-
Notifications
You must be signed in to change notification settings - Fork 175
Split aws_iam_role_policy_attachment #839
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue 8000 and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
Codecov Report
@@ Coverage Diff @@
## main #839 +/- ##
==========================================
+ Coverage 81.32% 81.41% +0.09%
==========================================
Files 226 227 +1
Lines 7340 7355 +15
==========================================
+ Hits 5969 5988 +19
+ Misses 1153 1148 -5
- Partials 218 219 +1
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
lgtm
pkg/remote/test/aws_iam_role_policy_attachment_multiple/results.golden.json
Show resolved
Hide resolved
|
||
func (r *IamRolePolicyAttachmentDetailsFetcher) ReadDetails(res resource.Resource) (resource.Resource, error) { | ||
ctyVal, err := r.reader.ReadResource(terraform.ReadResourceArgs{ | ||
Ty: aws.AwsIamRolePolicyAttachmentResourceType, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I know we already did that in every other details fetchers, but is there a reason to not use the resource type defined by the enumerator ? We could just call res.TerraformType()
here
5fee8fe
to
f2e9542
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rebase main, approving review.
Fix #724