-
Notifications
You must be signed in to change notification settings - Fork 724
SIGSEGV: segmentation violation #1135
Comments
Actually I'm not sure that's what's causing the issue anymore. I edited my SCP to get rid of those SCP-based failures, but it's still failing:
The
This occurred with aws-nuke-v2.19.0-linux-amd64. |
I just recently started to get a similar stacktrace within the past week:
I'm on 2.25.0 via Homebrew on MacOS:
|
any update? a solution is proposed on the PR |
The nil pointer issue has been fixed in the new active fork. See the comment on #1134 - #1134 (comment) If you are still having issues around OrganizationAccountAccessRole @heinosasshallik I would encourage you to open an issue over on the forked project. However to answer the question here, even if you have a filter in place, the tool will attempt to iterate all roles in an account, to include the OrganizationAccountAccessRole, resources only are filtered after they are discovered. -- Please see a copy of the notice from the README about the deprecation of this project. Sven was kind enough to grant me access to help triage and close issues and pull requests that have already been addressed in the actively maintained fork. Some additional information is located in the welcome issue for more information. Caution This repository for aws-nuke is no longer being actively maintained. We recommend users to switch to the actively maintained fork of this project at ekristen/aws-nuke. |
Starting from October 24th, I started seeing failures:
The errors occur because I have a service control policy in place that denies access to OrganizationAccountAccessRole:
However, aws-nuke shouldn't be trying to access it because I've got a filter in place:
Prior to October 24th I didn't receive any errors and after that I started receiving them. I haven't updated my application or aws-nuke recently, so perhaps it's due to a change on the AWS side?
Tested on the following aws-nuke versions:
The text was updated successfully, but these errors were encountered: