Update doc: aws_iam_user with force_destroy deletes IAM User Login Profile (#9716)

refs: https://github.com/hashicorp/terraform/pull/9583
This commit is contained in:
Masayuki Morita 2016-10-30 00:20:18 +09:00 committed by Paul Stack
parent e97785c899
commit eb1a58d966
2 changed files with 4 additions and 4 deletions

View File

@ -54,7 +54,7 @@ func resourceAwsIamUser() *schema.Resource {
Type: schema.TypeBool,
Optional: true,
Default: false,
Description: "Delete user even if it has non-Terraform-managed IAM access keys",
Description: "Delete user even if it has non-Terraform-managed IAM access keys and login profile",
},
},
}
@ -167,7 +167,7 @@ func resourceAwsIamUserDelete(d *schema.ResourceData, meta interface{}) error {
}
}
// All access keys for the user must be removed
// All access keys and login profile for the user must be removed
if d.Get("force_destroy").(bool) {
var accessKeys []string
listAccessKeys := &iam.ListAccessKeysInput{

View File

@ -49,8 +49,8 @@ The following arguments are supported:
* `name` - (Required) The user's name. The name must consist of upper and lowercase alphanumeric characters with no spaces. You can also include any of the following characters: `=,.@-_.`. User names are not distinguished by case. For example, you cannot create users named both "TESTUSER" and "testuser".
* `path` - (Optional, default "/") Path in which to create the user.
* `force_destroy` - (Optional, default false) When destroying this user, destroy
even if it has non-Terraform-managed IAM access keys. Without `force_destroy`
a user with non-Terraform-managed access keys will fail to be destroyed.
even if it has non-Terraform-managed IAM access keys and login profile. Without `force_destroy`
a user with non-Terraform-managed access keys and login profile will fail to be destroyed.
## Attributes Reference