-
To automate the deployment process in a aws cloud, it would be great to use the AWS IAM Role to access the s3 bucket.
-
**Describe the bug**
When the central SpokeRegistration lambda executes (using the Organizations feature), it attempts to create a new log-group, and gets an access denied error. From CloudTrai…
-
### Describe the bug
I'm deploying a stack through CDK pipelines and have a permissions boundary configured within `cdk.json`. Every role is being configured app wide with the permissions boundary ap…
-
**Is your feature request related to a problem? Please describe.**
I'm running my Vault cluster within an AWS EKS cluster and must create an IAM user with the proper permissions and then provide Vaul…
-
### Terraform Core Version
1.3.7, 1.5.4, 1.5.6
### AWS Provider Version
4.55.0, 5.1.0, 5.11.0, 5.13.1, 5.x
### Affected Resource(s)
aws_lambda_function
### Expected Behavior
When …
-
Running into the following error after deploying cloudformation for password rotation.
6858314d-cee5-4cf8-abfd-392603586515 Check that AccountID: [AccountID] has the correct IAM Role deployed to i…
-
### Describe the feature
We currently define input a string to the `ServicePrincipal` class, e.g. `new ServicePrincipal("ec2.amazonaws.com")`.
The format for these values is largely predicatable. …
-
**Description**
From what I understand with provider 4.x terraform added the possibility to define inline policy for `aws_iam_role` (and possibly other resources ?).
We do not support this so driftc…
-
This explicitly breaks refreshes where the cached assume role attribute value is being used instead of the actual currently configured value.
A typical broken example, in my case, would be a 2 step…
-
**Description**
Without changing anything, 0.9.1 doesn't detect a drift, while >=0.10.0 (up to 0.13.0 w/deep mode) does detect one.
```
Found changed resources:
- b (aws_iam_role):
…