-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. Weβll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Breaking change for several resources from 2.51.0 β 2.52.0 #12332
Comments
I'm seeing this too. Even adding the new configuration, it still shows a change, even when there isn't. For example.
|
Actually it works when you have all the rules in terraform. I hadn't done the last one yet. |
Maybe due to the merge of #3728 - S3 bucket ACL grants are now managed by Terraform. |
@ewbankkit I think I've seen in the past where terraform can manage something but hasn't actually been managing it where the provider will silently ignore the diff but maybe that's a false memory. Still, this kind of change feels odd for a minor version bump since I would expect those to be non-breaking. |
Does this need a state migration adding? |
It's the fact that terraform wants to remove a grant which is created by default whenever a bucket is created that I find confusing - IMO if the grants block isn't specified then it should leave the default grant alone.
Generated plan
|
I've also seen this today and while adding the grant to our code to mitigate the issue I also noticed that the documentation of the https://github.com/terraform-providers/terraform-provider-aws/pull/3728/files#diff-7f5ed2626ccd023dd9d0f679c2526b6fR323 These lines in the provided example code use This line also lists |
I reproduced it on 2.52 version solo. That is not a migration bug, that some bug in
If you reproduce it 100% matched including ordering - there will be no diff I see that logic of creation grant is correct and it looks like a sorting issue inside terraform state. The ordering issue looks strange because storage of grant block made on hashes, not lists. But that looks like most true story. |
Hi, I'm also seeing an issue with how
At this point I could This is the bucket in the backend state{
"mode": "managed",
"type": "aws_s3_bucket",
"name": "my-example-terraform-grant",
"provider": "provider.aws",
"instances": [
{
"schema_version": 0,
"attributes": {
"acceleration_status": "",
"acl": "private",
"arn": "arn:aws:s3:::my-example-terraform-grant",
"bucket": "my-example-terraform-grant",
"bucket_domain_name": "my-example-terraform-grant.s3.amazonaws.com",
"bucket_prefix": null,
"bucket_regional_domain_name": "my-example-terraform-grant.s3.eu-west-1.amazonaws.com",
"cors_rule": [],
"force_destroy": false,
"grant": [
{
"id": "xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx",
"permissions": [
"FULL_CONTROL"
],
"type": "CanonicalUser",
"uri": ""
}
],
"hosted_zone_id": "XXXXXXXXXXXXXX",
"id": "my-example-terraform-grant",
"lifecycle_rule": [],
"logging": [],
"object_lock_configuration": [],
"policy": null,
"region": "eu-west-1",
"replication_configuration": [],
"request_payer": "BucketOwner",
"server_side_encryption_configuration": [],
"tags": {},
"versioning": [
{
"enabled": false,
"mfa_delete": false
}
],
"website": [],
"website_domain": null,
"website_endpoint": null
},
"private": "bnVsbA=="
}
]
} |
still having the same issue with provider.aws ~> 2.69 and terraform 0.12.25
|
I've tried to workaround this issue by having an explicit
so it sounds like perhaps an upstream change is causing issues.
|
Any movement on this issue? This is blocking us from going beyond 2.51. In fact, this is still an issue in 3.26. Did anyone had any luck using |
This still seems to be a problem with v3.42.0, is there any thoughts on how to resolve this? |
Should there be a separate issue for this bug? |
I was under the impression that that's the main issue? Or a part of it at least. |
Hey all π Given the length of time its been since anyone reported this, and that it appears to have affected versions of the provider that are no longer supported, I'm going to close this issue out. If you experience similar issues on more recent versions of the provider, please open a new issue, referencing this one where necessary, so that we can triage it effectively. |
I'm going to lock this issue because it has been closed for 30 days β³. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform Versions
to
Relevant bit:
provider.aws v2.51.0 β 2.52.0
.Affected Resource(s)
Terraform Configuration Files
Expected Behavior
Actual Behavior
Steps to Reproduce
The text was updated successfully, but these errors were encountered: