-
Notifications
You must be signed in to change notification settings - Fork 762
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[BUG] github_branch_protection_v3 tries to delete the contexts every time #1701
Comments
We have a very similiar issue with 5.25.1 provider.
|
Yea it is probably worth mentioning, I am also using github app for authentication |
I have the same problem. Since #1774 (v5.31.0) the |
For what it's worth, if you require a workable provider again now, you could also switch to the GraphQL based API endpoint for branch protections. The behaviour of that one wasn't changed, so there are no superfluous changes for terraform plans. Which would be this resource: https://registry.terraform.io/providers/integrations/github/latest/docs/resources/branch_protection |
You are correct; the Sad times to use the provider :-( |
@0x46616c6b if you have ideas about how we can handle this better, we're very accepting of new issues and PRs! |
Would it be possible to remove the deprecated field |
I think it's reasonable to do a major version release in the near future! It's been quite a while since we last released a breaking change (September 14th). There's a few other changes I wouldn't mind batching in there as well, such as #1029, #448, #1704, and maybe even #1780. In general, Hashicorp recommends not doing more than one breaking change a year if we can help it. |
Is there any progress on this? This kinda makes github_branch_protection_v3 unusable. |
@kfcampbell any timeline we have to officially remove contexts from the branch protection v3? this issue had been on for a while |
Unfortunately GitHub's SDK team doesn't have the bandwidth to work on this ourselves right now, though PRs are appreciated! |
We have several issues related to that:
So there should be added special check for Would that work? |
👋 Hey Friends, this issue has been automatically marked as |
This is still very annoying issue: it shows huge diff, while actual change could be small, so it's easy to miss something. |
Also facing this, tried adding the |
Still happening in 6.2.0 and 6.3.x We just had to replace |
I love that #2232 potentially fixes this issue and it's been sitting open and unreviewed since APRIL. |
I think this issue has been caused by the lack of having |
Problem
I created some branch protection rules for some branches. These rules included required checks. After I applied them, it created matching contexts and a new check that is just one of the required checks with an app_id that always changes (First 4 digits remain the same, the rest changes). Now, every time I ran plan, it says that it is going to delete them again. The branch protections are working just as intended but, running plan always generates meaningless noise that get's in the way especially since we have a lot of branch protection rules once we fully migrate it over to Terraform. The applies are all run by
Atlantis
on PRs. This is what an example output of whatterraform state show
looks like for one of the branches:Running
terraform plan
returns something like thisThere are no error messages at any point and the apply works as intended. It states that all plans have been applied.
Versions
Terraform: v1.4.4
GitHub Provider: Originally 5.23.0 but also happens in 5.25.1
The text was updated successfully, but these errors were encountered: