-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
aws_route53_resolver_rule data lookup tag error #10211
Comments
OK, I can reproduce with an acceptance test case: $ AWS_ALTERNATE_ACCESS_KEY_ID=AAAAAAAAAAAAAAAAAAAA AWS_ALTERNATE_SECRET_ACCESS_KEY=xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx make testacc TEST=./aws/ TESTARGS='-run=TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws/ -v -count 1 -parallel 20 -run=TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe -timeout 120m
=== RUN TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe
=== PAUSE TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe
=== CONT TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe
--- FAIL: TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe (215.89s)
testing.go:569: Step 0 error: errors during apply:
Error: error reading Route 53 Resolver rule (rslvr-rr-5587d23bbd0b4427b) tags: InvalidParameterException: [RSLVR-00907] You are not authorized to do this operation on shared resource
status code: 400, request id: e29548bf-4df3-49e5-8539-ce527aea6562
on /var/folders/4j/lf5jdq5j4y91g80ytf6qzjwmk6drp5/T/tf-test261069804/main.tf line 147:
(source code not available)
FAIL
FAIL github.com/terraform-providers/terraform-provider-aws/aws 215.980s
FAIL
make: *** [testacc] Error 1 |
I wonder if the same applies to other RAM shareable resources with tags (and data sources)?
|
Just checked our TGW shares. I don't have any shares of the other resource types to check. |
@dbaggerman Thanks for checking that. It looks like it may just be Aurora RDS clusters that could cause a similar problem; I'll investigate that. |
Aurora cross-account cloning uses the RDS point-in-time restore mechanism. |
The fix for this has been merged and will release with version 2.35.0 of the Terraform AWS Provider, Thursday. Thanks to @ewbankkit for the fix. 👍 |
This has been released in version 2.35.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Terraform Version
v0.11.14
Affected Resource(s)
Terraform Configuration Files
Expected Behavior
Should have done a data lookup and located route53 resolver rule(s).
Actual Behavior
Terraform returns an error that you are not authorized to look at tags on shared resource:
Steps to Reproduce
terraform apply
Important Factoids
This is a shared resolver rule set from another AWS account. The share was accepted and the rules show up in our account. This appears to be a bug in that you cannot lookup tags of a shared rule via the AWS API.
The text was updated successfully, but these errors were encountered: