-
Notifications
You must be signed in to change notification settings - Fork 46
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_iam_user doesn't work via new feature #101 in v0.8.0 #103
Comments
The problem is that the AWS API returns always empty tags for aws_iam_user resources (tags must be fetched via a separate API call). Do you see any tags? This will be fixed in my PR #102 that fetches all tags via Terraform. I'll merge that later today. |
Got it, #102 would be a big change. |
I merged the PR and tags are working now. However, I still need to work something out to delete |
Hi @jckuester , based on my scenario,
I can't see what is the tag in those policies and how to add/delete tag to a current policy. Is that what we expected? Feel free to let me know what's your thought. |
Hi @showerlee,
You can use #100 already if you want (tests are green). |
Hi @jckuester , thanks for the detailed explanation. Is there anything else I need to config for #100 ? |
The install.sh script only works for official releases and I haven't released a new version yet (I will release For now, you can clone the master branch and run |
Hi @jckuester , just let you know there may be a bug happened for aws_iam_user of #101
I confirmed all the iam users in my aws account have already tagged the
Owner
and the awsweeper policy with following:The result after applying this policy shows up it will filler out entire iam users which actually shouldn't be filler out.
For the other resources applying the same #101 pattern, they look good for now.
Feel free to let me know if anything miss-config from my side.
The text was updated successfully, but these errors were encountered: