You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Describe the bug
Delete a AWS IAM user via IAMbic fails when user has access keys
To Reproduce
Steps to reproduce the behavior:
Create a AWS IAM user with active access keys
Change the IAM user template, deleted: true
iambic apply
See error
Expected behavior
The targeted IAM user should be deleted successfully.
Screenshots
If applicable, add screenshots to help explain your problem.
Desktop (please complete the following information):
OS: [e.g. iOS]
Browser [e.g. chrome, safari]
v 0.9.8
Additional context
AWS IAM control plane refuse to delete the IAM user if it has access key. So the delete action needs to be multi-part, first remove the access keys, before deleting the user.
In additional, the IAMbic tool should surface this type of apply error. Currently, it's difficult to pinpoint it without a cloud trail investigation.
Community Engagement
Your vote counts! Please support this bug report by adding a 👍 reaction to the original issue, which will aid the community and maintainers in addressing this problem.
Please refrain from adding "+1" or "me too" comments, as these create unnecessary noise for issue followers and do not help in prioritizing the issue. If you wish to contribute to solving this issue or have submitted a pull request, please leave a comment.
The text was updated successfully, but these errors were encountered:
smoy
changed the title
Delete a AWS IAM user via IAMbic fails when use has access keys
Delete a AWS IAM user via IAMbic fails when user has access keys
Jun 23, 2023
Describe the bug
Delete a AWS IAM user via IAMbic fails when user has access keys
To Reproduce
Steps to reproduce the behavior:
Expected behavior
The targeted IAM user should be deleted successfully.
Screenshots
If applicable, add screenshots to help explain your problem.
Desktop (please complete the following information):
Additional context
AWS IAM control plane refuse to delete the IAM user if it has access key. So the delete action needs to be multi-part, first remove the access keys, before deleting the user.
In additional, the IAMbic tool should surface this type of apply error. Currently, it's difficult to pinpoint it without a cloud trail investigation.
Community Engagement
Your vote counts! Please support this bug report by adding a 👍 reaction to the original issue, which will aid the community and maintainers in addressing this problem.
Please refrain from adding "+1" or "me too" comments, as these create unnecessary noise for issue followers and do not help in prioritizing the issue. If you wish to contribute to solving this issue or have submitted a pull request, please leave a comment.
The text was updated successfully, but these errors were encountered: