Skip to content
Discussion options

You must be logged in to vote

Thanks for catching that! You are correct - since we're using s3_state_lock_enabled: true, the DynamoDB table isn’t being used for state locking and the associated IAM permissions should not be included in the permission set.

I’m updating the policy now so that the DynamoDB permissions are omitted when S3 locking is enabled. I’ll have a PR up shortly to address this.

Appreciate you pointing it out!

Replies: 1 comment 2 replies

Comment options

milldr
Sep 3, 2025
Maintainer Sponsor

You must be logged in to vote
2 replies
@milldr
Comment options

milldr Sep 3, 2025
Maintainer Sponsor

@milldr
Comment options

milldr Sep 3, 2025
Maintainer Sponsor

Answer selected by jochem725
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
2 participants