-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
bug: default_tags in aws provider causes aws_s3_object_copy diff each apply #25477
Comments
Confirmed objects are taggable, resource "aws_s3_object_copy" "copy-object-to-bucket" {
bucket = "${aws_s3_bucket.target-bucket.id}"
key = "targetobjectkey"
source = "sourcebucket/sourceobjectkey"
lifecycle {
ignore_changes = [tags_all]
}
} |
Same with aws_db_proxy_endpoint for me |
Any update here? |
@hameno Ditto. OOI, is your endpoint for the |
@rquadling Yes |
I think
tags , and not tags_all .
if d.HasChange("tags") {
o, n := d.GetChange("tags")
if err := UpdateTags(conn, d.Get("arn").(string), o, n); err != nil {
return fmt.Errorf("Error updating RDS DB Proxy Endpoint (%s) tags: %w", d.Get("arn").(string), err)
}
} vs if d.HasChange("tags_all") {
o, n := d.GetChange("tags_all")
if err := UpdateTags(conn, d.Get("arn").(string), o, n); err != nil {
return fmt.Errorf("updating RDS Cluster (%s) tags: %w", d.Get("arn").(string), err)
}
} and if d.HasChange("tags_all") {
o, n := d.GetChange("tags_all")
if err := UpdateTags(conn, d.Get("arn").(string), o, n); err != nil {
return fmt.Errorf("updating RDS Cluster Instance (%s) tags: %w", d.Id(), err)
}
} In looking at the other resources,
tags_all for their processing.
I'll see if I can get a PR made for |
I've taken a look at the S3 copy object resource ... not at my ability to make a PR for that ... sorry. |
@hameno The fix for the RDS Proxy Endpoint tags / tags_all has been fixed and merged. So at least we've got that bit done! |
I believe that the This means that the tags from Setting |
Had the same issue. Only workaround I could find was declaring a second AWS provider that didn't use default tags and using it specifically as a provider alias for any usages of aws_s3_object_copy. |
Community Note
Terraform CLI and Terraform AWS Provider Version
Affected Resource(s)
"aws_s3_object_copy"
Terraform Configuration Files
aws_s3_object_copy resource example
Debug Output
Expected Behavior
Not sure if s3 objects are tag-able
but
Apply tags to s3 object
or
Don't apply tags to s3 object
Actual Behavior
Provider attempts to apply tags to s3 object on each apply
Steps to Reproduce
terraform apply
terraform apply
Important Factoids
Target S3 bucket is KMS encrypted, Remote S3 bucket is public
The text was updated successfully, but these errors were encountered: