Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws_kms_secrets data source prompts apply acceptance with no changes #14625

Closed
jdw88 opened this issue Aug 13, 2020 · 2 comments
Closed

aws_kms_secrets data source prompts apply acceptance with no changes #14625

jdw88 opened this issue Aug 13, 2020 · 2 comments
Labels
bug Addresses a defect in current functionality. service/kms Issues and PRs that pertain to the kms service.

Comments

@jdw88
Copy link

jdw88 commented Aug 13, 2020

Community Note

  • Please vote on this issue by adding a 👍 reaction to the original issue to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request
  • If you are interested in working on this issue or have submitted a pull request, please leave a comment

Terraform CLI and Terraform AWS Provider Version

Terraform v0.13.0
+ provider registry.terraform.io/-/aws v3.1.0
+ provider registry.terraform.io/hashicorp/aws v3.1.0

Affected Resource(s)

  • data.aws_kms_secrets

Terraform Configuration Files

data "aws_kms_secrets" "shared" {
  for_each = var.shared_encrypted_secrets
  secret {
    name    = each.key
    payload = each.value
  }
}

Expected Behavior

No changes/acceptance prompt

Actual Behavior

An execution plan has been generated and is shown below.
Resource actions are indicated with the following symbols:
 <= read (data resources)

Terraform will perform the following actions:
  # data.aws_kms_secrets.shared["my_secret"] will be read during apply
  # (config refers to values not yet known)
 <= data "aws_kms_secrets" "shared"  {
      ~ id        = "2020-08-13 13:42:02.099568 +0000 UTC" -> "2020-08-13 13:42:07.251801 +0000 UTC"
        plaintext = {
            "my_secret" = "<my_secret>"
        }

        secret {
            context      = {}
            grant_tokens = []
            name         = "my_secret"
            payload      = "<encrypted_payload>"
        }
    }

Plan: 0 to add, 0 to change, 0 to destroy.

Do you want to perform these actions?
  Terraform will perform the actions described above.
  Only 'yes' will be accepted to approve.

  Enter a value: 

Steps to Reproduce

  1. terraform apply
@ghost ghost added the service/kms Issues and PRs that pertain to the kms service. label Aug 13, 2020
@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label Aug 13, 2020
@ewbankkit
Copy link
Contributor

@jdw88 Thanks for raising this issue.
It has already been noticed in #14564. I'm going to close this one as a duplicate so that we can concentrate discussion in the linked issue.
Please add any additional comments there.

@ewbankkit ewbankkit added bug Addresses a defect in current functionality. and removed needs-triage Waiting for first response or review from a maintainer. labels Aug 13, 2020
@ghost
Copy link

ghost commented Sep 12, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks!

@ghost ghost locked and limited conversation to collaborators Sep 12, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug Addresses a defect in current functionality. service/kms Issues and PRs that pertain to the kms service.
Projects
None yet
Development

No branches or pull requests

2 participants