-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: aws_elasticache_replication_group set the auth password with ROTATE with the latest provider aws 5.27.0 #34609
Comments
Community NoteVoting for Prioritization
Volunteering to Work on This Issue
|
There is an additional flaw here. There is no support for
|
Unsure if related, but it would fail terraform apply for Replication Group wo/ encryption in transit configured (pinning to previous version fixes the issue for us)
Terraform core version: 1.5.7 Thank you Edit, I assume my comment should have been on this ticket: #34600 (addressed since, thank) |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Terraform Core Version
1.4.7
AWS Provider Version
5.27.0
Affected Resource(s)
aws_elasticache_replication_group
Expected Behavior
Nothing, no change in my code for elasticache
Actual Behavior
module.redis.aws_elasticache_replication_group.redis_replication_group will be updated in-place
~ resource "aws_elasticache_replication_group" "redis_replication_group" {
+ auth_token_update_strategy = "ROTATE"
id = "myredis"
# (35 unchanged attributes hidden)
}
When doing the apply, it set the 'default' password I use in my terraform with ROTATE, meaning, I now have the 'default' password and the 'normal' password that I setuped outside of terraform
Relevant Error/Panic Output Snippet
No response
Terraform Configuration Files
I was doing some change in the terraform code but not in the elasticache section.
But the latest aws provider 5.27.0 try to add the auth_token_update_strategy as change, forcing terraform to put a new password to all my redis.
Steps to Reproduce
create an aws_elasticache_replication_group with a provider before 5.27.0 with an auth_token.
change the redis auth_token outside of terraform (ROTATE&SET) by the aws cli command.
update provider aws to 5.27.0
do a plan, it will show that it try to add auth_token_update_strategy to the aws_elasticache_replication_group
and by doing the apply, it set the 'default' auth_token that is in terraform with ROTATE
Now your redis has two auth_token, the terraform 'default' one, and the one you setuped after the initial terraform.
It is a big security regression
Debug Output
No response
Panic Output
No response
Important Factoids
No response
References
No response
Would you like to implement a fix?
None
The text was updated successfully, but these errors were encountered: