-
Notifications
You must be signed in to change notification settings - Fork 9.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Destroying aws_iam_user_login_profile does not remove the user's password #3856
Comments
Generally, the resource should support all available API actions properly. Right now it only supports |
Hi folks 👋 Sorry for this long running issue. 😖 I think we will plan on addressing this along with #7536 as the resource desperately needs a major overhaul and its easiest just to bundle the work together. I'm marking as version 2.0.0 to ensure its captured during that maintainer work cycle with the other issue, but we are also willing to look at contributions ahead of time as this is indeed buggy behavior. |
…esource recreation, and require import for existing infrastructure References: * #7536 * #3856 Output from acceptance testing: ``` --- PASS: TestAccAWSUserLoginProfile_notAKey (7.29s) --- PASS: TestAccAWSUserLoginProfile_keybaseDoesntExist (7.36s) --- PASS: TestAccAWSUserLoginProfile_PasswordLength (16.86s) --- PASS: TestAccAWSUserLoginProfile_keybase (16.93s) --- PASS: TestAccAWSUserLoginProfile_basic (24.81s) ```
In version 2.0.0 of the Terraform AWS Provider, releasing later this week, the |
Destroying aws_access_key_id resource would not destory the access_keys it created , resulting in duplicates . When you re-create the the same user the old keys used to appear on the AWS console . |
Is there a Github group for AWS providers for terraform where the latest developments can be tracked and notifications can be setup |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Hi there,
Not sure if I've misinterpreted something in the docs or stumbled upon a bit of a security hole.
Terraform Version
Terraform v0.11.4
Affected Resource(s)
Terraform Configuration Files
Expected Behavior
User should not be able to login with the login profile we just deleted.
Actual Behavior
The user can login with the login profile that was supposedly deleted.
Steps to Reproduce
terraform apply
terraform destroy --target=aws_iam_user_login_profile.foo
Important Factoids
If you follow the below steps, you won't get a password output, which I believe is probably because it's executing this code branch
terraform apply
to apply all resourcesterraform destroy --target=aws_iam_user_login_profile.foo
terraform apply
to recreate the login profileReferences
The text was updated successfully, but these errors were encountered: