-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
resource/aws_security_group_rule crashes with provider version 1.43.1 #6416
Comments
Relevant portion of the crash log:
|
There is a missing |
We have this too when trying to refresh the state of aws_security_group_rule |
@LucaLanziani could you share the configuration of the rule that you think is causing the issue? Definitely want to be sure we get the right amount of test coverage in place. |
I just came across this issue too. This seems to be a regression in aws provider in |
@soorena776 and anyone else chiming in -- can you please provide the configuration of the rule(s) you believe might be causing this? This will ensure we're covering all the troublesome behavior in one fix. Thanks! |
|
We're seeing this for both |
Running the
|
@bflad I'll try to share my config first thing in the morning |
After diving into the code path and with the help of the example configurations above, I was able to generate the crash via acceptance testing. I have submitted the bug fix pull request here: #6419 This will absolutely go out with the next provider release whether a 1.43.2 or 1.44.0. |
@bflad thanks a lot for the work and the quick fix, do you have any ETA for the next release? |
Sorry I should have mentioned that previously in my last response. The fix will go out Monday at the latest. If you're in need of an immediate workaround, you can pin your AWS provider version in your configuration via: provider "aws" {
# ... potentially other configuration ...
version = "1.43.0"
} Then run I've also opened a technical debt issue (#6422) to add additional multiple rule acceptance test coverage for this resource, since it is one of the few resources that is heavily influenced by other configuration (e.g. other security group rules present in the same security group). |
Version 1.43.2 of the AWS provider has been released with the fix for this situation. If you continue to have trouble on that updated version, please open a fresh bug report with all the relevant details. Thanks again to all the reporters and apologies for the inconvenience the last day or so. |
It works for me with the latest v1.43.2 provider. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform Version
Terraform v0.11.8
Terraform Configuration Files
https://github.com/terraform-providers/terraform-provider-aws/tree/master/examples/eks-getting-started
Modified to use
eu-west-1
region.Output
https://gist.github.com/yorinasub17/99184f7fcf662ce09f6fb5c7b9e7389f
Panic output
https://gist.github.com/yorinasub17/06c6be4e7199069cf204412e59ebe075
Expected Behavior
No panic.
Actual Behavior
Panic!
Steps to Reproduce
terraform init
terraform apply
terraform destroy
<= this failsImportant Factoids
The text was updated successfully, but these errors were encountered: