-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
VPN Client Endpoint Route Creation #7831
Comments
This comment has been minimized.
This comment has been minimized.
As a workaround, it is possible to automate this via the CLI until this is implemented resource "null_resource" "client_vpn_route_internet" {
provisioner "local-exec" {
when = "create"
command = "aws ec2 create-client-vpn-route --client-vpn-endpoint-id ${aws_ec2_client_vpn_endpoint.client_vpn.id} --destination-cidr-block 0.0.0.0/0 --target-vpc-subnet-id ${aws_subnet.subnet_az1.id} --profile ${var.profile}"
}
provisioner "local-exec" {
when = "destroy"
command = "aws ec2 delete-client-vpn-route --client-vpn-endpoint-id ${aws_ec2_client_vpn_endpoint.client_vpn.id} --destination-cidr-block 0.0.0.0/0 --target-vpc-subnet-id ${aws_subnet.subnet_az1.id} --profile ${var.profile}"
}
} |
You can also use a cloudformation stack resource :
|
This solution will become sooner or later strictly invalid. As latest versions of Terraform show, they are gliding more into invalidate references to other resources during the destroy phase, as they can "cause dependency cycles and interact poorly with create_before_destroy". My latest runs are showing:
|
Does anyone know the best way to get the submitted PR reviewed? The null_resource workaround will cease to work in terraform 0.13 when specifying non-self var references in destroy provisioners will be treated as an error. |
Hi, I dont know why my PR isnt reviewed :-( |
This has been released in version 2.70.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Description
As of now, there is a lack of a route creation resource to accompany the ones currently available that do the initial tasks of endpoint creation:
There is currently an open pull request (#7564) to rework the initial resource to include the authorization ingress, but not the route creation. Relevant developer: @slapula
New or Affected Resource(s)
References
The text was updated successfully, but these errors were encountered: