-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_acm_certificate_validation
wrongly reporting invalid certificate_arn
on v4.12.0
#24452
Comments
Can confirm that I am also facing the same issue on
I wasn't locking the provider version earlier, but now have locked to |
aws_acm_certificate_validation
wrongly reporting invalid certificate_arn
on v4.12.0
+1 this. Will lock to v4.11.0. Seems like a pretty bad break? |
Same issue here. The certificatearn output is giving the certificate issue date instead of the arn. It breaks everything |
The value in the tfstate file (as obtained through terraform state show) contains the correct arn |
Same here - eagerly wanted to try out Serverless RDS Aurora v2 and hit the wall. |
Same issue... waiting for a faster-than-light fix ;) |
The same here ;) |
+1 |
Deleted |
+1 |
2 similar comments
+1 |
+1 |
I can see that the pull request has been approved for fixing this but changes are yet to reflect compiled provider with tag v4.12.0 |
4.12.0 introduced the issue |
I almost wonder if in the next major release should change the |
Don't know the versioning and deployment of artifacts schema here, build was x5 so I presumed for a bug they vould do x6 or what ever.
Of course logical, build artifact had x5 suffix, not knowing the versioning schema typo'ed 4.12.0. |
Is v4.13.0 going to be released as a hotfix for this? Or are you going to hold off on the release for now and add more changes to it? As we are also pretty stuck on this one for the moment... |
For the time being, just add the following to your terraform provider block.
That will pin the aws provider to the previous version. |
I know, but we have like a "gazillion" repos so that would be quite some work to be honest... So if this release is going to take at least another day or so we'll do the work, but otherwise I prefer to wait for it. |
if it is that much work to handle an issue, you should always pin and use something like dependabot to bump versions. |
No, we're perfectly fine with it and prefer to use latest. But it would be a shame if I spend the time to pin everything and then 5 minutes later Hence my question about the expected release frame, just so I can make an educated guess if it worth the efforts. |
We are planning on releasing a |
This functionality has been released in v4.12.1 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
Thanks for the great news 😎 |
Fix confirmed! Just tried the same resources on Thanks for the quick fix y'all! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Terraform CLI and Terraform AWS Provider Version
1.1.8, and the just-released v4.12.0
Affected Resource(s)
aws_acm_certificate_validation
Terraform Configuration Files
Expected Behavior
Terraform plan should have found no changes on my
aws_acm_certificate_validation
resource in this case.Actual Behavior
(it errors out reading the
aws_acm_certificate_validation
'scertificate_arn
)Steps to Reproduce
terraform plan
with an existing, unchangedaws_acm_certificate_validation
in state, after upgrading tov4.12.0
This did NOT occur on any previous releases (I hadn't version locked my providers yet for this new setup, and it just started.)
Locking my version to
v4.11.0
resolved the issue, plan worked as expected.The text was updated successfully, but these errors were encountered: