Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

aws_lambda_function.vpc_config always detects a change when empty #10900

Closed
rochdev opened this issue Dec 22, 2016 · 5 comments
Closed

aws_lambda_function.vpc_config always detects a change when empty #10900

rochdev opened this issue Dec 22, 2016 · 5 comments

Comments

@rochdev
Copy link

rochdev commented Dec 22, 2016

Terraform Version

0.8.2

Affected Resource(s)

aws_lambda_function

Terraform Configuration Files

# Only relevant parts shown

variable "subnet_ids" {
  default = []
}

variable "security_group_ids" {
  default = []
}

resource "aws_lambda_function" "lambda" {
  vpc_config {
    subnet_ids         = ["${var.subnet_ids}"]
    security_group_ids = ["${var.security_group_ids}"]
  }
}

Expected Behavior

Right after applying, terraform plan should not detect any change since there aren't any.

Actual Behavior

Right after applying, terraform plan detects a change in vpc_config. If you apply the change, terraform plan will still detect the same change over and over again.

Relevant part of the output:

-/+ module.auth.authorizer.authorizer_lambda.aws_lambda_function.lambda
    vpc_config.#:        "0" => "1" (forces new resource)
    vpc_config.0.vpc_id: "" => "<computed>"

Steps to Reproduce

  1. terraform plan
  2. terraform apply
  3. repeat

References

Seem to be related:

@pgieser
Copy link

pgieser commented Jan 30, 2017

We've been seeing this behavior since 0.7.13.

@pgieser
Copy link

pgieser commented Mar 28, 2017

Anything happening here?

@danielwhite
Copy link

This is still happening in 0.9.4.

@hilaryhacksel
Copy link

This is still happening in 0.11.3. Any updates here?

@ghost
Copy link

ghost commented Apr 4, 2020

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@hashicorp hashicorp locked and limited conversation to collaborators Apr 4, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

6 participants