-
Notifications
You must be signed in to change notification settings - Fork 9.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Please implement name_prefix for aws_iam_policy #10176
Comments
2rs2ts
added a commit
to 2rs2ts/terraform
that referenced
this issue
Nov 16, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
2rs2ts
added a commit
to 2rs2ts/terraform
that referenced
this issue
Nov 16, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
2rs2ts
added a commit
to 2rs2ts/terraform
that referenced
this issue
Nov 16, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
stack72
pushed a commit
that referenced
this issue
Nov 17, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes #10176
stack72
pushed a commit
that referenced
this issue
Nov 17, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes #10176
jrnt30
pushed a commit
to jrnt30/terraform
that referenced
this issue
Nov 17, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
gusmat
pushed a commit
to gusmat/terraform
that referenced
this issue
Dec 6, 2016
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
fatmcgav
pushed a commit
to fatmcgav/terraform
that referenced
this issue
Feb 27, 2017
This is intended to behave the same way as name_prefix does in aws_iam_role. Fixes hashicorp#10176
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
ghost
locked and limited conversation to collaborators
Apr 20, 2020
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Terraform supports a
name_prefix
foraws_iam_role
but it doesn't support one foraws_iam_policy
. This forces us to create our own unique names so we can apply our same terraform configuration with multiple state files in the same account. It would be nice if we could use the uniqueness-providing behavior thataws_iam_role
has because ofname_prefix
.The text was updated successfully, but these errors were encountered: