-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for MSK IAM client authentication #19404
Add support for MSK IAM client authentication #19404
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @hcourse-nydig 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
Struggling to get one of the acceptance tests to pass, specifically Otherwise I think this is pretty close to being ready to go. |
Tests passing, all ready for review. |
385cf66
to
8734407
Compare
Needs documentation updates 😄. |
Want me to have a go? Apologies missed docs and changelog updates. Update: Docs updated. |
024d630
to
9e2fecf
Compare
If everything in place, can someone merge it please. We are planning to use this feature. |
9e2fecf
to
e56aaf1
Compare
I apologize for the delay. Several of the acceptance tests are failing. Although the failures seem unrelated to these changes, we want to make sure. Also, the acceptance tests take a very long time to run. |
Ah, I only ran the ones in the comment. Let me know which are failing and I can take a look. |
Thanks @hcourse-nydig ! Make sure to pull my latest changes if you push anything to your branch! I've fixed the import verify issues. It looks like on commercial, AWS sometimes tweaks the version slightly (probably giving a minor or point version upgrade) so the import verify for However, the Currently, everything is passing in GovCloud but not in commercial. (Usually it's the other way around.) GovCloud:
Commercial run (
|
07ff77a
to
d3fb93d
Compare
TL;DR: I increased the create timeout to 2 hours and am ignoring |
Note: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Besides the issue at hand (IAM client auth), we managed to fix some acceptance test issues and set timeouts to a better length. Looks great! 🎉
Output of acceptance tests (GovCloud):
--- PASS: TestAccAWSMskCluster_Tags (1491.89s)
--- PASS: TestAccAWSMskCluster_basic (1492.61s)
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionAtRestKmsKeyArn (1493.69s)
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionInTransit_ClientBroker (1496.32s)
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionInTransit_InCluster (1500.44s)
--- PASS: TestAccAWSMskCluster_EnhancedMonitoring (1505.85s)
--- PASS: TestAccAWSMskCluster_BrokerNodeGroupInfo_EbsVolumeSize (1607.35s)
--- PASS: TestAccAWSMskCluster_OpenMonitoring (1612.29s)
--- PASS: TestAccAWSMskCluster_LoggingInfo (1639.14s)
--- PASS: TestAccAWSMskCluster_NumberOfBrokerNodes (1986.12s)
--- PASS: TestAccAWSMskCluster_ConfigurationInfo_Revision (1996.89s)
--- PASS: TestAccAWSMskCluster_ClientAuthentication_Sasl_Scram (2900.72s)
--- PASS: TestAccAWSMskCluster_KafkaVersionDowngrade (2911.52s)
--- PASS: TestAccAWSMskCluster_ClientAuthentication_Sasl_Iam (2920.55s)
--- PASS: TestAccAWSMskCluster_KafkaVersionUpgrade (3580.18s)
--- PASS: TestAccAWSMskCluster_KafkaVersionUpgradeWithConfigurationInfo (3584.98s)
--- PASS: TestAccAWSMskCluster_BrokerNodeGroupInfo_InstanceType (3959.66s)
Output of acceptance tests (us-west-2
):
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionInTransit_ClientBroker (1696.48s)
--- PASS: TestAccAWSMskCluster_basic (1700.72s)
--- PASS: TestAccAWSMskCluster_Tags (1727.76s)
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionInTransit_InCluster (1728.05s)
--- PASS: TestAccAWSMskCluster_EncryptionInfo_EncryptionAtRestKmsKeyArn (1738.26s)
--- PASS: TestAccAWSMskCluster_EnhancedMonitoring (1806.86s)
--- PASS: TestAccAWSMskCluster_OpenMonitoring (1937.45s)
--- PASS: TestAccAWSMskCluster_BrokerNodeGroupInfo_EbsVolumeSize (1941.49s)
--- PASS: TestAccAWSMskCluster_LoggingInfo (1969.42s)
--- PASS: TestAccAWSMskCluster_ConfigurationInfo_Revision (2417.66s)
--- PASS: TestAccAWSMskCluster_NumberOfBrokerNodes (3989.85s)
--- PASS: TestAccAWSMskCluster_ClientAuthentication_Sasl_Scram (4000.16s)
--- PASS: TestAccAWSMskCluster_ClientAuthentication_Sasl_Iam (4000.16s)
--- PASS: TestAccAWSMskCluster_KafkaVersionDowngrade (4000.91s)
--- PASS: TestAccAWSMskCluster_KafkaVersionUpgradeWithConfigurationInfo (5929.39s)
--- PASS: TestAccAWSMskCluster_KafkaVersionUpgrade (5988.22s)
--- PASS: TestAccAWSMskCluster_BrokerNodeGroupInfo_InstanceType (6581.33s)
Thanks for getting into that. I ran out of time yesterday so really appreciate you doing that. |
This has been released in version 3.43.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
Resolves #19295.
Affects
aws_msk_cluster
resourceThis PR adds support for the
iam
SASL client authentication configuration. Go is not my forté so I could really do with someone experienced in Go/writing providers to have a look over this. Thanks.Output from acceptance testing: