Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[release-0.42] Backport #933 #993

Merged
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
fix(iam-role): ignore managed_policy_arns in late init
Signed-off-by: Christopher Haar <[email protected]>
(cherry picked from commit 765c950)
  • Loading branch information
haarchri authored and turkenf committed Nov 29, 2023
commit 8dd9094fbee22d4a8aa7ef9183c1e71c89d60f03
1 change: 1 addition & 0 deletions apis/iam/v1beta1/zz_generated_terraformed.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

3 changes: 3 additions & 0 deletions config/iam/config.go
Original file line number Diff line number Diff line change
@@ -33,6 +33,9 @@ func Configure(p *config.Provider) {
p.AddResourceConfigurator("aws_iam_role", func(r *config.Resource) {
r.MetaResource.ArgumentDocs["inline_policy"] = `Configuration block defining an exclusive set of IAM inline policies associated with the IAM role. See below. If no blocks are configured, Crossplane will not manage any inline policies in this resource. Configuring one empty block (i.e., inline_policy {}) will cause Crossplane to remove all inline policies added out of band on apply.`
r.MetaResource.ArgumentDocs["managed_policy_arns"] = `Set of exclusive IAM managed policy ARNs to attach to the IAM role. If this attribute is not configured, Crossplane will ignore policy attachments to this resource. When configured, Crossplane will align the role's managed policy attachments with this set by attaching or detaching managed policies. Configuring an empty set (i.e., managed_policy_arns = []) will cause Crossplane to remove all managed policy attachments.`
r.LateInitializer = config.LateInitializer{
IgnoredFields: []string{"managed_policy_arns"},
}
})

p.AddResourceConfigurator("aws_iam_instance_profile", func(r *config.Resource) {