-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS resource ssm_activation
, miss 'code' attribute
#1565
Comments
SurviveLearnGrowRepeat
changed the title
AWS resource
AWS resource Sep 1, 2017
ssm_activation
, miss 'code' attributessm_activation
, miss 'code' attribute [bug]
SurviveLearnGrowRepeat
changed the title
AWS resource
AWS resource Sep 1, 2017
ssm_activation
, miss 'code' attribute [bug]ssm_activation
, miss 'code' attribute
stack72
added a commit
to stack72/terraform-provider-aws
that referenced
this issue
Sep 1, 2017
Fixes: hashicorp#1565 ``` % make testacc TEST=./aws TESTARGS='-run=TestAccAWSSSMActivation' ==> Checking that code complies with gofmt requirements... TF_ACC=1 go test ./aws -v -run=TestAccAWSSSMActivation -timeout 120m === RUN TestAccAWSSSMActivation_basic --- PASS: TestAccAWSSSMActivation_basic (41.97s) PASS ok github.com/terraform-providers/terraform-provider-aws/aws 41.999s ```
nbaztec
pushed a commit
to nbaztec/terraform-provider-aws
that referenced
this issue
Sep 26, 2017
Fixes: hashicorp#1565 ``` % make testacc TEST=./aws TESTARGS='-run=TestAccAWSSSMActivation' ==> Checking that code complies with gofmt requirements... TF_ACC=1 go test ./aws -v -run=TestAccAWSSSMActivation -timeout 120m === RUN TestAccAWSSSMActivation_basic --- PASS: TestAccAWSSSMActivation_basic (41.97s) PASS ok github.com/terraform-providers/terraform-provider-aws/aws 41.999s ```
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
ghost
locked and limited conversation to collaborators
Apr 11, 2020
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Terraform Version
Terraform v0.10.3
Affected Resource(s)
aws_ssm_activation
Expected Behavior
After the creation of the resource, they had to have a tag to obtain/consume/use the secret code generated.
Possibles names for the attribute: code, secret ...
Actual Behavior
The resource is created but without the 'code' attribute to use so, really the creation of aws_ssm_activation do not make any sense.
You can not use the new resource because the secret code is lost.
References
Git commit of the code that shows there is not exist an attribute to save the code value.
hashicorp/terraform@fc29875
The text was updated successfully, but these errors were encountered: