-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
kms_data_key_reuse_period_seconds in SQS is updated all the time #19786
Comments
@fumantsu Thanks for raising this issue. |
I have the same issue. Here is a sample plan for a sqs queue without encryption:
The change persists even after running |
@grace-instrumental Thanks for the quick response. |
I have exactly the same output message.
and the module is:
The variables which are set for the kms:
Not quite sure if the 'null' is triggering something nasty so I doubt there is a connection between the module and the issue. Interesting can be the state file:
It seems that it tries to set the number to 300 but in the end because the KMS is not enabled is end-up as 0
|
This happens if you send any value to the I have a hunch that something changed on the AWS side of things, where they always report back Setting the value of |
Yes, setting to |
Hi to all,
Just one thing because I also believe it's a big/regression. I'm using the
specific code 4 maybe 5 months now and exactly two weeks started to happen.
So probably something changed from the AWS side, I guess which started to
trigger this.
Alexandros
Send from my guacamole
…On Wed, 16 Jun 2021, 17:55 Kit Ewbank, ***@***.***> wrote:
Yes, setting to null or 0 is a workaround.
It turns out AWS doesn't send back any value for the
KmsDataKeyReusePeriodSeconds queue attribute if kms_master_key_id isn't
set and there was a change to the default value handling in the AWS
Provider (because the attribute does not have an explicit default value
assigned in the schema).
Anyway, as this is a regression I will make the required code fixes and
add acceptance test(s).
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub
<#19786 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ABWRA6Z3J2TPDGTGUDNVIQLTTDCQZANCNFSM46UWGABQ>
.
|
This functionality has been released in v3.46.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform CLI and Terraform AWS Provider Version
Terraform v0.14.11
AWS provider: 3.45.0
Affected Resource(s)
*aws_sqs_queue
Terraform Configuration Files
Please include all Terraform configurations required to reproduce the bug. Bug reports without a functional reproduction may be closed without investigation.
Expected Behavior
Either stay to 0 or update based on if encryption is enabled or not
Actual Behavior
Updating all time from 0 to 300 which is the default from the aws provider
Steps to Reproduce
Create a SQS without encryption and without value for the property
The text was updated successfully, but these errors were encountered: