I applied a policy pack to a stack where all the resources are configured to use a provider that is associated with a different AWS account than my default AWS_PROFILE points to.
little-cartoon-10569
05/06/2021, 3:14 AM
It seemed to mostly work, reporting a few (correct) validation advsories about bucket logging.
little-cartoon-10569
05/06/2021, 3:15 AM
However it also threw an error (a stack trace, not a normal crossguard error) reporting that it could not find an ACM certificate (which is in the stack's account) when looking in my AWS_PROFILE's account.
little-cartoon-10569
05/06/2021, 3:16 AM
When I changed my AWS_PROFILE to match the stack's resources, the error went away.
little-cartoon-10569
05/06/2021, 3:16 AM
I presume that this means if I had certificates in two accounts in a single stack, there is no way that a policy pack could be successfully applied.
No matter how you like to participate in developer communities, Pulumi wants to meet you there. If you want to meet other Pulumi users to share use-cases and best practices, contribute code or documentation, see us at an event, or just tell a story about something cool you did with Pulumi, you are part of our community.