Ecosyste.ms: Timeline
Browse the timeline of events for every public repo on GitHub. Data updated hourly from GH Archive.
github-actions[bot] created a comment on an issue on hashicorp/terraform-provider-aws
# Community Note **Voting for Prioritization** * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the ...
EugenKon opened an issue on hashicorp/terraform-provider-aws
[Bug]: SSL Certificate delation takes too much time
### Terraform Core Version v1.9.7 ### AWS Provider Version v5.67.0 ### Affected Resource(s) * aws_lb_listener * aws_acm_certificate ### Expected Behavior Because aws_acm_certificate is used...geekodour created a comment on an issue on hashicorp/terraform-provider-aws
> both launch and launch-before-terminate are valid values under certain circumstances. I meant that the provider automatically seems to convert `launch` to ` launch-before-terminate` and does n...
github-actions[bot] pushed 1 commit to gh-pages hashicorp/terraform-provider-aws
- Deployed 9485f1d9 with MkDocs version: 1.4.2 56c8530
terraform-aws-provider[bot] pushed 1 commit to main hashicorp/terraform-provider-aws
- Update CHANGELOG.md for #39834 9485f1d
Shocktrooper created a comment on an issue on hashicorp/terraform-provider-aws
Just ran into this as well. Its very annoying when setting up new log streams. This should be pretty easy to solve without a workaround
github-actions[bot] pushed 1 commit to gh-pages hashicorp/terraform-provider-aws
- Deployed bf33ca5f with MkDocs version: 1.4.2 54ca931
github-actions[bot] created a comment on an issue on hashicorp/terraform-provider-aws
> [!WARNING] > This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. > > Ongoing conversations amongst...
github-actions[bot] created a comment on an issue on hashicorp/terraform-provider-aws
> [!WARNING] > This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. > > Ongoing conversations amongst...
ewbankkit closed an issue on hashicorp/terraform-provider-aws
[Bug]: Regression in version 5.60, aws_security_group_rule does not detect removed/changed Security Group Rule
### Terraform Core Version 1.9.5 ### AWS Provider Version 5.60, 5.68 ### Affected Resource(s) * aws_security_group_rule ### Expected Behavior When a Security Group Rule is removed/changed in...ewbankkit closed an issue on hashicorp/terraform-provider-aws
[Bug]: Regression in v5.60.0 - manually deleted security group rule is not recreated on consequent plan/apply
### Terraform Core Version 1.8.2 ### AWS Provider Version 5.60.0 ### Affected Resource(s) aws_security_group ### Relevant Error/Panic Output Snippet _No response_ ### Terraf...ewbankkit pushed 8 commits to main hashicorp/terraform-provider-aws
- Add 'TestAccVPCSecurityGroupRule_disappears'. fea98e3
- Acceptance test output: % make testacc TESTARGS='-run=TestAccVPCSecurityGroupRule_disappears' PKG=ec2 make: Verifyin... 82d2d93
- r/aws_security_group_rule: Return nil from 'findRuleMatch' if not found. 1dbea55
- Add CHANGELOG entry. 46187d7
- Correct CHANGELOG entry file name. 8a3a12a
- Fix 'TestAccVPCSecurityGroupRule_MultipleRuleSearching_allProtocolCrash'. df62156
- Fix 'TestAccVPCSecurityGroupRule_DescriptionAllPorts_nonZeroPorts'. 7eae043
- Merge pull request #39834 from hashicorp/b-aws_security_group_rule-disappears r/aws_security_group_rule: Remove from... bf33ca5
ewbankkit closed a pull request on hashicorp/terraform-provider-aws
r/aws_security_group_rule: Remove from state when rule not found
<!--- See what makes a good Pull Request at: https://hashicorp.github.io/terraform-provider-aws/raising-a-pull-request/ ---> ### Description <!--- Please provide a helpful description of what ...github-actions[bot] created a comment on an issue on hashicorp/terraform-provider-aws
> [!WARNING] > This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them. > > Ongoing conversations amongst...
mthmi created a comment on an issue on hashicorp/terraform-provider-aws
I found the issue and there is a circular dependency in the policy. This can be closed.
mthmi closed an issue on hashicorp/terraform-provider-aws
[Bug]: kms_key_id on cloudtrail resource causes cycle error
### Terraform Core Version 1.9.8 ### AWS Provider Version 5.72.1 ### Affected Resource(s) aws_cloudtrail ### Expected Behavior Cloudtrail gets created with KMS encryption enabled. ### Actua...github-actions[bot] created a comment on an issue on hashicorp/terraform-provider-aws
# Community Note **Voting for Prioritization** * Please vote on this issue by adding a 👍 [reaction](https://blog.github.com/2016-03-10-add-reactions-to-pull-requests-issues-and-comments/) to the ...
willgorman opened an issue on hashicorp/terraform-provider-aws
[Enhancement]: Option to skip iops validation for unknown ebs volume types
### Description The provider currently prevents `iops` from being set on volume types other than `io1`, `io2`, and `gp3`: https://github.com/hashicorp/terraform-provider-aws/blob/08b11917a71c8453d...lorengordon created a comment on an issue on hashicorp/terraform-provider-aws
Another candidate for exclusive attachments, I think, would be `aws_eks_access_policy_association`.
nam054 created a review on a pull request on hashicorp/terraform-provider-aws
LGTM 🚀 ``` > make testacc TESTARGS='-run=TestAccVPCSecurityGroupRule_' PKG=ec2 ACCTEST_PARALLELISM=4 make: Verifying source code with gofmt... ==> Checking that code complies with gofmt requi...
ewbankkit pushed 1 commit to td-isolate-aws-sdk-go-references hashicorp/terraform-provider-aws
- Fix yamllint '[new-line-at-end-of-file] no new line character at the end of file'. 399e75a
ewbankkit pushed 9 commits to td-isolate-aws-sdk-go-references hashicorp/terraform-provider-aws
- acctest: Remove use of 'github.com/hashicorp/aws-sdk-go-base/v2/awsv1shim/v2/tfawserr'. d4fc352
- Tweak 'time-equality' semgrep rule for AWS SDK for Go v2. e39e912
- Remove 'aws-api-context' semgrep rule -- n/a to AWS SDK for Go v2. 69627f5
- 'aws-go-sdk-error-code-helper' semgrep rule n/a to AWS SDK for Go v2. 7fb14d8
- Tweak go-sdk semgrep rules for AWS SDK for Go v2. e75dac5
- Add 'ci.semgrep.aws.aws-sdk-go-imports' semgrep rule. b5b7556
- Fix 'ci.semgrep.aws.aws-sdk-go-imports'. dc3b877
- Add 'ci.semgrep.aws.aws-sdk-go-base-awsv1shim-imports'. cf020a4
- Fix 'ci.semgrep.aws.aws-sdk-go-base-awsv1shim-imports'. ff9cc22