diff --git a/enos/modules/aws_iam_setup/main.tf b/enos/modules/aws_iam_setup/main.tf index e1fd5862f8..792b8cf966 100644 --- a/enos/modules/aws_iam_setup/main.tf +++ b/enos/modules/aws_iam_setup/main.tf @@ -21,9 +21,7 @@ resource "aws_iam_user" "boundary" { name = "demo-${local.user_email}-${var.test_id}" tags = { boundary-demo = local.user_email } permissions_boundary = "arn:aws:iam::${data.aws_caller_identity.current.account_id}:policy/DemoUser" - # If credential rotation is used, this is necessary to delete the user since a new access - # key will be generated. - force_destroy = var.enable_credential_rotation ? true : false + force_destroy = true } resource "aws_iam_user_policy" "boundary" {