feat(aws_iam_role): Update inline policy updates to be an update then delete call, not delete then update aws call #31935
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
feat(aws_iam_role): Update inline policy updates to be an update then delete call, not delete then update aws call
Description
Update
aws_iam_role
so thatinline_policy
set when applying changes does an update and then delete instead of delete then update like it currently does as this causes issues for users with downtime access. Roles are only deleted if they were in set and then deleted. If there is a test I should write for this please let me know, I'm not sure how to add a test for this in the current test framework. I can do the same thing formanaged_policy_arns
in another PR as well in a similar fashion. I can make follow up PRs as well to try to resolve theTypeSet
issue making plans look undesirable to end users.Relations
Partially resolves #22336
Output from Acceptance Testing