-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Migrate SES SMTP password to v4 for existing aws_iam_access_key #14529
Comments
It might be difficult to translate this to the end user; will they understand why a field ( I think a sane alternative that doesn't involve changing the provider is creating a new |
I'm taking the occasion of this issue to ask (unfortunately, IRC have been abandoned, and the Matrix room connected to Gitter doesn't seems to have any success): how is one supposed to achieve the migration cleanly nowadays? Sure a solution is to destroy the resource, but this doesn't seems very clean, besides the fact it can cause temporary issues. |
FWIW, I have raised a PR on improving the upgrade documentation. Please feel free to add suggestions on there. |
Either way with or without provider modification this change is not currently clear to the end user. If modifying the provider is not the best avenue, maybe we should modify the documentation to clarify this migration tidbit for a few months. |
Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label. If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you! |
Since the migration to SigV4 was 4 years ago, it's a bit late now. Closing. |
Warning This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Historically
aws_iam_access_key
only had theses_smtp_password
attribute, which was complemented byses_smtp_password_v4
, thenses_smtp_password
was deprecated.ses_smtp_password_v4
is derived from theSecretAccessKey
during resource creation, and currently isn't created during resource update. Users must taint+recreateaws_iam_access_key
to be able to continue SES SMTP passwords.Two possible reasons may explain that missing "migration" :
SecretAccessKey
isn't stored by AWS, so during refresh it isn't available from AWS API's response.secret
(=SecretAccessKey
) attribute may not be available if user chose to PGP-encrypt the key.However, if the secret isn't PGP-encrypted, it is stored in state, so
ses_smtp_password_v4
could be calculated during resource update.Would it be interesting to generate
ses_smtp_password_v4
during resource update ? I know that access key rotation shouldn't be a big deal, but this deprecation makes upgrading less easy.I made a POC that seems to work, but would like input from maintainers to know if this is a good idea before polishing it up.
New or Affected Resource(s)
Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: