-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: add aws_verifiedpermissions_policy #35413
feat: add aws_verifiedpermissions_policy #35413
Conversation
Community NoteVoting for Prioritization
For Submitters
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @filol 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTOR guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
Hey, we're eagerly awaiting this. When will it be generally available (GA)? |
Is this ever going to get released? |
Guy's ? Update please.. we're wait for your PR |
Hi @johnsonaj, I'm glad to see some progress here. thanks.
What's the estimation roadmap for this feature? |
ff62242
to
ae7e9ef
Compare
Thank you for your contribution! 🚀 Please note that typically Go dependency changes are handled in this repository by dependabot or the maintainers. This is to prevent pull request merge conflicts and further delay reviews of contributions. Remove any changes to the Additional details:
|
% make sweep SWEEPARGS='-sweep-run=aws_verifiedpermissions_ -sweep-allow-failures'
# make sweep SWEEPARGS=-sweep-run=aws_example_thing
# set SWEEPARGS=-sweep-allow-failures to continue after first failure
WARNING: This will destroy infrastructure. Use only in development accounts.
go1.21.8 test ./internal/sweep -v -sweep=us-west-2,us-east-1,us-east-2,us-west-1 -sweep-run=aws_verifiedpermissions_ -sweep-allow-failures -timeout 360m
2024/04/16 14:02:04 [DEBUG] Running Sweepers for region (us-west-2):
2024/04/16 14:02:04 [DEBUG] Running Sweeper (aws_verifiedpermissions_policy_store) in region (us-west-2)
2024/04/16 14:02:04 [DEBUG] sweeper: Configuring Terraform AWS Provider: sweeper_region=us-west-2
2024-04-16T14:02:04.909-0500 [DEBUG] sweeper.aws-base: Resolving credentials provider: sweeper_region=us-west-2
2024-04-16T14:02:04.910-0500 [DEBUG] sweeper.aws-base: Using profile: tf_aws.profile.source=envvar sweeper_region=us-west-2 tf_aws.profile=default
2024-04-16T14:02:04.910-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-west-2
2024-04-16T14:02:04.911-0500 [DEBUG] sweeper.aws-base: Retrieving credentials: sweeper_region=us-west-2
2024-04-16T14:02:04.911-0500 [INFO] sweeper.aws-base: Retrieved credentials: sweeper_region=us-west-2 tf_aws.credentials_source="SharedConfigCredentials: /Users/adrianjohnson/.aws/credentials"
2024-04-16T14:02:04.911-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-west-2
2024/04/16 14:02:04 [DEBUG] sweeper: Creating AWS SDK v1 session: sweeper_region=us-west-2
2024/04/16 14:02:04 [DEBUG] sweeper: Retrieving AWS account details: sweeper_region=us-west-2
2024-04-16T14:02:04.912-0500 [DEBUG] sweeper.aws-base: Retrieving caller identity from STS: sweeper_region=us-west-2
2024-04-16T14:02:05.210-0500 [INFO] sweeper.aws-base: Retrieved caller identity from STS: sweeper_region=us-west-2
2024/04/16 14:02:05 [INFO] sweeper: No resources to sweep: sweeper_region=us-west-2
2024/04/16 14:02:05 [DEBUG] Completed Sweeper (aws_verifiedpermissions_policy_store) in region (us-west-2) in 622.552542ms
2024/04/16 14:02:05 Completed Sweepers for region (us-west-2) in 622.695292ms
2024/04/16 14:02:05 Sweeper Tests for region (us-west-2) ran successfully:
2024/04/16 14:02:05 - aws_verifiedpermissions_policy_store
2024/04/16 14:02:05 [DEBUG] Running Sweepers for region (us-east-1):
2024/04/16 14:02:05 [DEBUG] Running Sweeper (aws_verifiedpermissions_policy_store) in region (us-east-1)
2024/04/16 14:02:05 [DEBUG] sweeper: Configuring Terraform AWS Provider: sweeper_region=us-east-1
2024-04-16T14:02:05.531-0500 [DEBUG] sweeper.aws-base: Resolving credentials provider: sweeper_region=us-east-1
2024-04-16T14:02:05.531-0500 [DEBUG] sweeper.aws-base: Using profile: sweeper_region=us-east-1 tf_aws.profile=default tf_aws.profile.source=envvar
2024-04-16T14:02:05.531-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-east-1
2024-04-16T14:02:05.532-0500 [DEBUG] sweeper.aws-base: Retrieving credentials: sweeper_region=us-east-1
2024-04-16T14:02:05.532-0500 [INFO] sweeper.aws-base: Retrieved credentials: sweeper_region=us-east-1 tf_aws.credentials_source="SharedConfigCredentials: /Users/adrianjohnson/.aws/credentials"
2024-04-16T14:02:05.532-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-east-1
2024/04/16 14:02:05 [DEBUG] sweeper: Creating AWS SDK v1 session: sweeper_region=us-east-1
2024/04/16 14:02:05 [DEBUG] sweeper: Retrieving AWS account details: sweeper_region=us-east-1
2024-04-16T14:02:05.534-0500 [DEBUG] sweeper.aws-base: Retrieving caller identity from STS: sweeper_region=us-east-1
2024-04-16T14:02:05.747-0500 [INFO] sweeper.aws-base: Retrieved caller identity from STS: sweeper_region=us-east-1
2024/04/16 14:02:06 [INFO] sweeper: No resources to sweep: sweeper_region=us-east-1
2024/04/16 14:02:06 [DEBUG] Completed Sweeper (aws_verifiedpermissions_policy_store) in region (us-east-1) in 505.086916ms
2024/04/16 14:02:06 Completed Sweepers for region (us-east-1) in 505.156958ms
2024/04/16 14:02:06 Sweeper Tests for region (us-east-1) ran successfully:
2024/04/16 14:02:06 - aws_verifiedpermissions_policy_store
2024/04/16 14:02:06 [DEBUG] Running Sweepers for region (us-east-2):
2024/04/16 14:02:06 [DEBUG] Running Sweeper (aws_verifiedpermissions_policy_store) in region (us-east-2)
2024/04/16 14:02:06 [DEBUG] sweeper: Configuring Terraform AWS Provider: sweeper_region=us-east-2
2024-04-16T14:02:06.037-0500 [DEBUG] sweeper.aws-base: Resolving credentials provider: sweeper_region=us-east-2
2024-04-16T14:02:06.037-0500 [DEBUG] sweeper.aws-base: Using profile: tf_aws.profile=default tf_aws.profile.source=envvar sweeper_region=us-east-2
2024-04-16T14:02:06.037-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-east-2
2024-04-16T14:02:06.038-0500 [DEBUG] sweeper.aws-base: Retrieving credentials: sweeper_region=us-east-2
2024-04-16T14:02:06.038-0500 [INFO] sweeper.aws-base: Retrieved credentials: tf_aws.credentials_source="SharedConfigCredentials: /Users/adrianjohnson/.aws/credentials" sweeper_region=us-east-2
2024-04-16T14:02:06.038-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-east-2
2024/04/16 14:02:06 [DEBUG] sweeper: Creating AWS SDK v1 session: sweeper_region=us-east-2
2024/04/16 14:02:06 [DEBUG] sweeper: Retrieving AWS account details: sweeper_region=us-east-2
2024-04-16T14:02:06.040-0500 [DEBUG] sweeper.aws-base: Retrieving caller identity from STS: sweeper_region=us-east-2
2024-04-16T14:02:06.321-0500 [INFO] sweeper.aws-base: Retrieved caller identity from STS: sweeper_region=us-east-2
2024/04/16 14:02:06 [INFO] sweeper: No resources to sweep: sweeper_region=us-east-2
2024/04/16 14:02:06 [DEBUG] Completed Sweeper (aws_verifiedpermissions_policy_store) in region (us-east-2) in 487.411208ms
2024/04/16 14:02:06 Completed Sweepers for region (us-east-2) in 487.451833ms
2024/04/16 14:02:06 Sweeper Tests for region (us-east-2) ran successfully:
2024/04/16 14:02:06 - aws_verifiedpermissions_policy_store
2024/04/16 14:02:06 [DEBUG] Running Sweepers for region (us-west-1):
2024/04/16 14:02:06 [DEBUG] Running Sweeper (aws_verifiedpermissions_policy_store) in region (us-west-1)
2024/04/16 14:02:06 [DEBUG] sweeper: Configuring Terraform AWS Provider: sweeper_region=us-west-1
2024-04-16T14:02:06.524-0500 [DEBUG] sweeper.aws-base: Resolving credentials provider: sweeper_region=us-west-1
2024-04-16T14:02:06.524-0500 [DEBUG] sweeper.aws-base: Using profile: sweeper_region=us-west-1 tf_aws.profile=default tf_aws.profile.source=envvar
2024-04-16T14:02:06.524-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-west-1
2024-04-16T14:02:06.525-0500 [DEBUG] sweeper.aws-base: Retrieving credentials: sweeper_region=us-west-1
2024-04-16T14:02:06.525-0500 [INFO] sweeper.aws-base: Retrieved credentials: tf_aws.credentials_source="SharedConfigCredentials: /Users/adrianjohnson/.aws/credentials" sweeper_region=us-west-1
2024-04-16T14:02:06.526-0500 [DEBUG] sweeper.aws-base: Loading configuration: sweeper_region=us-west-1
2024/04/16 14:02:06 [DEBUG] sweeper: Creating AWS SDK v1 session: sweeper_region=us-west-1
2024/04/16 14:02:06 [DEBUG] sweeper: Retrieving AWS account details: sweeper_region=us-west-1
2024-04-16T14:02:06.527-0500 [DEBUG] sweeper.aws-base: Retrieving caller identity from STS: sweeper_region=us-west-1
2024-04-16T14:02:06.828-0500 [INFO] sweeper.aws-base: Retrieved caller identity from STS: sweeper_region=us-west-1
2024/04/16 14:02:07 [INFO] sweeper: No resources to sweep: sweeper_region=us-west-1
2024/04/16 14:02:07 [DEBUG] Completed Sweeper (aws_verifiedpermissions_policy_store) in region (us-west-1) in 550.828917ms
2024/04/16 14:02:07 Completed Sweepers for region (us-west-1) in 550.868292ms
2024/04/16 14:02:07 Sweeper Tests for region (us-west-1) ran successfully:
2024/04/16 14:02:07 - aws_verifiedpermissions_policy_store
ok github.com/hashicorp/terraform-provider-aws/internal/sweep 7.175s |
% make testacc TESTARGS='-run=TestAccVerifiedPermissionsPolicy_' PKG=verifiedpermissions
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go1.21.8 test ./internal/service/verifiedpermissions/... -v -count 1 -parallel 20 -run=TestAccVerifiedPermissionsPolicy_ -timeout 360m
--- PASS: TestAccVerifiedPermissionsPolicy_disappears (11.82s)
--- PASS: TestAccVerifiedPermissionsPolicy_basic (13.54s)
--- PASS: TestAccVerifiedPermissionsPolicy_templateLinked (14.70s)
--- PASS: TestAccVerifiedPermissionsPolicy_update (24.30s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/verifiedpermissions 29.577s |
c6c4a29
to
92be836
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀
@filol thank you for the contribution! 🎉 |
This functionality has been released in v5.47.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
Adding Verified Permission Policy
WIP - Need help
Relations
Relates #32158
Closes #35412
References
https://docs.aws.amazon.com/verifiedpermissions/latest/apireference/API_CreatePolicy.html
https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-verifiedpermissions-policy.html
Output from Acceptance Testing