-
Notifications
You must be signed in to change notification settings - Fork 127
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Version 2 roadmap #125
Comments
Now that terraform 0.12 support has landed can a release be made for that, with the rest of the stuff above being in an additional release. As the 0.12 support is quite urgent to get out to users |
@balupton we are totally agree with you. We will release a new minor version next week :) |
So I was trying to use terraform to setup Is there an ETA for this provider for the new instances, since it's unuseable right now? |
Hello @hazcod when using v1.10.0 you can use |
Can confirm it works with |
Hi, The v0.11.0 is now released! 🎉 |
Hi, I have a question please about the new changes, the |
Hi @QuentinBrosse, thanks for the quick response, I have another question please, why the |
Hi @mdawar, I just see that the migration guide is not up to date. I have just created #287 to fix it, sorry for the inconvenience. |
So, interesting case:
Initial resource: resource "scaleway_instance_security_group" "bastion-ams1" {
inbound_default_policy = "drop"
name = "bastion-ams1"
description = "bastion-ams1"
inbound_rule {
action = "accept"
port = 655
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 655
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 500
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 4500
}
inbound_rule {
action = "accept"
port = 59184
}
} It's all already applied and good, so after terraform plan:
Now, when I change my resource to: resource "scaleway_instance_security_group" "bastion-ams1" {
inbound_default_policy = "drop"
name = "bastion-ams1"
description = "bastion-ams1"
inbound_rule {
action = "accept"
port = 333
}
inbound_rule {
action = "accept"
port = 655
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 655
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 500
}
inbound_rule {
action = "accept"
protocol = "UDP"
port = 4500
}
inbound_rule {
action = "accept"
port = 59184
}
} Notice, I have only added one inbound_rule at the beginning with port 333, my terraform plan looks like this:
I haven't put much effort to investigate this further but I'm a bit scared to touch my infra with it ;-D |
We should remove beta tags from LB since they are stable now (at least according to scaleway dashboard). |
Hello @aleck, You are right the load-balancer product itself is stable but the terraform resources schemas are not. We are still gathering feedback from Terraform users such as yourself. Once we are confident enough that the resources schemas can be frozen we will remove the beta tag. |
Fair enough, I am working on lb acl now, should it have the beta tag as well then? |
Thank you @alekc for trying to contribute to this project. Adding |
I was on terraform 0.11 and have migrated to 0.12. I have 3 servers running on scaleway that were originally deployed with TF. Everything changed! After hours of going in circles with figuring out all the terraform and the configuration changes, now I'm stuck trying to get my tfstate updated with enough information that TF won't try to destroy all my servers. Now that IP addresses are their own resource, I have to somehow figure out what the ID of the IP address is so that I can tf import it and I can't figure that out at all. Just some feedback... I really understand the need for progress and I appreciate all the hard work, but this is really really painful. |
@lookfirst you can find the ID of a "Flexible IP" by going to: https://console.scaleway.com/instance/ips "Toggle options" > "More info". The things that have caught me off-guard were: userdataThis now includes ssh fingerprints, which is easy enough to import and match with the remote. imageThis one is harder, since in my current state its "absent", but with the new provider, its "Required". Therefore any change requires instance to be recreated. As a temporary solution I have ignored these two attributes:
You still need to set image argument, but it can have any value. |
I was testing the latest version
# scaleway_instance_server.testing must be replaced
-/+ resource "scaleway_instance_server" "testing" {
- additional_volume_ids = [] -> null
disable_dynamic_ip = false
disable_public_ip = false
enable_dynamic_ip = false
enable_ipv6 = true
~ id = "fr-par-1/45b38255-1819-459d-a0ee-930d30e00838" -> (known after apply)
~ image = "cc9188b3-3938-47d7-b091-c9ecad1fe507" -> "fr-par-1/cc9188b3-3938-47d7-b091-c9ecad1fe507" # forces replacement
ip_id = "fr-par-1/6c96b185-72eb-4433-853f-d358e6ce57f3"
~ ipv6_address = "2001:bc8:47ac:272a::1" -> (known after apply)
~ ipv6_gateway = "2001:bc8:47ac:272a::" -> (known after apply)
~ ipv6_prefix_length = 64 -> (known after apply)
name = "dev-testing"
+ organization_id = (known after apply)
+ placement_group_policy_respected = (known after apply)
~ private_ip = "10.65.62.85" -> (known after apply)
~ public_ip = "51.158.64.43" -> (known after apply)
~ security_group_id = "1561d0ea-686e-4b4f-9850-05ac077df41b" -> "fr-par-1/1561d0ea-686e-4b4f-9850-05ac077df41b"
state = "started"
tags = [
"terraform",
"ytdl",
"ytdl-dev",
]
type = "DEV1-S"
zone = "fr-par-1"
~ root_volume {
~ delete_on_termination = true -> (known after apply)
~ size_in_gb = 20 -> (known after apply)
~ volume_id = "950fc1a0-e9e3-4372-8702-9ea6d4627a5f" -> (known after apply)
}
} Also as you can see the Update: I'm not able to create a new SSH key using Error: scaleway-sdk-go: http error 403 Forbidden: Permission denied But I can create other resources without any issues. |
Hi @mdawar ! The force recreation seems to be a bug, I can reproduce it. I just opened an issue to discuss and fix it: #411 resource "scaleway_instance_server" "web" {
type = "DEV1-S"
image = "debian"
} Regarding your issue with Thanks for your report and sorry for the inconvenience. :/ |
Hi @QuentinBrosse, Thank you, I'll use image label for now. What about the Also what about the |
@mdawar can you open issues for these subjects, please? :) |
@mdawar if you are using only one region, you can also specify it in your provider configuration like this:
In theory this should avoid the issue you are having. |
Hi, This issue is dedicated to version 2 roadmap updates. Note that you can watch releases to be notified about new releases. |
I'm very happy to announce that the first release candidate of the v2 of terraform is released 🎉 You can view this guide live on the terraform registry. |
Dear Cloud Rider,
In order to improve our provider and support our new products we will make a significant refactoring on the whole codebase to finally release a version 2.
Naturally, we are taking the backward compatibility issues very seriously. Therefore we will follow a process designed to make it possible for you to execute a smooth transition from your current version to the
v2
.Roadmap
Step 1: New minor versions [Non-Breaking Change]
This version will deprecate some elements of this provider but will not create any breaking change. It will allow you to prepare your configuration for the
v2
without breaking your actual configuration.Here is a list of actions we will take - all the details will be discussed in there dedicated sub-issue:
v1.10.0
: milestone ✅0.12
[#124]v1.11.0
: milestone ✅scaleway_{product}_{resource}
. The old resources will be kept but deprecated. This will allow the creation of resources for our new products [Recode all current resources following this scheme #143]v1.12.0
: milestone ✅v1.13.0
: milestone ✅v1.14.0
: milestone ✅data-source/scaleway_registry_image_beta
: [feat(registry): add image data source #409]data-source/scaleway_registry_namespace_beta
: [feat(registry): add namespace data source #408]resource/scaleway_lb_certificate_beta
[feat: added certificate to load-balancer #396]resource/scaleway_registry_namespace_beta
: [feat(registry): add scaleway_registry_namespace_beta resource #330] [fix(registry): add registry back to list of resources #407]resource/scaleway_instance_security_group_rules
[feat: add scaleway_instance_security_group_rules resource #391]v1.15.0
: milestone ✅TBA
v1.16.0
: milestone ✅TBA
v1.17.0
: milestoneTBA
Step 2: New major version
v2.0.0
milestoneThe version will clean all the deprecated elements introduced in the
v1.10.X
.Here is a list of actions we will take - all the details will be discussed in there dedicated sub-issue:
5. Remove support for dynamic ip from server resource[rejected]The text was updated successfully, but these errors were encountered: