-
I believe there is a bug in the [KMS Key With Full Permissions](https://docs.kics.io/latest/queries/terraform-queries/aws/7ebc9038-0bde-479a-acc4-6ed7b6758899/) rule.
A [previous issue](https://git…
-
### Describe the feature
PermissionBoundary is only applied to Cloudformation Execution Role when bootstrapping with option --custom-permission-boundary
```bash
cdk bootstrap --custom-permissio…
-
Part of this was a mistake on my end, but I'm intrigued to determine if we can throw a better error or provide better feedback.
I defined an AWS KMS key with a policy, like so:
```
key = aws.km…
-
**What happened**:
Deploying multiple services on my cluster such as cluster-autoscaler, external-dns, ebs-csi-drivers. On initial deployment the pods do not receive the environment vars, volume…
-
### Terraform Core Version
1.4.5
### AWS Provider Version
4.63.0
### Affected Resource(s)
* aws_instance
### Expected Behavior
I expect a `terraform apply/plan` to not see changes…
ghost updated
1 month ago
-
/kind bug
Thanks in advance for looking into this, and thanks for maintaining this great project :)
**What happened?**
When I install the EKS Addon (tested via terraform or AWS console), with …
-
### Describe the feature
We currently define input a string to the `ServicePrincipal` class, e.g. `new ServicePrincipal("ec2.amazonaws.com")`.
The format for these values is largely predicatable. …
-
**Description**
From what I understand with provider 4.x terraform added the possibility to define inline policy for `aws_iam_role` (and possibly other resources ?).
We do not support this so driftc…
-
**Description**
Without changing anything, 0.9.1 doesn't detect a drift, while >=0.10.0 (up to 0.13.0 w/deep mode) does detect one.
```
Found changed resources:
- b (aws_iam_role):
…
-
**Is your feature request related to a problem? Please describe.**
When writing Terraform code to integrate Snowflake and AWS S3 buckets, I need to create both IAM policies and Snowflake stages. Ho…