You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/UPGRADE-6.0.md
+34-13Lines changed: 34 additions & 13 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -364,13 +364,16 @@ module "iam_role" {
364
364
365
365
##### State Changes
366
366
367
+
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
368
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
369
+
367
370
```sh
368
-
terraform state mv"module.iam_role.aws_iam_role_policy_attachment.admin[0]"'module.iam_role.aws_iam_role_policy_attachment.this["AdministratorAccess"]'
371
+
terraform state rm"module.iam_role.aws_iam_role_policy_attachment.admin[0]"
369
372
370
373
# One move command for each ARN in prior custom_role_policy_arns
371
-
terraform state mv"module.iam_role.aws_iam_role_policy_attachment.custom[0]"'module.iam_role.aws_iam_role_policy_attachment.this["AmazonCognitoReadOnly"]'
372
-
terraform state mv"module.iam_role.aws_iam_role_policy_attachment.custom[1]"'module.iam_role.aws_iam_role_policy_attachment.this["AlexaForBusinessFullAccess"]'
373
-
terraform state mv"module.iam_role.aws_iam_role_policy_attachment.custom[2]"'module.iam_role.aws_iam_role_policy_attachment.this["custom"]'
374
+
terraform state rm"module.iam_role.aws_iam_role_policy_attachment.custom[0]"
375
+
terraform state rm"module.iam_role.aws_iam_role_policy_attachment.custom[1]"
376
+
terraform state rm"module.iam_role.aws_iam_role_policy_attachment.custom[2]"
374
377
```
375
378
376
379
#### `iam-assumable-role-with-oidc` -> `iam-role`
@@ -410,9 +413,12 @@ module "iam_role" {
410
413
411
414
##### State Changes
412
415
416
+
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
417
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
418
+
413
419
```sh
414
420
# One move command for each ARN in prior custom_role_policy_arns
415
-
terraform state mv"module.iam_role.aws_iam_role_policy_attachment.custom[0]"'module.iam_role.aws_iam_role_policy_attachment.this["AmazonEC2ContainerRegistryPowerUser"]'
421
+
terraform state rm"module.iam_role.aws_iam_role_policy_attachment.custom[0]"
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
576
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
577
+
566
578
```sh
567
579
terraform state mv "module.iam_assumable_roles.aws_iam_role.admin[0]""module.iam_role_admin.aws_iam_role.this[0]"
568
-
terraform state mv"module.iam_assumable_roles.aws_iam_role_policy_attachment.admin[0]"'module.iam_role_admin.aws_iam_role_policy_attachment.this["AdministratorAccess"]'
580
+
terraform state rm"module.iam_assumable_roles.aws_iam_role_policy_attachment.admin[0]"
569
581
570
582
terraform state mv "module.iam_assumable_roles.aws_iam_role.poweruser[0]""module.iam_role_poweruser.aws_iam_role.this[0]"
571
583
# One move command for each ARN in prior `poweruser_role_policy_arns`
572
-
terraform state mv"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[0]"'module.iam_role_poweruser.aws_iam_role_policy_attachment.this["Billing"]'
573
-
terraform state mv"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[1]"'module.iam_role_poweruser.aws_iam_role_policy_attachment.this["AWSSupportAccess"]'
584
+
terraform state rm"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[0]"
585
+
terraform state rm"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[1]"
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
660
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
661
+
647
662
```sh
648
663
terraform state mv "module.iam_assumable_roles.aws_iam_role.admin[0]""module.iam_role_admin.aws_iam_role.this[0]"
649
-
terraform state mv"module.iam_assumable_roles.aws_iam_role_policy_attachment.admin[0]"'module.iam_role_admin.aws_iam_role_policy_attachment.this["AdministratorAccess"]'
664
+
terraform state rm"module.iam_assumable_roles.aws_iam_role_policy_attachment.admin[0]"
650
665
651
666
terraform state mv "module.iam_assumable_roles.aws_iam_role.poweruser[0]""module.iam_role_poweruser.aws_iam_role.this[0]"
652
-
terraform state mv"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[0]"'module.iam_role_poweruser.aws_iam_role_policy_attachment.this["PowerUserAccess"]'
667
+
terraform state rm"module.iam_assumable_roles.aws_iam_role_policy_attachment.poweruser[0]"
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
808
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
809
+
792
810
```sh
793
811
# One move command for each ARN in prior `custom_group_policy_arns`
794
-
terraform state mv"module.iam_group.aws_iam_group_policy_attachment.custom_arns[0]"'module.iam_group.aws_iam_group_policy_attachment.additional["AmazonS3FullAccess"]'
812
+
terraform state rm"module.iam_group.aws_iam_group_policy_attachment.custom_arns[0]"
795
813
```
796
814
797
815
#### `iam-policy`
@@ -823,6 +841,9 @@ module "iam_user" {
823
841
824
842
##### State Changes
825
843
844
+
Remove all prior policy attachments (that are marked for deletion in `terraform plan`).
845
+
Policies will stay attached to the role but new attachment IDs will be created on next apply
846
+
826
847
```sh
827
-
terraform state mv"module.iam_user[0].aws_iam_user_policy_attachment.this[0]""module.iam_user[0].aws_iam_user_policy_attachment.this["S3ReadOnly"]"
848
+
terraform state rm"module.iam_user[0].aws_iam_user_policy_attachment.this[0]"
0 commit comments