Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Bug]: fork/exec terraform-profider-aws: permission denied #30227

Open
robertolopezlopez opened this issue Mar 23, 2023 · 7 comments
Open

[Bug]: fork/exec terraform-profider-aws: permission denied #30227

robertolopezlopez opened this issue Mar 23, 2023 · 7 comments
Labels
bug Addresses a defect in current functionality.

Comments

@robertolopezlopez
Copy link

robertolopezlopez commented Mar 23, 2023

Terraform Core Version

v1.4.2

AWS Provider Version

From v4.38.0

Affected Resource(s)

No response

Expected Behavior

successful terraform init

Actual Behavior

image

Error: fork/exec .terraform/providers/registry.terraform.io/hashicorp/aws/4.59.0/linux_amd64/terraform-provider-aws_v4.59.0_x5: permission denied

Relevant Error/Panic Output Snippet

No response

Terraform Configuration Files

vpc-sharing.zip

Steps to Reproduce

  1. terraform init
  2. terraform apply

Debug Output

No response

Panic Output

No response

Important Factoids

No response

References

hashicorp/terraform#24010

Would you like to implement a fix?

Yes

@robertolopezlopez robertolopezlopez added bug Addresses a defect in current functionality. needs-triage Waiting for first response or review from a maintainer. labels Mar 23, 2023
@github-actions
Copy link

Community Note

Voting for Prioritization

  • Please vote on this issue by adding a 👍 reaction to the original post to help the community and maintainers prioritize this request.
  • Please see our prioritization guide for information on how we prioritize.
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for issue followers and do not help prioritize the request.

Volunteering to Work on This Issue

  • If you are interested in working on this issue, please leave a comment.
  • If this would be your first contribution, please review the contribution guide.

@justinretzolk
Copy link
Member

justinretzolk commented Mar 23, 2023

Hey @robertolopezlopez 👋 It looks like based on the linked issue, this is likely a (local) permissions issue. Have there been any modifications to the permissions on the .terraform directory?

@justinretzolk justinretzolk added waiting-response Maintainers are waiting on response from community or contributor. and removed needs-triage Waiting for first response or review from a maintainer. labels Mar 23, 2023
@robertolopezlopez
Copy link
Author

robertolopezlopez commented Mar 23, 2023 via email

@github-actions github-actions bot removed the waiting-response Maintainers are waiting on response from community or contributor. label Mar 23, 2023
@robertolopezlopez
Copy link
Author

robertolopezlopez commented Mar 23, 2023 via email

@robertolopezlopez
Copy link
Author

Hey @robertolopezlopez 👋 It looks like based on the linked issue, this is likely a (local) permissions issue. Have there been any modifications to the permissions on the .terraform directory?

Maybe I chose a bad issue to link :-/ I tried the proposed solution over and over, and nothing changed. Just downgrading the aws provider fixed this problem.

On the other hand, as mentioned in my previous answer, in my case this is not running on azure pipelines but locally on my desktop work machine (more precisely: ubuntu 20.04 amd64 inside of virtualbox+vagrant+w11)

@robertolopezlopez
Copy link
Author

robertolopezlopez commented Mar 24, 2023

With latest aws provider (this time, v4.60.0):
image

The user fernandosalomao is suggesting to make use of chmod to fix the permission issue. In my case:
image

With aws provider v4.3.0:
image
image

@robertolopezlopez
Copy link
Author

Hi @justinretzolk , sorry for my multiple comments above. I took my time to find out which is the exact minor revision which introduced this bug.

With aws provider v4.37.0 all seems good:
image

With aws provider v4.38.0:
image

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Addresses a defect in current functionality.
Projects
None yet
Development

No branches or pull requests

2 participants