-
We want to allow users to simply ready-made policy templates in their environment. Examples of templates are GitHub, E-commerce, Banking, etc.
Acceptance criteria:
- Command `permit env template a…
-
### Terraform Core Version
1.8.5
### AWS Provider Version
5.53.0
### Affected Resource(s)
aws_quicksight_vpc_connection
### Expected Behavior
The resource is properly destroyed
…
-
### Expected Behavior
I don't have rights to update the repository settings. After I do `terraform apply` and the update fails, I want to see the correct stare.
In other words after failed apply…
-
### Is there an existing issue for this?
- [X] I have searched the existing issues
### Community Note
* Please vote on this issue by adding a :thumbsup: [reaction](https://blog.github.com/2016-…
-
### Community Note
* Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the original issue to help…
-
### What is the bug?
Using the `aws_assume_role_arn` option in the provider config ends with throwing a `NoCredentialProviders` error during Terraform apply stage.
I have an active Open Search clu…
-
### Terraform Core Version
1.9.8
### AWS Provider Version
5.76.0
### Affected Resource(s)
resource "aws_servicecatalog_principal_portfolio_association"
### Expected Behavior
Assoc…
-
Hello,
I have a problem with 'databricks_mws_ncc_private_endpoint_rule' module due to timeout, is there any way to pass timeout condition along with the module ?
### Configuration
```hcl
r…
-
### Description
Hello 👋
It's not clear if this is actually an issue with Terraform, here are the issues I've encountered.
* Terraform Core Version : 1.7.5
* AWS Provider Version : 5.72.1…
-
### Terraform Version
Terraform v0.12.12
### Helm provider Version
~> 0.10
### Affected Resource(s)
- helm_resource
### Terraform Configuration Files
```hcl
resource "helm_release" "…