-
-
Notifications
You must be signed in to change notification settings - Fork 337
fix: remove explicit aws_s3_bucket_acl #815
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix: remove explicit aws_s3_bucket_acl #815
Conversation
This resolves an issue related to the April 2023 S3 API changes. More info can be found here: hashicorp/terraform-provider-aws#28353 Closes cattle-ops#814
Hey @ryancausey! 👋 Thank you for your contribution to the project. Please refer to the contribution rules for a quick overview of the process. Make sure that this PR clearly explains:
With submitting this PR you confirm that you hold the rights of the code added and agree that it will published under this LICENSE. The following ChatOps commands are supported:
Simply add a comment with the command in the first line. If you need to pass more information, separate it with a blank line from the command. This message was generated automatically. You are welcome to improve it. |
/help lint PR title check failing with Error: Resource not accessible by integration |
Had this ACL problem in another repository as well. But it was a new S3 deployment. |
Yes, it seems specific to new instantiations of the module. |
@kayman-mk I tried this using It looks to me like the only place the I just wanted to confirm that I'm not missing something and that this isn't a side effect of removing the S3 bucket's private ACL resource. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for your contribution.
🤖 I have created a release *beep* *boop* --- ## [6.3.1](6.3.0...6.3.1) (2023-04-27) ### Bug Fixes * allow s3 cache access for the "docker" runner executor ([#817](#817)) ([a17015f](a17015f)) * remove explicit aws_s3_bucket_acl ([#815](#815)) ([5d88370](5d88370)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --------- Signed-off-by: Niek Palm <[email protected]> Co-authored-by: cattle-ops-releaser[bot] <126345536+cattle-ops-releaser[bot]@users.noreply.github.com> Co-authored-by: github-actions[bot] <github-actions[bot]@users.noreply.github.com>
This resolves an issue related to the April 2023 S3 API changes. More info can be found here: hashicorp/terraform-provider-aws#28353
Closes #814
Description
Remove the explicit private ACL that leads to an error during the apply phase as with the new security defaults, it should no longer be needed. I'm not 100% on the implications of removing this resource for existing deployments, so if that's a concern we can go the route of adding the explicit
aws_s3_bucket_ownership_controls
resource as per the related issue.Migrations required
NO
Verification