constant diff from wafv2 with no changes
See original GitHub issueThe following wafv2 config…
portal_frontend_whitelist_ipset = aws.wafv2.IpSet(
f'portal-frontend-whitelist-{environment_name}',
opts=ResourceOptions(provider=aws_provider),
addresses=portal_frontend_whitelist,
ip_address_version='IPV4',
scope='REGIONAL',
tags={
'ResourceGroup': aws_resource_group_name
}
)
portal_frontend_acl = aws.wafv2.WebAcl(
f'portal-frontend-{environment_name}',
opts=ResourceOptions(provider=aws_provider),
scope='REGIONAL',
default_action={
'Block': {}
},
rules=[
WebAclRuleArgs(
name='AWS-AWSManagedRulesCommonRuleSet',
priority=1,
statement=WebAclRuleStatementArgs(
managed_rule_group_statement=WebAclRuleStatementManagedRuleGroupStatementArgs(
vendor_name='AWS',
name='AWSManagedRulesCommonRuleSet',
)
),
override_action=WebAclRuleOverrideActionArgs(
none=WebAclRuleOverrideActionNoneArgs()
),
visibility_config=WebAclRuleVisibilityConfigArgs(
sampled_requests_enabled=True,
cloudwatch_metrics_enabled=True,
metric_name='AWS-AWSManagedRulesCommonRuleSet',
)
),
WebAclRuleArgs(
name='portal_frontend_whitelist_ipset',
priority=2,
statement=WebAclRuleStatementArgs(
ip_set_reference_statement=WebAclRuleStatementIpSetReferenceStatementArgs(
arn=portal_frontend_whitelist_ipset.arn,
)
),
action=WebAclRuleActionArgs(
allow=WebAclRuleActionAllowArgs()
),
visibility_config=WebAclRuleVisibilityConfigArgs(
sampled_requests_enabled=True,
cloudwatch_metrics_enabled=True,
metric_name='portal_frontend_whitelist_ipset',
)
),
],
visibility_config={
'cloudwatchMetricsEnabled': True,
'metric_name': 'portal-frontend',
'sampledRequestsEnabled': True,
},
tags={
'ResourceGroup': aws_resource_group_name
},
)
produces this diff every time I run pulumi up. The update succeeds, with no changes as far as I can see.
pulumi:pulumi:Stack: (same)
[urn=urn:pulumi:portal.test1::portal::pulumi:pulumi:Stack::portal-portal.test1]
> pulumi:pulumi:StackReference: (read)
[id=acme/xxx/xxx.devx]
[urn=urn:pulumi:portal.test1::portal::pulumi:pulumi:StackReference::acme/xxx/xxx.devx]
name: "acme/xxx/xxx.devx"
~ aws:wafv2/webAcl:WebAcl: (update)
[id=xxx]
[urn=urn:pulumi:portal.test1::portal::aws:wafv2/webAcl:WebAcl::portal-frontend-test1]
[provider=urn:pulumi:portal.test1::portal::pulumi:providers:aws::aws_provider::xxxxx]
~ rules: [
~ [0]: {
+ name : "AWS-AWSManagedRulesCommonRuleSet"
+ priority : 1
~ statement : {
~ managedRuleGroupStatement: {
+ name : "AWSManagedRulesCommonRuleSet"
+ vendorName: "AWS"
}
}
~ visibilityConfig: {
+ cloudwatchMetricsEnabled: true
+ metricName : "AWS-AWSManagedRulesCommonRuleSet"
+ sampledRequestsEnabled : true
}
}
~ [1]: {
+ name : "portal_frontend_whitelist_ipset"
+ priority : 2
~ statement : {
~ ipSetReferenceStatement: {
+ arn: "arn:aws:wafv2:ap-southeast-2:111111111:regional/ipset/portal-frontend-whitelist-test1-072a323/xxxxxxxxx"
}
}
~ visibilityConfig: {
+ cloudwatchMetricsEnabled: true
+ metricName : "portal_frontend_whitelist_ipset"
+ sampledRequestsEnabled : true
}
}
]
requirements.txt
Package Version
----------------- ---------
Arpeggio 1.10.1
attrs 20.3.0
certifi 2020.11.8
chardet 3.0.4
dill 0.3.3
grpcio 1.33.2
idna 2.10
parver 0.3.1
pip 20.2.3
protobuf 3.14.0
pulumi 2.23.2
pulumi-aws 3.35.0
pulumi-kubernetes 2.8.4
pulumi-postgresql 2.8.1
pulumi-random 3.1.1
PyYAML 5.3.1
requests 2.25.0
semver 2.13.0
setuptools 49.2.1
six 1.15.0
urllib3 1.26.2
Issue Analytics
- State:
- Created 2 years ago
- Reactions:11
- Comments:19 (4 by maintainers)
Top Results From Across the Web
wafv2 - Amazon Web Services - Go SDK
WAF generates a response that it sends back to the client, which includes the following: The header x-amzn-waf-action with a value of captcha....
Read more >Different signatures for **wafv2.CfnWebACL** interface in aws ...
Because the documentation link in the question refers to aws-waf , and you're using aws-wafv2 , which is different.
Read more >wafv2 - Go Packages
* For regional applications, you can use any of the endpoints in the list. A regional application can be an Application Load Balancer...
Read more >Enhancing security and trust with AWS WAFv2
The end goal for any web application Firewall is to protect the application against: ... AWS WAF comes with two different versions:.
Read more >Protecting Your Web Application Using AWS Managed Rules ...
Maintaining and configuring your own set of security rules can be a challenge. With AWS WAF, you can now deploy AWS Managed Rules, ......
Read more >
Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start Free
Top Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Any news on this?
I can confirm we’re also seeing this internally at Pulumi. I tested 3 versions of pulumi-aws (ts) which all show the bug – 4.14, 4.28, and 5.9.2.
Sorry you’re running into this. It’s the kind of bug that degrades the usefulness of the CI integration, so it’s top of mind for me. If we always show the user “hey check this out!” when in reality nothing is changing, it’s less likely they’ll notice or care when something actually does change.