Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vault_auth_backend description change shouldn't create new mount #998

Closed
holtwilkins opened this issue Mar 15, 2021 · 5 comments
Closed

Comments

@holtwilkins
Copy link

Affected Resource(s)

vault_auth_backend

Expected Behavior

Altering description should not force replacement of resource.

Actual Behavior

Description change forces new resource.

Steps to Reproduce

Apply terraform instantiating a vault_auth_backend. Change the description field once the resource exists.

@holtwilkins
Copy link
Author

Is this also the case for vault_aws_secret_backend?

@xeivieni
Copy link

xeivieni commented Mar 19, 2021

A side effect to that is that any vault_aws_auth_backend_role attached to a vault_auth_backend which description changes isn't recreated on the new auth backend.

@holtwilkins
Copy link
Author

Also the case for vault_azure_secret_backend it seems

@maxb
Copy link

maxb commented Jun 5, 2022

The original issue in the title and main description has been fixed via #1439.

It's not clear to me whether subsequent comments about aws and azure resources need any further work, but I'd suggest closing this issue and filing new ones if there is other work still needed.

@heatherezell
Copy link

The original issue in the title and main description has been fixed via #1439.

It's not clear to me whether subsequent comments about aws and azure resources need any further work, but I'd suggest closing this issue and filing new ones if there is other work still needed.

Max, you make my job so much easier. Thanks again. :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants