Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

IAM Password Policy Not Found - 1.8 #120

Open
aaronlippold opened this issue Dec 8, 2023 · 3 comments
Open

IAM Password Policy Not Found - 1.8 #120

aaronlippold opened this issue Dec 8, 2023 · 3 comments
Assignees
Labels

Comments

@aaronlippold
Copy link
Member

aaronlippold commented Dec 8, 2023

The error collection is skipping the resource when a configured password policy cannot be found, this should fail the resource and not skip it.

Related #125

@wdower
Copy link
Contributor

wdower commented Dec 11, 2023

So the problem here is that apparently the AWS API throws a "NoSuchEntity" error even when the password policy is set to the defaults. Any customizing of the password policy makes the password policy suddenly detectable by the API.

That means we can't necessarily autofail the resource; in most cases, there is actually a password policy set, it's just the default.

@wdower
Copy link
Contributor

wdower commented Dec 11, 2023

Ref: aws/aws-cli#7265

This is a bug in the API.

@aaronlippold
Copy link
Member Author

OK, let's raise an issue on the SDK board, they seem to be very responsive. The other thing you could do in the resources, just do some sort of no op on the backend or in the resource to work around the bug. A.k.a. have the client do a query or something that doesn't change any date, but just works around the bug.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

2 participants