Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add ability to disable validation step for s3 backend kms_key_id #34763

Open
PeppaTheC opened this issue Mar 4, 2024 · 2 comments
Open

Add ability to disable validation step for s3 backend kms_key_id #34763

PeppaTheC opened this issue Mar 4, 2024 · 2 comments
Labels
backend/s3 enhancement new new issue not yet triaged

Comments

@PeppaTheC
Copy link

Terraform Version

1.7.3

Use Cases

Hi, we have our own s3 like storage to save terraform state.

  backend "s3" {
    endpoints = {
      s3 = "https://private.storage.net"
    }
    bucket   = "<BUCKET>"
    region   = "ua-central1"
    key      = "terraform.tfstate"

    skip_s3_checksum            = true
    skip_region_validation      = true
    skip_requesting_account_id  = true
    skip_credentials_validation = true

    encrypt = true
    access_key = "<KEY>"
    secret_key = "<SECRET>"
    kms_key_id = "<KEY_ID>"
  }

Starting from terraform version 1.6.0 there is a validation step for kms_key_id field, here.

And so, we have error

2024-02-19T18:36:52.200+0300 [INFO]  Terraform version: 1.7.3

| Error: Invalid KMS Key ID
| 
|   on provider.tf line 29, in terraform:
|   29:     kms_key_id = "****"
| 
| Value must be a valid KMS Key ID, got "****"

Attempted Solutions

There is no existing solution.

Proposal

Can we add new flag/parameter to s3 backend configuration to disable kms_key_id validation?

References

No response

@PeppaTheC PeppaTheC added enhancement new new issue not yet triaged labels Mar 4, 2024
@crw crw added the backend/s3 label Mar 4, 2024
@crw
Copy link
Collaborator

crw commented Mar 4, 2024

Thanks for this feature request! If you are viewing this issue and would like to indicate your interest, please use the 👍 reaction on the issue description to upvote this issue. We also welcome additional use case descriptions.

This issue would be handled by the AWS Provider team at HashiCorp, so the request has been put into their backlog.

Thanks again!

@opportunity356
Copy link

Hi! Any updates?

| Value must be a valid KMS Key ID, got "****"
For clarity, I'm adding the example of KMS Key ID: "abjl6mft1vop********"

In versions under 1.6.0 we had an ability to use alternative S3-like backends (for example Yandex Storage) and alternative KMS-like services (Yandex KMS)

But now it is impossible to use new versions of terraform with yandex provider in such scenarios according to this issue

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
backend/s3 enhancement new new issue not yet triaged
Projects
None yet
Development

No branches or pull requests

3 participants