sparse-intern-71089
08/13/2020, 4:21 PMdelightful-controller-41497
08/13/2020, 4:24 PMwitty-ice-69000
08/13/2020, 5:15 PMwitty-ice-69000
08/13/2020, 7:46 PMdepends_on
ResourceOption parameter would gate the policy document on the user creation. Have I done something wrong, or is there a setting that needs to be applied?
For context, the user creation looks like this:
user = iam.User(
"pulumi_user",
name=construct_iam_resource_name("iam_deployment"),
path=automata_iam_path,
tags={"purpose": "Account used to perform Pulumi stack updates on CI/CD."},
)
user_arn = user.arn.apply(lambda arn: arn)
instance_assume_role_policy = iam.get_policy_document(
opts=pulumi.ResourceOptions(depends_on=[user]),
statements=[
{
"actions": ["sts:AssumeRole"],
"effect": "Allow",
"principals": [{"identifiers": [user_arn], "type": "AWS"}],
},
],
version="2012-10-17",
)
delightful-controller-41497
08/13/2020, 7:53 PMuser.arn
? I'm just guessing at this pointwitty-ice-69000
08/13/2020, 7:57 PMuser.arn
fails in the same way.No matter how you like to participate in developer communities, Pulumi wants to meet you there. If you want to meet other Pulumi users to share use-cases and best practices, contribute code or documentation, see us at an event, or just tell a story about something cool you did with Pulumi, you are part of our community.
Powered by