-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
google_storage_bucket_acl role_entities don't work #50
Comments
Any updates on this one? not being able to use terraform for bucket acl's is making this resource unusable |
Having this problem with 0.9.11 as well, including the reappearing work issue described in hashicorp/terraform#10612 (comment) I differ from the parent bug however. By removing a reference to It also seems worth mentioning that the permissions Terraform creates are of the older |
Is this still an ongoing issue? I've got a working config at the moment that adds a user in the OWNER role, and it's working without a hitch for me. Does anyone have a minimal reproduction handy? |
This is our case which is affected, the ACL will be updated on every apply
gsutil acl:
Apply output:
Terraform v0.9.11 |
Storage bucket ACLs inherited the behaviour of only updating the fields that were set in the config file. Terraform should track all the fields in the resource, whether the user has specified a value for them or not, and correct any drift that may occur. This has manifested in an issue and unexpected behaviour in #50, and this PR restores the expected behaviour.
Thanks! That clarified things immensely. I've got good news and bad news.
Sorry for the rollercoaster, there. Hopefully that solution helps you out now, and the PR makes the problem clearer in the future. :) |
Ah, sorry, misclick. |
This has been merged to master, and will be released with the next release. |
Storage bucket ACLs inherited the behaviour of only updating the fields that were set in the config file. Terraform should track all the fields in the resource, whether the user has specified a value for them or not, and correct any drift that may occur. This has manifested in an issue and unexpected behaviour in hashicorp#50, and this PR restores the expected behaviour.
Move beta providers to their own block in provider.go
Hi, We seemed to have found a regression or an edge case for the google_storage_object_acl resource that is very similar to this one. The terraform version is: v0.11.13 The file permissions were lost after a re-upload of the same files. Terraform detected the changes because the apply was done on different computers that lead to different paths for the uploaded files. We've made a regression test. I'm sharing it as it helps understanding the use case.
The terraform module creates a bucket with a public cdn and then uploads some files that are made public using the google_storage_object_acl resource. Regards |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
This issue was originally opened by @mikemcrill as hashicorp/terraform#10612. It was migrated here as part of the provider split. The original body of the issue is below.
Terraform Version
Terraform v0.7.13
Affected Resource(s)
Terraform Configuration Files
Debug Output
https://gist.github.com/mikemcrill/b43cb01767812985338b9bb890da4a9b
Expected Behavior
ACL should be applied without errors
Actual Behavior
ACL tries to delete owner and fails
Steps to Reproduce
Apply terraform with the above state
Important Factoids
I tried with and without referencing the OWNER entity, same effect. Terraform keeps trying to destroy the OWNER permission.
The text was updated successfully, but these errors were encountered: