You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The openstack_compute_instance_v2 resource accepts secgroups by both name and id. However, when using an id, the behavior is non-idempotent. The first apply succeeds but any successive plan/apply compares the current state of the resource by name with the declared id. Apply will fail attempting to "change" the security groups. These goofy semantics are likely the fault of the openstack API -- perhaps some heuristic matching could be apply to detect uuids?
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
ghost
locked and limited conversation to collaborators
Apr 11, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
The
openstack_compute_instance_v2
resource accepts secgroups by both name and id. However, when using an id, the behavior is non-idempotent. The first apply succeeds but any successive plan/apply compares the current state of the resource by name with the declared id. Apply will fail attempting to "change" the security groups. These goofy semantics are likely the fault of the openstack API -- perhaps some heuristic matching could be apply to detect uuids?Output from initial
apply
Output from
plan
after anapply
:The text was updated successfully, but these errors were encountered: