Open JulianAWS opened 1 year ago
Voting for Prioritization
Volunteering to Work on This Issue
My answer here may give some insight. I also ran into this issue: https://github.com/hashicorp/terraform-provider-aws/issues/33170#issuecomment-1780259530
Not sure if it's the same issue I'm seeing, but I'm finding that service-managed stacksets continually attempt to remove the administration_role_arn
parameter on the stack set. But of course, this is unnecessary if it's a service-managed stackset (as opposed to self managed).
# module.xxxx[0].aws_cloudformation_stack_set.xxxx[0] will be updated in-place
~ resource "aws_cloudformation_stack_set" "xxxx" {
- administration_role_arn = "arn:aws:iam::000000000000:role/aws-service-role/stacksets.cloudformation.amazonaws.com/AWSServiceRoleForCloudFormationStackSetsOrgAdmin" -> null
id = "xxxx"
name = "xxxx"
~ parameters = {
~ "Region" = (sensitive value)
# (6 unchanged elements hidden)
}
tags = {}
# (10 unchanged attributes hidden)
# (2 unchanged blocks hidden)
}
@ohookins it's not, you can simply ignore that changes with lifecycle
lifecycle { ignore_changes = [ administration_role_arn ] }
I encounter the same issue as @ohookins . @michalz-rely : why is this necessary to add a lifecycle / ignore_change on this administration_role_arn ? This will inideed fix the loop issue, but why is this happening ? Is there any other issue opened on this topic ?
Terraform Core Version
1.4.5 on darwin_arm64
AWS Provider Version
4.58.0
Affected Resource(s)
Expected Behavior
The deployment options of the stack set are as stated in the state file / terraform code
Actual Behavior
The deployment options of the stack set remain at default after terraform apply
Relevant Error/Panic Output Snippet
No response
Terraform Configuration Files
Steps to Reproduce
terraform init terraform apply
Debug Output
Apply complete! Resources: 0 added, 2 changed, 0 destroyed.
Panic Output
No response
Important Factoids
No response
References
25210
27764
Would you like to implement a fix?
None