-
-
Notifications
You must be signed in to change notification settings - Fork 1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: Added direct policy attachment in iam-user module #387
feat: Added direct policy attachment in iam-user module #387
Conversation
This would be really helpful! Thank you. You have my vote for merging. |
Please add this functionality |
…raform-aws-iam into add-direct-policy-attachment
@antonbabenko issues fixed, please merge when you'll have time. Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Almost great. Minor comments.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Let's be consistent and rename custom_iam_policy_arns
to policy_arns
everywhere.
@antonbabenko Thanks, I finished it |
## [5.28.0](v5.27.0...v5.28.0) (2023-07-19) ### Features * Added direct policy attachment in iam-user module ([#387](#387)) ([9fa481f](9fa481f))
This PR is included in version 5.28.0 🎉 |
Unfortunately this not working as expected. See #408 |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
Description
Add ability to assign a list of custom IAM Policies to selected IAM User during creation
Motivation and Context
Sometimes IAM Users require some elevation of privileges without including other groups. Also some projects should have a single user without a group, for example the
terraform
user with pre-existing policies to deploy resources. Does not make sense to create a group for this purpose, so the ability to add some policies to IAM User is a nice feature.Breaking Changes
None
How Has This Been Tested?
examples/*
to demonstrate and validate my change(s)examples/*
projectspre-commit run -a
on my pull request