-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Race condition between state machine role creation and use. Long time to propagate the role. #7893
Comments
I got an equal issue. The Problem is the State Machine will be created before the IAM Role and IAM Role Policy Attachment. |
Experiencing the same issue. I've built a few step functions in the past and never ran into this... |
Experiencing the same issue |
same issue here |
Same issue here. I attempted to add a trust relationship but that error continues... I created an IAM role that allows FULL access to every AWS service I'm using. |
The fix to allow the |
This has been released in version 2.69.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Terraform Version
Terraform version 2.1.0
Problem: The state machine exec role takes time to propagate and an explicit “depends on” constraint does not help.
Terraform Configuration Files
Crash Output
"* aws_sfn_state_machine.state_machine: Error creating Step Function State Machine: AccessDeniedException: Neither the global service principal states.amazonaws.com, nor the regional one is authorized to assume the provided role.
status code: 400, request id: b26b3cc8-442d-11e9-83bb-03aa166dd894"
Expected Behavior
Apply complete! Resources: X added, 0 changed, 0 destroyed.
Actual Behavior
Fails to apply because iam roles takes time to propagate across regions. Apply succeeds on second application. It takes a few seconds for the IAM role to be available.
Steps to Reproduce
terraform apply
Additional context
Following hack addresses the problem, but this is still a hack.
The text was updated successfully, but these errors were encountered: