-
Notifications
You must be signed in to change notification settings - Fork 317
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: invalid fork terraform #5585
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -77,8 +77,7 @@ resource "aws_efs_file_system" "aztec_mainnet_fork_data_store" { | |
creation_token = "${var.DEPLOY_TAG}-mainnet-fork-data" | ||
|
||
tags = { | ||
Name = "${var.DEPLOY_TAG}-mainnet-fork-data" | ||
TaskDefinitionArn = "${aws_ecs_task_definition.aztec_mainnet_fork.arn}" # This line forces recreation on task definition change | ||
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'm not too familiar with how we're using terraform, but why don't we want to keep this line? There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. This is the line that's causing the error, cyclical reference between the 2 resources (ECS task & EFS storage). There are ways to get around it, like using a hash of the value but I don't want to get too 'hacky' with terraform configs |
||
Name = "${var.DEPLOY_TAG}-mainnet-fork-data" | ||
} | ||
|
||
lifecycle_policy { | ||
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Shouldn't we check both TO_TAINT and FORCE_DEPLOY? If a terraform resource was tainted, we shouldn't bail early, right?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this doesn't check if something was tainted, we tell the script to taint a specific resource so it cause a redeployment.
So far this was only used to taint nodes when the l1 contracts were re-deployed so they restarted with the updated contract addresses, so every time this was called with
TO_TAINT
, we skippedcheck_rebuild
.Now with the mainnet fork though, we only want to deploy and taint the resource if there's been a change