Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cloudformation stack in unrecoverable state should be tainted #107

Closed
hashibot opened this issue Jun 13, 2017 · 5 comments
Closed

Cloudformation stack in unrecoverable state should be tainted #107

hashibot opened this issue Jun 13, 2017 · 5 comments
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/cloudformation Issues and PRs that pertain to the cloudformation service. stale Old or inactive issues managed by automation, if no further action taken these will get closed. upstream-terraform Addresses functionality related to the Terraform core binary.

Comments

@hashibot
Copy link

This issue was originally opened by @torfredrik as hashicorp/terraform#5652. It was migrated here as part of the provider split. The original body of the issue is below.


If you create a stack that ends up in the state ROLLBACK_COMPLETE the only way to recover is to delete the stack and recreate it with a valid cloudformation template.

Using terraform I would expect the stack to be tainted when it reaches this state, and any updates I make to the template and apply to the stack should result in a recreation of the stack.

The problem is shown in this gist.

@hashibot hashibot added the enhancement Requests to existing resources that expand the functionality or scope. label Jun 13, 2017
@radeksimko radeksimko added the service/cloudformation Issues and PRs that pertain to the cloudformation service. label Jan 25, 2018
@radeksimko radeksimko added the upstream-terraform Addresses functionality related to the Terraform core binary. label Apr 5, 2018
@mjalkio
Copy link
Contributor

mjalkio commented Nov 29, 2018

Is there a recommended workaround for this currently?

@wernerb
Copy link
Contributor

wernerb commented Jul 23, 2019

This is still a problem for us. Is there a way to force delete?

@dan-petty
Copy link
Contributor

I'm still dealing with this issue as well.

@github-actions
Copy link

Marking this issue as stale due to inactivity. This helps our maintainers find and focus on the active issues. If this issue receives no comments in the next 30 days it will automatically be closed. Maintainers can also remove the stale label.

If this issue was automatically closed and you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thank you!

@github-actions github-actions bot added the stale Old or inactive issues managed by automation, if no further action taken these will get closed. label Jan 12, 2022
@github-actions
Copy link

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators May 13, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
enhancement Requests to existing resources that expand the functionality or scope. service/cloudformation Issues and PRs that pertain to the cloudformation service. stale Old or inactive issues managed by automation, if no further action taken these will get closed. upstream-terraform Addresses functionality related to the Terraform core binary.
Projects
None yet
Development

No branches or pull requests

5 participants