Skip to content

Commit

Permalink
Fix #688 - updated AWS IAM policy templates version to 2012-10-17
Browse files Browse the repository at this point in the history
  • Loading branch information
nfx committed Aug 2, 2021
1 parent 34dd3df commit 4ecd901
Show file tree
Hide file tree
Showing 2 changed files with 5 additions and 4 deletions.
3 changes: 2 additions & 1 deletion CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -6,11 +6,12 @@
* Added support for [IAM credential passthrough](https://docs.databricks.com/security/credential-passthrough/iam-passthrough.html) with `is_meta_instance_profile` property for `databricks_instance_profile` ([#745](https://github.com/databrickslabs/terraform-provider-databricks/pull/745))
* Fixed incorrect workspace update bug and added more validation error messaging ([#649](https://github.com/databrickslabs/terraform-provider-databricks/pull/649))
* Clarify network modification procedure on active workspaces ([#732](https://github.com/databrickslabs/terraform-provider-databricks/issues/732))
* Updated AWS IAM policy templates version to `2012-10-17` (`databricks_aws_bucket_policy`, `databricks_aws_assume_role_policy`, and `databricks_aws_crossaccount_policy`) ([#688](https://github.com/databrickslabs/terraform-provider-databricks/issues/688))
* Various bug fixes in Databricks SQL resources

Updated dependency versions:

* Bump github.com/aws/aws-sdk-go to v1.40.8
* Bump github.com/aws/aws-sdk-go to v1.40.12
* Bump github.com/hashicorp/hcl/v2 to v2.10.1
* Bump github.com/zclconf/go-cty to v1.9.0
* Bump golang.org/x/time to v0.0.0-20210723032227-1f47c861a9ac
Expand Down
6 changes: 3 additions & 3 deletions access/data_aws_policies.go
Original file line number Diff line number Diff line change
Expand Up @@ -33,7 +33,7 @@ func DataAwsCrossAccountPolicy() *schema.Resource {
return &schema.Resource{
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
policy := awsIamPolicy{
Version: "2008-10-17",
Version: "2012-10-17",
Statements: []*awsIamPolicyStatement{
{
Effect: "Allow",
Expand Down Expand Up @@ -160,7 +160,7 @@ func DataAwsAssumeRolePolicy() *schema.Resource {
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
externalID := d.Get("external_id").(string)
policy := awsIamPolicy{
Version: "2008-10-17",
Version: "2012-10-17",
Statements: []*awsIamPolicyStatement{
{
Effect: "Allow",
Expand Down Expand Up @@ -223,7 +223,7 @@ func DataAwsBucketPolicy() *schema.Resource {
ReadContext: func(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
bucket := d.Get("bucket").(string)
policy := awsIamPolicy{
Version: "2008-10-17",
Version: "2012-10-17",
Statements: []*awsIamPolicyStatement{
{
Effect: "Allow",
Expand Down

0 comments on commit 4ecd901

Please sign in to comment.