-
Notifications
You must be signed in to change notification settings - Fork 549
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
vault_aws_auth_backend_role always detects a drift #853
Comments
Hello - I believe this stems from the use of Unfortunately it's not clear to me from the documentation if that assumption is correct or not. On the surface (reading our documentation and Vault's documentation), it seems correct that |
I was implementing IAM and EC2 vault auth options and i had I guess if |
It is my understanding that The above code snippet is dense, especially if you are not familiar with Vault's codebase, but searching around that file shows that the references to |
so far everything is stable but it will be nice to see same warnings from terraform when using parameters that are not compatible toughener |
Hey @papovyr - unfortunately I'm not sure Terraform currently supports detecting and warning based on the values of another attribute of the resource. There exists a GitHub issue for the feature, but it's not clear if/when it could be available (hashicorp/terraform-plugin-sdk#233), For now, I've opened up #857 to add documentation to clarify usage. I hope that suffices. |
Hi there,
As many time i run TF following script it will detect change
HCL
output
The text was updated successfully, but these errors were encountered: