Document IAM Permissions for Managing Resources #20013
Labels
enhancement
Requests to existing resources that expand the functionality or scope.
provider
Pertains to the provider itself, rather than any interaction with AWS.
Community Note
Description
Setting up IAM permissions to plan & apply changes is a game of whack-a-mole. While some permissions are obvious for managing resources, others are not.
One such example is managing a
aws_amplify_webhook
requiresec2:DescribeAccountAttributes
according to CloudTrail. I don't know why this is required but I trust that it is. Instances like this make infrastructure changes take orders of magnitude longer than they should as it results in multiple cycles of attempting to plan & apply changes, with incremental IAM changes.It was understandable when AWS IAM documentation was sparse and hard to find but since the creation of the Service Authorization Reference it's a lot easier to find the correct permission for the API call being made.
New or Affected Resource(s)
All AWS resources & data providers
References
Unable to find any similar issues or PRs.
The text was updated successfully, but these errors were encountered: