-
-
Notifications
You must be signed in to change notification settings - Fork 130
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Invalid for_each argument error when using both ec2_ssh_key and source_security_group_ids #37
Comments
@osterman I am not sure we are going to fix this. This is a limitation of Terraform and fixing this probably requires removing functionality. @xeon0320 The security group IDs need to be available in the |
Thanks for the updates. I implemented the workaround yesterday and I was able to move forward. |
Same behavior with existing_policies_for_eks_workers_role
Is there another solution than creating a new project all together? |
Just to add my case
It seems to be the same issue. I am getting above error when running |
As far as I can see both Anyway, at least with the additional policies, the module is outputting the role name, so I just attached my additional policy to the nodes' role.
|
I don't understand this: we're passing a list of ARNs (of existing policies) to the parameter. What can not be checked? |
Following up, I think @kaosmonk 's error was due to a Terraform bug. Terraform 0.13 had a lot of bugs around destroying resources. This should work now with current Terraform. In general, this module expects most of its inputs to be available during the @marcelloromani How are you constructing the list of ARNs you are passing in? |
as far as I can tell we're passing the module a list of hard-coded policy arns |
Describe the Bug
I receive an error 'Error: Invalid for_each argument' when using both ec2_ssh_key and source_security_group_ids in my module declaration.
My module declaration:
Error message:
Expected Behavior
terraform plan and apply should complete and use the source_security_group_ids for the remote access
Steps to Reproduce
Steps to reproduce the behavior:
Environment (please complete the following information):
Terraform v0.13.4 MacOS
terraform-aws-eks-node-group version 0.13.0
The text was updated successfully, but these errors were encountered: