andrewlaskey / pulumi-example

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Disappearing Policies with Pulumi Automation API

Problem

After creating and destroying a stack using the Automation API, role permission policies associated with the parent stack are destroyed as well. Pulumi will not recognize that those resources are gone, however, until running a pulumi refresh

How to reproduce with this project

  • Set AWS profile: > pulumi config set aws:profile dev OR > export AWS_PROFILE=dev
  • Deploy main project stack: pulumi stack select parent-stack and pulumi up
  • Confirm deployment by looking in Pulumi dashboard and role in AWS console.
  • Run the automation API: npm run automation
  • Run the teardown script: npx run automation:destroy
  • Refreshing the page in the AWS console for the role will show that the policies are gone.

About


Languages

Language:TypeScript 100.0%