-
-
Notifications
You must be signed in to change notification settings - Fork 356
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New feature: ability to delete IAM roles #131
Comments
I think we'd want to support specifying regular expressions for which IAM roles to delete via the config file. |
Related to #116, which addresses IAM users and policies |
@zackproser I see you've had some thoughts here and assigned @rhoboat. I wonder what's the latest on this issue? Is there any action for us to take? |
@ina-stoyanova Hmm, from looking through internal messages it seems we initially were planning to use this one as a trial project? I'm not sure now why I assigned it to Rho - unless they were going to take a look at this? |
Hm, ok! Thanks for sharing! I think in that case, I'll leave this issue open, as it's still a desired feature. |
Support for IAM Roles and regex matching via config file were added in #330 |
To assist with hitting the IAM roles limit in AWS - we could use the ability to delete IAM roles - but to also provide a list of roles that should be preserved and not deleted.
The text was updated successfully, but these errors were encountered: