Skip to content

Commit a0ef849

Browse files
committed
Fix #688 - updated AWS IAM policy templates version to 2012-10-17
1 parent f3ef025 commit a0ef849

File tree

2 files changed

+5
-4
lines changed

2 files changed

+5
-4
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,11 +6,12 @@
66
* Added support for [IAM credential passthrough](https://docs.databricks.com/security/credential-passthrough/iam-passthrough.html) with `is_meta_instance_profile` property for `databricks_instance_profile` ([#745](https://github.com/databrickslabs/terraform-provider-databricks/pull/745))
77
* Fixed incorrect workspace update bug and added more validation error messaging ([#649](https://github.com/databrickslabs/terraform-provider-databricks/pull/649))
88
* Clarify network modification procedure on active workspaces ([#732](https://github.com/databrickslabs/terraform-provider-databricks/issues/732))
9+
* Updated AWS IAM policy templates version to `2012-10-17` (`databricks_aws_bucket_policy`, `databricks_aws_assume_role_policy`, and `databricks_aws_crossaccount_policy`) ([#688](https://github.com/databrickslabs/terraform-provider-databricks/issues/688))
910
* Various bug fixes in Databricks SQL resources
1011

1112
Updated dependency versions:
1213

13-
* Bump github.com/aws/aws-sdk-go to v1.40.8
14+
* Bump github.com/aws/aws-sdk-go to v1.40.12
1415
* Bump github.com/hashicorp/hcl/v2 to v2.10.1
1516
* Bump github.com/zclconf/go-cty to v1.9.0
1617
* Bump golang.org/x/time to v0.0.0-20210723032227-1f47c861a9ac

access/data_aws_policies.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -33,7 +33,7 @@ func DataAwsCrossAccountPolicy() *schema.Resource {
3333
return &schema.Resource{
3434
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
3535
policy := awsIamPolicy{
36-
Version: "2008-10-17",
36+
Version: "2012-10-17",
3737
Statements: []*awsIamPolicyStatement{
3838
{
3939
Effect: "Allow",
@@ -160,7 +160,7 @@ func DataAwsAssumeRolePolicy() *schema.Resource {
160160
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
161161
externalID := d.Get("external_id").(string)
162162
policy := awsIamPolicy{
163-
Version: "2008-10-17",
163+
Version: "2012-10-17",
164164
Statements: []*awsIamPolicyStatement{
165165
{
166166
Effect: "Allow",
@@ -223,7 +223,7 @@ func DataAwsBucketPolicy() *schema.Resource {
223223
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
224224
bucket := d.Get("bucket").(string)
225225
policy := awsIamPolicy{
226-
Version: "2008-10-17",
226+
Version: "2012-10-17",
227227
Statements: []*awsIamPolicyStatement{
228228
{
229229
Effect: "Allow",

0 commit comments

Comments
 (0)