Skip to content

Commit b3a4c70

Browse files
committed
fix: Add ForceNew to destroy_on_drift and selected_repository_ids fields
1 parent d26774d commit b3a4c70

File tree

2 files changed

+7
-3
lines changed

2 files changed

+7
-3
lines changed

github/resource_github_actions_organization_secret.go

Lines changed: 6 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ func resourceGithubActionsOrganizationSecret() *schema.Resource {
7171
},
7272
Set: schema.HashInt,
7373
Optional: true,
74+
ForceNew: true,
7475
Description: "An array of repository ids that can access the organization secret.",
7576
},
7677
"created_at": {
@@ -84,9 +85,11 @@ func resourceGithubActionsOrganizationSecret() *schema.Resource {
8485
Description: "Date of 'actions_secret' update.",
8586
},
8687
"destroy_on_drift": {
87-
Type: schema.TypeBool,
88-
Default: true,
89-
Optional: true,
88+
Type: schema.TypeBool,
89+
Default: true,
90+
Optional: true,
91+
ForceNew: true,
92+
Description: "Boolean indicating whether to recreate the secret if it's modified outside of Terraform. When `true` (default), Terraform will delete and recreate the secret if it detects external changes. When `false`, Terraform will acknowledge external changes but not recreate the secret.",
9093
},
9194
},
9295
}

github/resource_github_actions_secret.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -72,6 +72,7 @@ func resourceGithubActionsSecret() *schema.Resource {
7272
Type: schema.TypeBool,
7373
Default: true,
7474
Optional: true,
75+
ForceNew: true,
7576
Description: "Boolean indicating whether to recreate the secret if it's modified outside of Terraform. When `true` (default), Terraform will delete and recreate the secret if it detects external changes. When `false`, Terraform will acknowledge external changes but not recreate the secret.",
7677
},
7778
},

0 commit comments

Comments
 (0)