You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
This has been fixed by #8615 where we introduced a new library into the project that checks for the structural equality of the policy JSON. This means that we can detect when ordering is different and when a policy has been normalized by AWS to change a string to a single item array etc
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 22, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
When I'm assigning policy to AWS bucket using template file the ordering of resources or any elements on the list shouldn't matter.
After I assign example policy template:
{ "Id": "Policy1123123123", "Statement": [ { "Action": "s3:*", "Effect": "Allow", "Resource": [ "${s3_bucket}/*", "${s3_bucket}" ], "Condition": { "StringEquals": { "aws:sourceVpce": "${vpc_endpoint_address}" } }, "Principal": { "AWS": "${s3_user}" }, "Sid": "bucket_access" } ], "Version": "2012-10-17" }
it happens that AWS creates policy which has different resource order (not always!):
"Resource": [ "bucket_name", "bucket_name/*" ],
I think Terrafrom should ignore the ordering as this doesn't matter on AWS side.
The text was updated successfully, but these errors were encountered: