Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Stop re-enabling termination protection during delete of aws_instance #19276

Closed

Conversation

tmccombs
Copy link
Contributor

@tmccombs tmccombs commented May 7, 2021

Closes #19275

This just restores the previous behavior. Another option would be to
just always modify the attribute to false so that deleting works even if
disable_api_termination is true.

Community Note

  • Please vote on this pull request by adding a 👍 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for pull request followers and do not help prioritize the request

@tmccombs tmccombs requested a review from a team as a code owner May 7, 2021 15:59
@ghost ghost added size/XS Managed by automation to categorize the size of a PR. service/ec2 Issues and PRs that pertain to the ec2 service. labels May 7, 2021
@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label May 7, 2021
@tmccombs tmccombs force-pushed the fix-termination-protection-delete branch 2 times, most recently from 2833e9c to 217e8d1 Compare May 7, 2021 16:40
@breathingdust breathingdust added enhancement Requests to existing resources that expand the functionality or scope. and removed needs-triage Waiting for first response or review from a maintainer. labels Sep 4, 2021
@zhelding
Copy link
Contributor

Pull request #21306 has significantly refactored the AWS Provider codebase. As a result, most PRs opened prior to the refactor now have merge conflicts that must be resolved before proceeding.

Specifically, PR #21306 relocated the code for all AWS resources and data sources from a single aws directory to a large number of separate directories in internal/service, each corresponding to a particular AWS service. This separation of code has also allowed for us to simplify the names of underlying functions -- while still avoiding namespace collisions.

We recognize that many pull requests have been open for some time without yet being addressed by our maintainers. Therefore, we want to make it clear that resolving these conflicts in no way affects the prioritization of a particular pull request. Once a pull request has been prioritized for review, the necessary changes will be made by a maintainer -- either directly or in collaboration with the pull request author.

For a more complete description of this refactor, including examples of how old filepaths and function names correspond to their new counterparts: please refer to issue #20000.

For a quick guide on how to amend your pull request to resolve the merge conflicts resulting from this refactor and bring it in line with our new code patterns: please refer to our Service Package Refactor Pull Request Guide.

Closes hashicorp#19275

This just restores the previous behavior. Another option would be to
just always modify the attribute to false so that deleting works even if
`disable_api_termination` is true.
@tmccombs tmccombs force-pushed the fix-termination-protection-delete branch from 217e8d1 to 4b6a7bc Compare October 20, 2021 05:27
@ewbankkit
Copy link
Contributor

@tmccombs Thanks for the contribution 🎉 👏.
Let's go with the implementation in #19277 for this.

@ewbankkit ewbankkit closed this May 26, 2022
ewbankkit pushed a commit that referenced this pull request May 26, 2022
When we delete an ec2 instance, make sure that we turn off disabled api
termination, so that deletion always works.

Closes #19275

Alternative to (and conflicts with) #19276
@tmccombs
Copy link
Contributor Author

Awesome, thank you.

@tmccombs tmccombs deleted the fix-termination-protection-delete branch May 27, 2022 03:19
@github-actions
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jun 27, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/ec2 Issues and PRs that pertain to the ec2 service. size/XS Managed by automation to categorize the size of a PR.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Unable to delete aws_instance if disable_api_termination was true
4 participants