-
Notifications
You must be signed in to change notification settings - Fork 23
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
alks_iamrole type change goes unnoticed #17
Comments
Thanks for reporting this, digging into it now! :) |
Alright, I've resolved the issue. I created a
|
Actually there's still an issue, the ALKS API isn't currently returning the role type as null so this issue can't be fixed until the API is updated. I'll cut a ticket with them to get it resolved.. |
Ah ok, thanks! Admittedly this is a real edge case that theoretically can only be caused by human error, so I don't think there's a lot of pressure to fix it. But it's definitely not expected behavior, so I thought it best to open the issue. Thanks so much for looking into this! |
This needs to have the role actually passed into the ALKS API, instead of the role name. Right now, ALKS doesn't support this, though there are stories on the backlog for doing this. See this issue specifically. There was some discussion there around "looking up" the type of role, and returning it in the ALKS API - unfortunately, if any modifications were made to the role type, the lookup would fail. The solution here is to allow the policy for the role to be passed into the API, and validate the policy meets our requirements. This would allow the ALKS Terraform provider to detect drift, and apply policy updates. I'll bring this up with the team again, and ensure we have priority on the appropriate backlog stories. 👍 |
Internal Tools team has had an initial discussion on this item - we agree it's still something that makes sense to look into. Some more digging will need to be done on the ALKS side to determine the level of effort getting a workable solution will take. A Spike has been made in the Internal Tools backlog for investigating this in the near future. |
We're using version 0.9.11 with Terraform 0.9.11.
Scenario
alks_iamrole
oftype = "Amazon EC2"
.Expected Behavior
Terraform plan shows either a different "type" for the role, or an unknown "type".
I don't know the ALKS API very well, but it feels like this violates the idempotent and authoritative nature of terraform.
The text was updated successfully, but these errors were encountered: