-
### Terraform Core Version
1.5.3
### AWS Provider Version
5.8.0
### Affected Resource(s)
aws_iam_policy
### Expected Behavior
This is something that I've seen for a while and can'…
-
We are currently trying to move away from storing access and secret keys in our configuration files and have instead enabled the use of IAM policies on our AWS EC2 instances, as per current best pract…
-
### Terraform Core Version
1.5.7
### AWS Provider Version
5.31.0
### Affected Resource(s)
aws_rds_cluster
### Expected Behavior
Apply [iam_database_authentication_enabled](https:…
-
## Hello!
- Vote on this issue by adding a 👍 reaction
- To contribute a fix for this issue, leave a comment (and link to your pull request, if you've opened one already)
## Issue details
I…
-
### Persona
Consumer of UDS KMS module.
### Description
The current IAM policy document sets up permissions that are overly permissive depending on how the module is used, see https://github.…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help t…
-
**Is your feature request related to a problem? Please describe.**
I have a case that I've already enabled Cognito User Pool as default Authentication Mode on my API then I added IAM as additional au…
-
Hello @OmarBazaraa
Nice work on this!
I am running the application as-is without any modification using the IAM database and I am getting at best 3/10 accuracy
Would you have any ideas as to…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help the com…
-
I've looked at the Terragrunt "Work with multiple AWS accounts" [docs](https://terragrunt.gruntwork.io/docs/features/work-with-multiple-aws-accounts/) but could not find any reference to flags or env …