Thanks. |
This PR has been automatically marked as stale because it has been open 30 days |
This PR was automatically closed because of stale in 10 days |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Hello,
This PR objective is to fix #320 (that got closed because of being stale) and an attempt to solve PR #321 as initially raised by @egarbi
Relying on the var.custom_role_trust_policy = "" in the iam_assume_role module under specific circumstances makes terraform plan error our as below:
An example of code which makes the module error out is as below:
Motivation and Context
As of today, the implementation does not allow the use of custom_role_trust_policies in all cases.
Breaking Changes
Nope this feature is not breaking changes since the new bool flag <create_custom_role_trust_policy> is defaulting to false.
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request