You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Oct 25, 2022. It is now read-only.
As part of the Terraform upgrade, the AWS provider needed to be upgraded also. Upgrading the AWS provider meant making a lot of changes to the S3 bucket resources as per the new syntax.
The KMS key used to be part of the s3 bucket module but is now split out into an individual resource. This has caused buckets that were previously encrypted to enter a state of flux whereby the bucket shows as unencrypted but the objects within it remain encrypted with the old KMS key (now deleted).
S3 buckets will not successfully encrypt with the new KMS key.
The text was updated successfully, but these errors were encountered:
In response to this, terraform was reverting any changes it didn't see in the state, which meant our resources were being changed on every pipeline run.
After adding the lifecycle block in PR #186 the S3 buckets were provisioned as expected. There is some cleanup to do as per #187
Describe the problem
As part of the Terraform upgrade, the AWS provider needed to be upgraded also. Upgrading the AWS provider meant making a lot of changes to the S3 bucket resources as per the new syntax.
The KMS key used to be part of the s3 bucket module but is now split out into an individual resource. This has caused buckets that were previously encrypted to enter a state of flux whereby the bucket shows as
unencrypted
but the objects within it remain encrypted with the old KMS key (now deleted).S3 buckets will not successfully encrypt with the new KMS key.
The text was updated successfully, but these errors were encountered: