-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Get state for google_compute_firewall_policy_rule
fails with provider 6.13.0
#20660
Comments
I think I found the issue we have. Until TPG v4.70.0 there was This caused that we have Unfortunately I didn't find any solution other than changing the EDIT: It seems that there is an option to add @trodge you did the migration from DCL to MMv1, do you have any idea how to fix the provider and make the new provider version compatible with old state files? |
Assigning to @trodge since this is directly related to the GA DCL -> MMv1 firewall migration |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
After update of provider from 6.12.0 to 6.13.0, we can see issue with terraform not properly getting state for
google_compute_firewall_policy_rule
resource. State refresh phase uses different link to get the resource than before and fails to fetch it, resulting in inaccurate plan attempting to create existing resource.Roll back to provider 6.12.0 solved the issue and you can actually see in debug logs that URL used to fetch this resource has changed.
Provided gists of debug output for both provider versions for the same resource.
Terraform Version & Provider Version(s)
Terraform v1.6.6
on darwin_arm64
Affected Resource(s)
google_compute_firewall_policy_rule
Debug Output
https://gist.github.com/Flektoma/d0dff1c0dc3b86a30dde33dd01331e2e
Expected Behavior
The terraform should have found the resource as it used to before for provider 6.12.0
https://gist.github.com/Flektoma/072b12cea2b01b8bdc039b99771eab75
b/383894751
The text was updated successfully, but these errors were encountered: