You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
S3 bucket policy is updated without having to destroy the bucket.
Actual Behavior
aws_s3_bucket.my-bucket: Error deleting S3 Bucket: BucketNotEmpty: The bucket you tried to delete is not empty. You must delete all versions in the bucket.
status code: 409, request id: 123ABC "my-bucket"
aws_s3_bucket.my-bucket: Error creating S3 bucket: BucketAlreadyOwnedByYou: Your previous request to create the named bucket succeeded and you already own it.
status code: 409, request id: 1234XYZ
Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
Create (terraform apply) an S3 bucket with an aws_iam_policy_document. I have multiple statements. 2 for internal network users to access the bucket and objects and then 2 more for specific users and roles to do the same.
Add an object to the bucket.
Modify the principal list for the policy.
terraform plan shows resources to create
terraform apply tries to delete the bucket and fails because there are objects in it.
References
Are there any other GitHub issues (open or closed) or Pull Requests that should be linked here? For example:
This issue has been automatically migrated to hashicorp/terraform-provider-aws#1326 because it looks like an issue with that provider. If you believe this is not an issue with the provider, please reply to this issue and let us know.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 8, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Terraform Version
0.9.11
Expected Behavior
S3 bucket policy is updated without having to destroy the bucket.
Actual Behavior
status code: 409, request id: 123ABC "my-bucket"
status code: 409, request id: 1234XYZ
Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
terraform apply
) an S3 bucket with an aws_iam_policy_document. I have multiple statements. 2 for internal network users to access the bucket and objects and then 2 more for specific users and roles to do the same.terraform plan
shows resources to createterraform apply
tries to delete the bucket and fails because there are objects in it.References
Are there any other GitHub issues (open or closed) or Pull Requests that should be linked here? For example:
The text was updated successfully, but these errors were encountered: