-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Remove Hashing from State Storage #13406
Comments
Affected Resources
These attributes need separate discussion and should probably remain out of scope:
Other References |
…nd platform_princial hash removal Reference: #3894 Reference: #9951 Reference: #12085 Reference: #13406 This also attempts to prevent the SetPlatformApplicationAttributes API call if no API updates need to occur. While we are in the midst of breaking changes and since this resource cannot be acceptance tested by the HashiCorp maintainers, this also fixes some other technical debt issues.
All set with |
…cate_body, certificate_chain, and private_key arguments Reference: #9685 Reference: #13053 Reference: #13406 Output from acceptance testing (failure related to other upcoming 3.0.0 work): ``` --- FAIL: TestAccAWSAcmCertificate_san_multiple (23.72s) --- PASS: TestAccAWSAcmCertificate_disableCTLogging (14.97s) --- PASS: TestAccAWSAcmCertificate_dnsValidation (16.95s) --- PASS: TestAccAWSAcmCertificate_emailValidation (18.91s) --- PASS: TestAccAWSAcmCertificate_imported_DomainName (28.06s) --- PASS: TestAccAWSAcmCertificate_imported_IpAddress (11.75s) --- PASS: TestAccAWSAcmCertificate_privateCert (20.73s) --- PASS: TestAccAWSAcmCertificate_root (14.59s) --- PASS: TestAccAWSAcmCertificate_root_TrailingPeriod (15.02s) --- PASS: TestAccAWSAcmCertificate_rootAndWildcardSan (15.84s) --- PASS: TestAccAWSAcmCertificate_san_single (19.04s) --- PASS: TestAccAWSAcmCertificate_san_TrailingPeriod (19.81s) --- PASS: TestAccAWSAcmCertificate_tags (39.78s) --- PASS: TestAccAWSAcmCertificate_wildcard (20.89s) --- PASS: TestAccAWSAcmCertificate_wildcardAndRootSan (19.73s) ```
…icate_body, certificate_chain, and private_key arguments Reference: #13406 Output from acceptance testing: ``` --- PASS: TestAccAWSIAMServerCertificate_name_prefix (6.05s) --- PASS: TestAccAWSIAMServerCertificate_disappears (6.10s) --- PASS: TestAccAWSIAMServerCertificate_Path (6.48s) --- PASS: TestAccAWSIAMServerCertificate_basic (6.54s) --- PASS: TestAccAWSIAMServerCertificate_file (10.07s) ```
Final PR pending team review: #14187 |
…icate_body, certificate_chain, and private_key arguments Reference: #13406 Output from acceptance testing: ``` --- PASS: TestAccAWSIAMServerCertificate_name_prefix (6.05s) --- PASS: TestAccAWSIAMServerCertificate_disappears (6.10s) --- PASS: TestAccAWSIAMServerCertificate_Path (6.48s) --- PASS: TestAccAWSIAMServerCertificate_basic (6.54s) --- PASS: TestAccAWSIAMServerCertificate_file (10.07s) ```
…icate_body, certificate_chain, and private_key arguments (#14187) Reference: #13406 Output from acceptance testing: ``` --- PASS: TestAccAWSIAMServerCertificate_name_prefix (6.05s) --- PASS: TestAccAWSIAMServerCertificate_disappears (6.10s) --- PASS: TestAccAWSIAMServerCertificate_Path (6.48s) --- PASS: TestAccAWSIAMServerCertificate_basic (6.54s) --- PASS: TestAccAWSIAMServerCertificate_file (10.07s) ```
This has been released in version 3.0.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Description
Hashing schema attribute values in the Terraform state storage was implemented as a workaround for attribute-level encryption of some sensitive values. However, Terraform is designed to work with wholly known values during resource operations and performing differences. For example, if a resource only saves a hashed value in the state, during update operations the resource will incorrectly send the hashed value in API operations.
To remove the hashing from resources, any StateFunc must be replaced with a DiffSuppressFunc that does not show a difference between the whole value and the hashed value. State migration is not possible since the previous state value is only the hash of the real value, however any configured values that omit setting the state explicitly via (helper/schema.ResourceData).Set(), should implicitly update the state value with the configuration value on first refresh.
References
The text was updated successfully, but these errors were encountered: