-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_secretsmanager_secret recreate #4467
Comments
Pull request submitted with support of the new |
In version 1.33.0 of the AWS provider, likely releasing later today, the
Please note for updating existing |
This has been released in version 1.33.0 of the AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
Can you please add |
Hi @garyp 👋 Great idea -- I would suggest opening a new feature request instead of commenting on a closed one so it can properly accounted for and potentially implemented. 👍 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform Version
Terraform v0.11.7
provider.aws v1.17.0
Affected Resource(s)
Terraform Configuration Files
Output
status code: 400, request id: 9fba0380-51d2-11e8-9d5d-25c00ab77b23
Expected Behavior
After a destroy and apply the secret should be recreated
Actual Behavior
Error is given that the secret already exists
Steps to Reproduce
terraform apply
terraform destroy
terraform apply
Important Factoids
In the documentation it is stated that secrets are not immediately deleted. Perhaps adding a name_prefix to the resource could solve this issue? See: https://docs.aws.amazon.com/secretsmanager/latest/userguide/manage_delete-restore-secret.html
References
The text was updated successfully, but these errors were encountered: