-
### Terraform Core Version
1.3.7, 1.8.5
### AWS Provider Version
5.55.0
### Affected Resource(s)
* aws_backup_selection
### Expected Behavior
The configuration inside multiple `condition` block…
-
### Terraform Core Version
1.5.5
### AWS Provider Version
5.53.0
### Affected Resource(s)
* aws_iam_policy
### Expected Behavior
By mistake we included a `aws_iam_policy` statement with an empt…
-
### Description
A new resource for CodeDeploy on-premises Instance
### Affected Resource(s) and/or Data Source(s)
N/A
### Potential Terraform Configuration
```terraform
aws_codedeploy_…
-
### What happened?
The docs show the Roles being created with all values lowercased, but this results in an `MalformedPolicyDocumentException` in AWS with the error message "Unknown field statement".…
-
### Debug mode
- [X] I have enabled debug mode
- [X] I have read [checked the Common Issues page](https://snipe-it.readme.io/docs/common-issues)
### Describe the bug
Identity Center has cust…
-
Running
`terraformer plan aws --resources=ecs` works.
`terraformer plan aws --resources=iam` works
`terraformer plan aws --resources=route53,iam` works
However, `terraformer plan aws --resource…
-
### Terraform Core Version
1.7.4
### AWS Provider Version
5.51.1 Fails
5.49.0 Succeeds
### Affected Resource(s)
```hcl
data "aws_iam_policy" "AWSLambdaVPCAccessExecutionRole" {
arn…
-
The documentation states that we can use 'aws_iam' with ACCESS_KEY+SECRET_KEY.
```
output {
opensearch {
hosts => ["hostname:port"]
auth_type => …
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the…
-
Description:
The current implementation for creating an S3 client in the settings.py file explicitly requires AWS access keys, as seen in [settings.py](https://github.com/i-dot-ai/redbox/blob/main/re…