-
Notifications
You must be signed in to change notification settings - Fork 9.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_network_acl_rule: Prevent creation of duplicate Terraform resources #36324
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
Check also |
This functionality has been released in v5.41.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
So I understand the rationale for fixing the issue of creating duplicate resources. It has left us in a bit of a bind, however. We are using an in-house module that inadvertently created some duplicate Do you have any suggested workarounds? I tried using various |
@jhenry82 You should be able to use a |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Define multiple ACL rules with identical attributes but different Terraform resource names.
Example:
The EC2
CreateNetworkAclEntry
API succeeds on the second resource Create if all attributes are identical. Prevent this.The text was updated successfully, but these errors were encountered: