-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tech Debt: Replace Hardcoded Testing us-east-1 Provider Configurations With Aliased Provider Configuration #8316
Comments
While the above handling works well for the ACM certificate resource handling, after further investigation of some of the testing, using |
@bflad I'm looking at cleaning up the
Would something like func TestAccAWSInstance_inEc2Classic(t *testing.T) {
key := "EC2_CLASSIC_REGION"
ec2ClassicRegion := os.Getenv(key)
if ec2ClassicRegion == "" {
t.Skipf("%s must be set to run EC2-Classic acceptance tests", key)
}
oldvar := os.Getenv("AWS_DEFAULT_REGION")
os.Setenv("AWS_DEFAULT_REGION", ec2ClassicRegion)
defer os.Setenv("AWS_DEFAULT_REGION", oldvar) $ make testacc TEST=./aws/ TESTARGS='-run=TestAccAWSInstance_inEc2Classic'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws/ -v -count 1 -parallel 20 -run=TestAccAWSInstance_inEc2Classic -timeout 120m
=== RUN TestAccAWSInstance_inEc2Classic
--- SKIP: TestAccAWSInstance_inEc2Classic (0.00s)
resource_aws_instance_test.go:205: EC2_CLASSIC_REGION must be set to run EC2-Classic acceptance tests
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 0.084s
$ EC2_CLASSIC_REGION=us-east-1 make testacc TEST=./aws/ TESTARGS='-run=TestAccAWSInstance_inEc2Classic'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws/ -v -count 1 -parallel 20 -run=TestAccAWSInstance_inEc2Classic -timeout 120m
=== RUN TestAccAWSInstance_inEc2Classic
=== PAUSE TestAccAWSInstance_inEc2Classic
=== CONT TestAccAWSInstance_inEc2Classic
--- PASS: TestAccAWSInstance_inEc2Classic (17.92s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 18.026s be what you were thinking of? In all (2) of the acceptance tests that I looked at so far simply adding a PreCheck: func() {
testAccPreCheck(t)
testAccEC2ClassicPreCheck(t)
}, seems sufficient, resulting in a skipped test like
if a region doesn't support EC2-Classic. |
Addressed for |
…lt region environment variable and better document existing provider initialization Reference: #8316 Reference: #15737 Reference: #15791 Output from acceptance testing in AWS Commercial (DynamoDB to verify existing testAccProviderFactories handling): ``` --- PASS: TestAccAWSDynamoDbTable_Replica_Single (274.15s) --- PASS: TestAccAWSRedshiftSecurityGroup_basic (10.87s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressCidr (10.88s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (12.45s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (24.07s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (27.14s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_basic (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_ingressCidr (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (2.50s) ```
Reference: #8316 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAwsCurReportDefinition_refresh (13.35s) --- PASS: TestAccAwsCurReportDefinition_overwrite (13.53s) --- PASS: TestAccAwsCurReportDefinition_athena (13.55s) --- PASS: TestAccAwsCurReportDefinition_basic (13.56s) --- PASS: TestAccAwsCurReportDefinition_textOrCsv (13.77s) --- PASS: TestAccAwsCurReportDefinition_parquet (13.83s) --- PASS: TestAccDataSourceAwsCurReportDefinition_additional (15.71s) --- PASS: TestAccDataSourceAwsCurReportDefinition_basic (16.05s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAwsCurReportDefinition_refresh (1.22s) --- SKIP: TestAccAwsCurReportDefinition_athena (1.22s) --- SKIP: TestAccAwsCurReportDefinition_basic (1.23s) --- SKIP: TestAccAwsCurReportDefinition_textOrCsv (1.23s) --- SKIP: TestAccAwsCurReportDefinition_overwrite (1.24s) --- SKIP: TestAccAwsCurReportDefinition_parquet (1.25s) ```
…nvironment variable overwrite (CUR and EC2-Classic) (#15803) * tests/provider: Prepare EC2-Classic handling to remove reseting default region environment variable and better document existing provider initialization Reference: #8316 Reference: #15737 Reference: #15791 Output from acceptance testing in AWS Commercial (DynamoDB to verify existing testAccProviderFactories handling): ``` --- PASS: TestAccAWSDynamoDbTable_Replica_Single (274.15s) --- PASS: TestAccAWSRedshiftSecurityGroup_basic (10.87s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressCidr (10.88s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (12.45s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (24.07s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (27.14s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_basic (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_ingressCidr (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (2.50s) --- SKIP: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (2.50s) ``` * tests/service/costandusagereporting: Migrate to automatic region lookup Reference: #8316 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAwsCurReportDefinition_refresh (13.35s) --- PASS: TestAccAwsCurReportDefinition_overwrite (13.53s) --- PASS: TestAccAwsCurReportDefinition_athena (13.55s) --- PASS: TestAccAwsCurReportDefinition_basic (13.56s) --- PASS: TestAccAwsCurReportDefinition_textOrCsv (13.77s) --- PASS: TestAccAwsCurReportDefinition_parquet (13.83s) --- PASS: TestAccDataSourceAwsCurReportDefinition_additional (15.71s) --- PASS: TestAccDataSourceAwsCurReportDefinition_basic (16.05s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAwsCurReportDefinition_refresh (1.22s) --- SKIP: TestAccAwsCurReportDefinition_athena (1.22s) --- SKIP: TestAccAwsCurReportDefinition_basic (1.23s) --- SKIP: TestAccAwsCurReportDefinition_textOrCsv (1.23s) --- SKIP: TestAccAwsCurReportDefinition_overwrite (1.24s) --- SKIP: TestAccAwsCurReportDefinition_parquet (1.25s) ``` * tests/service/cur: Ensure DescribeReportDefinitions call is in PreCheck Output from acceptance testing in AWS Commercial ("main" testing account -- Organizations member account): ``` === CONT TestAccAwsCurReportDefinition_basic cur_test.go:66: skipping acceptance testing: AccessDeniedException: accountId: --OMITTED-- is not authorized to callDescribeReportDefinitions. Note: linked account is not allowed to modify report preference. status code: 400, request id: 6e513d8a-4ff8-4af2-a4d3-7523dacb2dbb --- SKIP: TestAccAwsCurReportDefinition_basic (2.42s) ``` Output from acceptance testing in AWS Commercial (standalone account): ``` --- PASS: TestAccAwsCurReportDefinition_basic (13.76s) ``` Output from acceptance testing in AWS GovCloud (US): ``` === CONT TestAccAwsCurReportDefinition_basic provider_test.go:602: skipping tests; partition aws-us-gov does not support cur service --- SKIP: TestAccAwsCurReportDefinition_basic (1.37s) ```
…etup and PreCheck functions Reference: #8316 Reference: #15737 Reference: #15791 This creates the remaining special `ProviderFactories` functions (as they need to exist currently), updates the Contributing Guide documentation, and migrates a portion of the tests over to them. Further changesets will continue these efforts by: * Migrating the rest of the `awsalternate` provider test configurations to `testAccProviderFactoriesAlternate()` * Migrating the rest of the `testAccMultipleRegionsPreCheck()` and `testAccAlternateRegionPreCheck()` usage to `testAccMultipleRegionPreCheck()` (bundling with the above as its fairly common together) * Flipping `testAccProviderFactories` to a variable with only the `aws` provider and replacing `testAccProviderFactoriesEc2Classic` and `testAccProviderFactoriesCur()` * Continuing efforts to remove environment variable handling in test functions Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAwsBackupPlan_Rule_CopyAction_CrossRegion (20.85s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (157.90s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (157.61s) --- FAIL: TestAccAWSDBInstance_DbSubnetGroupName_RamShared (18.95s) resource_aws_db_instance_test.go:352: Step 1/1 error: Error running apply: 2020/10/27 23:13:26 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName_RamShared (604.80s) resource_aws_db_instance_test.go:808: Step 1/1 error: Error running apply: 2020/10/27 21:59:55 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSDBInstance_SnapshotIdentifier_DbSubnetGroupName_RamShared (615.89s) resource_aws_db_instance_test.go:1437: Step 1/1 error: Error running apply: 2020/10/27 23:13:26 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- PASS: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName (2252.27s) --- PASS: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName_VpcSecurityGroupIds (1908.33s) --- PASS: TestAccAWSDynamoDbTable_Replica_Multiple (766.22s) --- PASS: TestAccAWSDynamoDbTable_Replica_Single (412.01s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_basic (376.21s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_differentAccount (360.55s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_disappears (363.16s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_Tags_sameAccount (365.29s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_basic_differentAccount (780.52s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_basic_sameAccount (773.52s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_Tags_sameAccount (815.32s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Filter_differentAccount (389.30s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Filter_sameAccount (397.06s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_ID_differentAccount (333.33s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_ID_sameAccount (333.84s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Tags (332.99s) --- PASS: TestAccAWSProvider_AssumeRole_Empty (16.67s) --- PASS: TestAccAWSProvider_Endpoints (14.28s) --- PASS: TestAccAWSProvider_IgnoreTags_EmptyConfigurationBlock (14.21s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_Multiple (14.15s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_None (14.28s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_One (14.05s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_Multiple (14.11s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_None (14.19s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_One (14.31s) --- PASS: TestAccAWSProvider_Region_AwsChina (11.20s) --- PASS: TestAccAWSProvider_Region_AwsCommercial (11.54s) --- PASS: TestAccAWSProvider_Region_AwsGovCloudUs (11.22s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- PASS: TestAccAwsBackupPlan_Rule_CopyAction_CrossRegion (24.77s) --- SKIP: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (1.52s) --- SKIP: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (1.55s) ```
…etup and PreCheck functions (#15877) Reference: #8316 Reference: #15737 Reference: #15791 This creates the remaining special `ProviderFactories` functions (as they need to exist currently), updates the Contributing Guide documentation, and migrates a portion of the tests over to them. Further changesets will continue these efforts by: * Migrating the rest of the `awsalternate` provider test configurations to `testAccProviderFactoriesAlternate()` * Migrating the rest of the `testAccMultipleRegionsPreCheck()` and `testAccAlternateRegionPreCheck()` usage to `testAccMultipleRegionPreCheck()` (bundling with the above as its fairly common together) * Flipping `testAccProviderFactories` to a variable with only the `aws` provider and replacing `testAccProviderFactoriesEc2Classic` and `testAccProviderFactoriesCur()` * Continuing efforts to remove environment variable handling in test functions Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAwsBackupPlan_Rule_CopyAction_CrossRegion (20.85s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (157.90s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (157.61s) --- FAIL: TestAccAWSDBInstance_DbSubnetGroupName_RamShared (18.95s) resource_aws_db_instance_test.go:352: Step 1/1 error: Error running apply: 2020/10/27 23:13:26 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName_RamShared (604.80s) resource_aws_db_instance_test.go:808: Step 1/1 error: Error running apply: 2020/10/27 21:59:55 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSDBInstance_SnapshotIdentifier_DbSubnetGroupName_RamShared (615.89s) resource_aws_db_instance_test.go:1437: Step 1/1 error: Error running apply: 2020/10/27 23:13:26 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: error associating RAM Resource Share: InvalidParameterException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- PASS: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName (2252.27s) --- PASS: TestAccAWSDBInstance_ReplicateSourceDb_DbSubnetGroupName_VpcSecurityGroupIds (1908.33s) --- PASS: TestAccAWSDynamoDbTable_Replica_Multiple (766.22s) --- PASS: TestAccAWSDynamoDbTable_Replica_Single (412.01s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_basic (376.21s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_differentAccount (360.55s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_disappears (363.16s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachment_Tags_sameAccount (365.29s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_basic_differentAccount (780.52s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_basic_sameAccount (773.52s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentAccepter_Tags_sameAccount (815.32s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Filter_differentAccount (389.30s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Filter_sameAccount (397.06s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_ID_differentAccount (333.33s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_ID_sameAccount (333.84s) --- PASS: TestAccAWSEc2TransitGatewayPeeringAttachmentDataSource_Tags (332.99s) --- PASS: TestAccAWSProvider_AssumeRole_Empty (16.67s) --- PASS: TestAccAWSProvider_Endpoints (14.28s) --- PASS: TestAccAWSProvider_IgnoreTags_EmptyConfigurationBlock (14.21s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_Multiple (14.15s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_None (14.28s) --- PASS: TestAccAWSProvider_IgnoreTags_KeyPrefixes_One (14.05s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_Multiple (14.11s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_None (14.19s) --- PASS: TestAccAWSProvider_IgnoreTags_Keys_One (14.31s) --- PASS: TestAccAWSProvider_Region_AwsChina (11.20s) --- PASS: TestAccAWSProvider_Region_AwsCommercial (11.54s) --- PASS: TestAccAWSProvider_Region_AwsGovCloudUs (11.22s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- PASS: TestAccAwsBackupPlan_Rule_CopyAction_CrossRegion (24.77s) --- SKIP: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (1.52s) --- SKIP: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (1.55s) ```
…refactor testAccProviderFactories for broad usage Reference: #8316 Reference: #15737 Reference: #15791 This change set continues the work of #15877, bringing a consistent pattern for cross-region and cross-account testing and removing previously deprecated provider-level test functions. The `testAccProviderFactories` global variable is now generically for every test that only requires a single provider and prevents the previous issues where extraneous gRPC plugins were extraneously created (sometimes causing `ulimit` issues, but broadly a performance fix to remove them). This also removes the temporary `testAccProviderFactoriesCur()` and `testAccProviderFactoriesEc2Classic()` functions, since anything only requiring a single provider can use `ProviderFactories: testAccProviderFactories` or `Providers: testAccProviders` (for now, its deprecated in the SDK and we'll be updating these everywhere to `ProviderFactories` anyways). This should mean that other existing EC2-Classic and special service region testing should not require changes to that particular field in future change sets that continue this effort. After this, we are off to the races to remove the problematic environment variable handling causing issues across the provider acceptance testing. Output from acceptance testing (CUR testing done in standalone account): ``` --- PASS: TestAccDataSourceAwsCurReportDefinition_additional (21.63s) --- PASS: TestAccDataSourceAwsCurReportDefinition_basic (18.93s) --- PASS: TestAccDataSourceAwsRoute53ResolverRule_basic (59.47s) --- PASS: TestAccDataSourceAwsRoute53ResolverRule_ResolverEndpointIdWithTags (265.34s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (158.62s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (159.67s) --- PASS: TestAccAWSCodePipeline_multiregion_basic (37.37s) --- PASS: TestAccAWSCodePipeline_multiregion_Update (58.07s) --- PASS: TestAccAWSCodePipeline_multiregion_ConvertSingleRegion (81.33s) --- PASS: TestAccAwsCurReportDefinition_athena (18.30s) --- PASS: TestAccAwsCurReportDefinition_basic (23.58s) --- PASS: TestAccAwsCurReportDefinition_overwrite (18.10s) --- PASS: TestAccAwsCurReportDefinition_parquet (18.67s) --- PASS: TestAccAwsCurReportDefinition_refresh (21.62s) --- PASS: TestAccAwsCurReportDefinition_textOrCsv (21.45s) --- PASS: TestAccAWSDbSubnetGroupDataSource_basic (66.22s) --- PASS: TestAccAWSDbSubnetGroupDataSource_nonexistent (3.06s) --- PASS: TestAccAwsDxGatewayAssociation_allowedPrefixesVpnGatewayCrossAccount (1998.47s) --- PASS: TestAccAwsDxGatewayAssociation_allowedPrefixesVpnGatewaySingleAccount (1957.89s) --- PASS: TestAccAwsDxGatewayAssociation_basicTransitGatewayCrossAccount (865.40s) --- PASS: TestAccAwsDxGatewayAssociation_basicTransitGatewaySingleAccount (1186.07s) --- PASS: TestAccAwsDxGatewayAssociation_basicVpnGatewayCrossAccount (1530.51s) --- PASS: TestAccAwsDxGatewayAssociation_basicVpnGatewaySingleAccount (1633.65s) --- PASS: TestAccAwsDxGatewayAssociation_multiVpnGatewaysSingleAccount (1697.33s) --- PASS: TestAccAwsDxGatewayAssociation_V0StateUpgrade (1187.97s) --- PASS: TestAccAwsDxGatewayAssociationProposal_AllowedPrefixes (138.31s) --- PASS: TestAccAwsDxGatewayAssociationProposal_basicTransitGateway (227.10s) --- PASS: TestAccAwsDxGatewayAssociationProposal_basicVpnGateway (68.42s) --- PASS: TestAccAwsDxGatewayAssociationProposal_disappears (64.49s) --- SKIP: TestAccAwsDxHostedPrivateVirtualInterface_AccepterTags (0.00s) --- SKIP: TestAccAwsDxHostedPrivateVirtualInterface_basic (0.00s) --- SKIP: TestAccAwsDxHostedPublicVirtualInterface_AccepterTags (0.00s) --- SKIP: TestAccAwsDxHostedPublicVirtualInterface_basic (0.00s) --- PASS: TestAccAwsDxHostedTransitVirtualInterface_serial (0.00s) --- SKIP: TestAccAwsDxHostedTransitVirtualInterface_serial/accepterTags (0.00s) --- SKIP: TestAccAwsDxHostedTransitVirtualInterface_serial/basic (0.00s) --- PASS: TestAccAWSDynamoDbGlobalTable_basic (84.93s) --- PASS: TestAccAWSDynamoDbGlobalTable_multipleRegions (102.52s) --- PASS: TestAccAWSEbsSnapshotCopy_withRegions (75.67s) --- PASS: TestAccAwsRamResourceShareAccepter_basic (36.70s) --- PASS: TestAccAWSRDSCluster_GlobalClusterIdentifier_PrimarySecondaryClusters (1969.60s) --- PASS: TestAccAWSRDSCluster_GlobalClusterIdentifier_ReplicationSourceIdentifier (1819.35s) --- PASS: TestAccAWSRDSCluster_ReplicationSourceIdentifier_KmsKeyId (1691.11s) --- PASS: TestAccAWSRedshiftCluster_snapshotCopy (631.18s) --- PASS: TestAccAWSRedshiftSecurityGroup_basic (11.11s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressCidr (11.10s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (12.47s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (23.94s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (27.22s) --- PASS: TestAccAWSRoute53VpcAssociationAuthorization_basic (99.00s) --- PASS: TestAccAWSRoute53VpcAssociationAuthorization_disappears (94.43s) --- PASS: TestAccAWSRoute53ZoneAssociation_CrossAccount (124.58s) --- PASS: TestAccAWSRoute53ZoneAssociation_CrossRegion (157.69s) --- PASS: TestAccAWSS3Bucket_Replication (145.26s) --- PASS: TestAccAWSS3Bucket_ReplicationConfiguration_Rule_Destination_AccessControlTranslation (86.49s) --- PASS: TestAccAWSS3Bucket_ReplicationConfiguration_Rule_Destination_AddAccessControlTranslation (84.75s) --- PASS: TestAccAWSS3Bucket_ReplicationExpectVersioningValidationError (22.79s) --- PASS: TestAccAWSS3Bucket_ReplicationSchemaV2 (174.11s) --- PASS: TestAccAWSS3Bucket_ReplicationWithoutPrefix (65.38s) --- PASS: TestAccAWSS3Bucket_ReplicationWithoutStorageClass (85.05s) --- PASS: TestAccAWSS3Bucket_SameRegionReplicationSchemaV2 (73.58s) --- PASS: TestAccAWSSubnet_ignoreTags (86.24s) --- PASS: TestAccAWSVPCPeeringConnection_accept (144.21s) --- PASS: TestAccAWSVPCPeeringConnection_basic (65.98s) --- PASS: TestAccAWSVPCPeeringConnection_failedState (12.38s) --- PASS: TestAccAWSVPCPeeringConnection_options (117.22s) --- PASS: TestAccAWSVPCPeeringConnection_optionsNoAutoAccept (29.07s) --- PASS: TestAccAWSVPCPeeringConnection_peerRegionAutoAccept (29.13s) --- PASS: TestAccAWSVPCPeeringConnection_plan (52.19s) --- PASS: TestAccAWSVPCPeeringConnection_region (70.00s) --- PASS: TestAccAWSVPCPeeringConnection_tags (150.89s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_differentRegionDifferentAccount (68.06s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_differentRegionSameAccount (83.92s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_sameRegionDifferentAccount (64.85s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_sameRegionSameAccount (56.44s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_basic (70.42s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_differentRegionSameAccount (75.28s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_sameRegionDifferentAccount (41.96s) --- FAIL: TestAccDataSourceAwsRoute53ResolverRule_SharedByMe (227.22s) --- FAIL: TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe (228.00s) data_source_aws_route53_resolver_rule_test.go:101: Step 1/1 error: Error running apply: 2020/10/28 22:02:11 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachment_SharedTransitGateway (221.84s) resource_aws_ec2_transit_gateway_vpc_attachment_test.go:215: Step 1/2 error: Error running apply: 2020/10/28 22:02:10 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_Tags (201.45s) --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_TransitGatewayDefaultRouteTableAssociationAndPropagation (211.45s) --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_basic (221.42s) resource_aws_ec2_transit_gateway_vpc_attachment_accepter_test.go:135: Step 1/4 error: Error running apply: 2020/10/28 22:02:11 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: error associating RAM Resource Share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: Error associating principal with RAM resource share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. ```
…refactor testAccProviderFactories for broad usage (#15904) Reference: #8316 Reference: #15737 Reference: #15791 This change set continues the work of #15877, bringing a consistent pattern for cross-region and cross-account testing and removing previously deprecated provider-level test functions. The `testAccProviderFactories` global variable is now generically for every test that only requires a single provider and prevents the previous issues where extraneous gRPC plugins were extraneously created (sometimes causing `ulimit` issues, but broadly a performance fix to remove them). This also removes the temporary `testAccProviderFactoriesCur()` and `testAccProviderFactoriesEc2Classic()` functions, since anything only requiring a single provider can use `ProviderFactories: testAccProviderFactories` or `Providers: testAccProviders` (for now, its deprecated in the SDK and we'll be updating these everywhere to `ProviderFactories` anyways). This should mean that other existing EC2-Classic and special service region testing should not require changes to that particular field in future change sets that continue this effort. After this, we are off to the races to remove the problematic environment variable handling causing issues across the provider acceptance testing. Output from acceptance testing (CUR testing done in standalone account): ``` --- PASS: TestAccDataSourceAwsCurReportDefinition_additional (21.63s) --- PASS: TestAccDataSourceAwsCurReportDefinition_basic (18.93s) --- PASS: TestAccDataSourceAwsRoute53ResolverRule_basic (59.47s) --- PASS: TestAccDataSourceAwsRoute53ResolverRule_ResolverEndpointIdWithTags (265.34s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn (158.62s) --- PASS: TestAccAWSCloudFrontDistribution_ViewerCertificate_AcmCertificateArn_ConflictsWithCloudFrontDefaultCertificate (159.67s) --- PASS: TestAccAWSCodePipeline_multiregion_basic (37.37s) --- PASS: TestAccAWSCodePipeline_multiregion_Update (58.07s) --- PASS: TestAccAWSCodePipeline_multiregion_ConvertSingleRegion (81.33s) --- PASS: TestAccAwsCurReportDefinition_athena (18.30s) --- PASS: TestAccAwsCurReportDefinition_basic (23.58s) --- PASS: TestAccAwsCurReportDefinition_overwrite (18.10s) --- PASS: TestAccAwsCurReportDefinition_parquet (18.67s) --- PASS: TestAccAwsCurReportDefinition_refresh (21.62s) --- PASS: TestAccAwsCurReportDefinition_textOrCsv (21.45s) --- PASS: TestAccAWSDbSubnetGroupDataSource_basic (66.22s) --- PASS: TestAccAWSDbSubnetGroupDataSource_nonexistent (3.06s) --- PASS: TestAccAwsDxGatewayAssociation_allowedPrefixesVpnGatewayCrossAccount (1998.47s) --- PASS: TestAccAwsDxGatewayAssociation_allowedPrefixesVpnGatewaySingleAccount (1957.89s) --- PASS: TestAccAwsDxGatewayAssociation_basicTransitGatewayCrossAccount (865.40s) --- PASS: TestAccAwsDxGatewayAssociation_basicTransitGatewaySingleAccount (1186.07s) --- PASS: TestAccAwsDxGatewayAssociation_basicVpnGatewayCrossAccount (1530.51s) --- PASS: TestAccAwsDxGatewayAssociation_basicVpnGatewaySingleAccount (1633.65s) --- PASS: TestAccAwsDxGatewayAssociation_multiVpnGatewaysSingleAccount (1697.33s) --- PASS: TestAccAwsDxGatewayAssociation_V0StateUpgrade (1187.97s) --- PASS: TestAccAwsDxGatewayAssociationProposal_AllowedPrefixes (138.31s) --- PASS: TestAccAwsDxGatewayAssociationProposal_basicTransitGateway (227.10s) --- PASS: TestAccAwsDxGatewayAssociationProposal_basicVpnGateway (68.42s) --- PASS: TestAccAwsDxGatewayAssociationProposal_disappears (64.49s) --- SKIP: TestAccAwsDxHostedPrivateVirtualInterface_AccepterTags (0.00s) --- SKIP: TestAccAwsDxHostedPrivateVirtualInterface_basic (0.00s) --- SKIP: TestAccAwsDxHostedPublicVirtualInterface_AccepterTags (0.00s) --- SKIP: TestAccAwsDxHostedPublicVirtualInterface_basic (0.00s) --- PASS: TestAccAwsDxHostedTransitVirtualInterface_serial (0.00s) --- SKIP: TestAccAwsDxHostedTransitVirtualInterface_serial/accepterTags (0.00s) --- SKIP: TestAccAwsDxHostedTransitVirtualInterface_serial/basic (0.00s) --- PASS: TestAccAWSDynamoDbGlobalTable_basic (84.93s) --- PASS: TestAccAWSDynamoDbGlobalTable_multipleRegions (102.52s) --- PASS: TestAccAWSEbsSnapshotCopy_withRegions (75.67s) --- PASS: TestAccAwsRamResourceShareAccepter_basic (36.70s) --- PASS: TestAccAWSRDSCluster_GlobalClusterIdentifier_PrimarySecondaryClusters (1969.60s) --- PASS: TestAccAWSRDSCluster_GlobalClusterIdentifier_ReplicationSourceIdentifier (1819.35s) --- PASS: TestAccAWSRDSCluster_ReplicationSourceIdentifier_KmsKeyId (1691.11s) --- PASS: TestAccAWSRedshiftCluster_snapshotCopy (631.18s) --- PASS: TestAccAWSRedshiftSecurityGroup_basic (11.11s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressCidr (11.10s) --- PASS: TestAccAWSRedshiftSecurityGroup_ingressSecurityGroup (12.47s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressCidr (23.94s) --- PASS: TestAccAWSRedshiftSecurityGroup_updateIngressSecurityGroup (27.22s) --- PASS: TestAccAWSRoute53VpcAssociationAuthorization_basic (99.00s) --- PASS: TestAccAWSRoute53VpcAssociationAuthorization_disappears (94.43s) --- PASS: TestAccAWSRoute53ZoneAssociation_CrossAccount (124.58s) --- PASS: TestAccAWSRoute53ZoneAssociation_CrossRegion (157.69s) --- PASS: TestAccAWSS3Bucket_Replication (145.26s) --- PASS: TestAccAWSS3Bucket_ReplicationConfiguration_Rule_Destination_AccessControlTranslation (86.49s) --- PASS: TestAccAWSS3Bucket_ReplicationConfiguration_Rule_Destination_AddAccessControlTranslation (84.75s) --- PASS: TestAccAWSS3Bucket_ReplicationExpectVersioningValidationError (22.79s) --- PASS: TestAccAWSS3Bucket_ReplicationSchemaV2 (174.11s) --- PASS: TestAccAWSS3Bucket_ReplicationWithoutPrefix (65.38s) --- PASS: TestAccAWSS3Bucket_ReplicationWithoutStorageClass (85.05s) --- PASS: TestAccAWSS3Bucket_SameRegionReplicationSchemaV2 (73.58s) --- PASS: TestAccAWSSubnet_ignoreTags (86.24s) --- PASS: TestAccAWSVPCPeeringConnection_accept (144.21s) --- PASS: TestAccAWSVPCPeeringConnection_basic (65.98s) --- PASS: TestAccAWSVPCPeeringConnection_failedState (12.38s) --- PASS: TestAccAWSVPCPeeringConnection_options (117.22s) --- PASS: TestAccAWSVPCPeeringConnection_optionsNoAutoAccept (29.07s) --- PASS: TestAccAWSVPCPeeringConnection_peerRegionAutoAccept (29.13s) --- PASS: TestAccAWSVPCPeeringConnection_plan (52.19s) --- PASS: TestAccAWSVPCPeeringConnection_region (70.00s) --- PASS: TestAccAWSVPCPeeringConnection_tags (150.89s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_differentRegionDifferentAccount (68.06s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_differentRegionSameAccount (83.92s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_sameRegionDifferentAccount (64.85s) --- PASS: TestAccAWSVPCPeeringConnectionAccepter_sameRegionSameAccount (56.44s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_basic (70.42s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_differentRegionSameAccount (75.28s) --- PASS: TestAccAWSVpcPeeringConnectionOptions_sameRegionDifferentAccount (41.96s) --- FAIL: TestAccDataSourceAwsRoute53ResolverRule_SharedByMe (227.22s) --- FAIL: TestAccDataSourceAwsRoute53ResolverRule_SharedWithMe (228.00s) data_source_aws_route53_resolver_rule_test.go:101: Step 1/1 error: Error running apply: 2020/10/28 22:02:11 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachment_SharedTransitGateway (221.84s) resource_aws_ec2_transit_gateway_vpc_attachment_test.go:215: Step 1/2 error: Error running apply: 2020/10/28 22:02:10 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating principal with RAM resource share: UnknownResourceException: Organization o-upyv668dz5 could not be found. Error: error associating RAM Resource Share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_Tags (201.45s) --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_TransitGatewayDefaultRouteTableAssociationAndPropagation (211.45s) --- FAIL: TestAccAWSEc2TransitGatewayVpcAttachmentAccepter_basic (221.42s) resource_aws_ec2_transit_gateway_vpc_attachment_accepter_test.go:135: Step 1/4 error: Error running apply: 2020/10/28 22:02:11 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: error associating RAM Resource Share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. Error: Error associating principal with RAM resource share: OperationNotPermittedException: The resource you are attempting to share can only be shared within your AWS Organization. This error may also occur if you have not enabled sharing with your AWS organization, or that onboarding process is still in progress. ```
…ndling Reference: #8316 Reference: #15791 Previously in AWS Commercial: ``` === CONT TestAccAWSDBInstance_ec2Classic TestAccAWSDBInstance_ec2Classic: resource_aws_db_instance_test.go:2242: Step 1/1 error: Error running apply: 2020/11/02 10:23:21 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error creating DB Instance: InsufficientDBInstanceCapacity: Cannot create a db.t3.micro database instance because there are no availability zones with sufficient capacity for non-VPC and storage type : standard for db.t3.micro. Please try the request again at a later time. status code: 400, request id: cb437def-f533-4894-874a-235bef9fe874 --- FAIL: TestAccAWSDBInstance_ec2Classic (11.36s) ``` Previously in AWS GovCloud (US): ``` === CONT TestAccAWSDbInstanceDataSource_ec2Classic TestAccAWSDbInstanceDataSource_ec2Classic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 4f3cfbfa-bc43-46bd-8834-5eeb10cc4fc9 []}] --- FAIL: TestAccAWSDbInstanceDataSource_ec2Classic (0.49s) === CONT TestAccAWSDBInstance_ec2Classic TestAccAWSDBInstance_ec2Classic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 2af3b934-784b-43e5-8e67-38b7b7333b94 []}] --- FAIL: TestAccAWSDBInstance_ec2Classic (0.38s) === CONT TestAccAWSDBSecurityGroup_basic TestAccAWSDBSecurityGroup_basic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 2ac5b1af-30f7-4c64-81d8-0cf983ce035b []}] --- FAIL: TestAccAWSDBSecurityGroup_basic (0.33s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSDbInstanceDataSource_ec2Classic (452.57s) --- PASS: TestAccAWSDBInstance_ec2Classic (496.81s) --- PASS: TestAccAWSDBSecurityGroup_basic (35.95s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSDbInstanceDataSource_ec2Classic (2.84s) --- SKIP: TestAccAWSDBInstance_ec2Classic (2.81s) --- SKIP: TestAccAWSDBSecurityGroup_basic (2.72s) ```
…riable handling Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAwsFmsAdminAccount_basic TestAccAwsFmsAdminAccount_basic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: b96069f2-b851-4a14-814c-e04ebd3a1e7e []}] --- FAIL: TestAccAwsFmsAdminAccount_basic (0.33s) ``` Output from acceptance testing in AWS Commercial (standalone account): ``` --- PASS: TestAccAwsFmsAdminAccount_basic (97.32s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAwsFmsAdminAccount_basic (1.51s) ```
…riable handling Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAWSRoute53QueryLog_basic TestAccAWSRoute53QueryLog_basic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: cb8c48d8-2335-4b2f-b5f0-97cd5a4ec4d7 []}] --- FAIL: TestAccAWSRoute53QueryLog_basic (0.40s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSRoute53QueryLog_basic (46.16s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSRoute53QueryLog_basic (1.56s) ```
… handling Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAWSWafWebAcl_LoggingConfiguration TestAccAWSWafWebAcl_LoggingConfiguration: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 525f91fb-c193-46b4-861a-9cabab7f4303 []}] --- FAIL: TestAccAWSWafWebAcl_LoggingConfiguration (0.38s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSWafWebAcl_LoggingConfiguration (115.97s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSWafWebAcl_LoggingConfiguration (24.06s) ```
… handling (#16045) Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAWSWafWebAcl_LoggingConfiguration TestAccAWSWafWebAcl_LoggingConfiguration: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 525f91fb-c193-46b4-861a-9cabab7f4303 []}] --- FAIL: TestAccAWSWafWebAcl_LoggingConfiguration (0.38s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSWafWebAcl_LoggingConfiguration (115.97s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSWafWebAcl_LoggingConfiguration (24.06s) ```
… handling (#16026) * tests/resource/aws_default_security_group: Remove hardcoded us-east-1 handling Reference: #8316 Reference: #15737 Reference: #15791 Previously in AWS GovCloud (US): ``` === RUN TestAccAWSDefaultSecurityGroup_Classic_basic TestAccAWSDefaultSecurityGroup_Classic_basic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: fc6cf64f-8c40-4e8b-a37c-a82d8c6a69c9 []}] --- FAIL: TestAccAWSDefaultSecurityGroup_Classic_basic (0.40s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSDefaultSecurityGroup_Classic_basic (16.47s) --- SKIP: TestAccAWSDefaultSecurityGroup_Classic_empty (0.00s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSDefaultSecurityGroup_Classic_basic (2.90s) --- SKIP: TestAccAWSDefaultSecurityGroup_Classic_empty (0.00s) ``` * tests/resource/aws_default_security_group: Ensure EC2-Classic ARN checking is separate from regular ARN checking
…6024) Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccDataSourceAwsRegion_basic TestAccDataSourceAwsRegion_basic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: f02b1c17-7e7d-4e95-ae14-2e02a2f785f4 []}] --- FAIL: TestAccDataSourceAwsRegion_basic (0.54s) === CONT TestAccDataSourceAwsRegion_endpoint TestAccDataSourceAwsRegion_endpoint: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 74c054be-32b1-432f-b338-3211315ed76c []}] --- FAIL: TestAccDataSourceAwsRegion_endpoint (0.50s) === CONT TestAccDataSourceAwsRegion_endpointAndName TestAccDataSourceAwsRegion_endpointAndName: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 1527b1e9-a329-43f7-b37e-f3a8da479861 []}] --- FAIL: TestAccDataSourceAwsRegion_endpointAndName (0.51s) === CONT TestAccDataSourceAwsRegion_name TestAccDataSourceAwsRegion_name: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: eef98021-bbe9-46f0-bb2a-4649a0b808dd []}] --- FAIL: TestAccDataSourceAwsRegion_name (0.43s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccDataSourceAwsRegion_basic (13.01s) --- PASS: TestAccDataSourceAwsRegion_name (14.91s) --- PASS: TestAccDataSourceAwsRegion_endpoint (14.92s) --- PASS: TestAccDataSourceAwsRegion_endpointAndName (14.94s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- PASS: TestAccDataSourceAwsRegion_basic (17.09s) --- PASS: TestAccDataSourceAwsRegion_name (19.02s) --- PASS: TestAccDataSourceAwsRegion_endpoint (19.04s) --- PASS: TestAccDataSourceAwsRegion_endpointAndName (19.05s) ```
) Reference: #8316 Reference: #15737 Reference: #15791 Previously in AWS GovCloud (US): ``` === RUN TestAccAWSInstance_inEc2Classic TestAccAWSInstance_inEc2Classic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 23aa824d-1186-4ea7-803b-4d857190e77c []}] --- FAIL: TestAccAWSInstance_inEc2Classic (0.71s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSInstance_inEc2Classic (96.92s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSInstance_inEc2Classic (2.79s) ```
#16036) Reference: #8316 Reference: #15737 Reference: #15791 Previously in AWS GovCloud (US): ``` === RUN TestAccAWSSecurityGroup_defaultEgressClassic TestAccAWSSecurityGroup_defaultEgressClassic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 80bb55a7-5ac8-46b6-8c39-cf4f09bb4cd5 []}] --- FAIL: TestAccAWSSecurityGroup_defaultEgressClassic (0.50s) === RUN TestAccAWSSecurityGroup_ingressWithCidrAndSGsClassic TestAccAWSSecurityGroup_ingressWithCidrAndSGsClassic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 9909088a-dd37-40db-8774-2ea613dd1b3d []}] --- FAIL: TestAccAWSSecurityGroup_ingressWithCidrAndSGsClassic (0.50s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSSecurityGroup_defaultEgressClassic (12.50s) --- PASS: TestAccAWSSecurityGroup_ingressWithCidrAndSGsClassic (14.84s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSSecurityGroup_defaultEgressClassic (2.90s) --- SKIP: TestAccAWSSecurityGroup_ingressWithCidrAndSGsClassic (2.90s) ```
…riable handling (#16044) Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAWSRoute53QueryLog_basic TestAccAWSRoute53QueryLog_basic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: cb8c48d8-2335-4b2f-b5f0-97cd5a4ec4d7 []}] --- FAIL: TestAccAWSRoute53QueryLog_basic (0.40s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSRoute53QueryLog_basic (46.16s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSRoute53QueryLog_basic (1.56s) ```
Reference: #8316 Reference: #15737 Reference: #15791 Previously in AWS GovCloud (US): ``` === RUN TestAccAWSElasticacheCluster_SecurityGroup_Ec2Classic TestAccAWSElasticacheCluster_SecurityGroup_Ec2Classic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 9df5bb8f-fad4-4e95-9262-c306e610a3cf []}] --- FAIL: TestAccAWSElasticacheCluster_SecurityGroup_Ec2Classic (0.32s) === CONT TestAccAWSElasticacheSecurityGroup_basic TestAccAWSElasticacheSecurityGroup_basic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 925ee8e0-4c50-4e40-a1aa-115a09a1603c []}] --- FAIL: TestAccAWSElasticacheSecurityGroup_basic (0.43s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSElasticacheCluster_SecurityGroup_Ec2Classic (533.02s) --- PASS: TestAccAWSElasticacheSecurityGroup_basic (13.61s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSElasticacheCluster_SecurityGroup_Ec2Classic (3.28s) --- SKIP: TestAccAWSElasticacheSecurityGroup_basic (2.85s) ```
…dling (#16040) Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccDataSourceAwsPricingProduct_ec2 TestAccDataSourceAwsPricingProduct_ec2: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: bc4d07ae-04d0-4fad-b695-5ef067be32ee []}] --- FAIL: TestAccDataSourceAwsPricingProduct_ec2 (0.41s) === CONT TestAccDataSourceAwsPricingProduct_redshift TestAccDataSourceAwsPricingProduct_redshift: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: 0871bc77-35ba-4dbe-aa49-7a54304986ce []}] --- FAIL: TestAccDataSourceAwsPricingProduct_redshift (0.38s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccDataSourceAwsPricingProduct_ec2 (18.23s) --- PASS: TestAccDataSourceAwsPricingProduct_redshift (18.42s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccDataSourceAwsPricingProduct_ec2 (1.54s) --- SKIP: TestAccDataSourceAwsPricingProduct_redshift (1.54s) ```
…riable handling (#16041) Reference: #8316 Reference: #15737 Previously in AWS GovCloud (US): ``` === CONT TestAccAwsFmsAdminAccount_basic TestAccAwsFmsAdminAccount_basic: provider_test.go:184: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: b96069f2-b851-4a14-814c-e04ebd3a1e7e []}] --- FAIL: TestAccAwsFmsAdminAccount_basic (0.33s) ``` Output from acceptance testing in AWS Commercial (standalone account): ``` --- PASS: TestAccAwsFmsAdminAccount_basic (97.32s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAwsFmsAdminAccount_basic (1.51s) ```
…ent variable handling, create public ACM certificate, improve state value checks Reference: #8316 Reference: #14664 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSAPIGatewayDomainName_disappears (20.54s) --- PASS: TestAccAWSAPIGatewayDomainName_RegionalCertificateArn (81.84s) --- PASS: TestAccAWSAPIGatewayDomainName_SecurityPolicy (139.42s) --- PASS: TestAccAWSAPIGatewayDomainName_Tags (203.73s) --- SKIP: TestAccAWSAPIGatewayDomainName_CertificateName (0.00s) --- SKIP: TestAccAWSAPIGatewayDomainName_RegionalCertificateName (0.00s) ``` Output from acceptance testing in AWS GovCloud (US) (other tests failing with ACM quota limits): ``` --- SKIP: TestAccAWSAPIGatewayDomainName_CertificateArn (1.58s) ```
…handling and create public ACM Certificate Reference: #8316 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSCognitoUserPoolDomain_custom (816.97s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSCognitoUserPoolDomain_custom (1.64s) ```
…hardcoded us-east-1 environment variable handling in tests (#16032) Reference: #8316 Reference: #15737 Reference: #15791 Reference: #16018 (to run testing locally) Changes: ``` * resource/aws_eip: In EC2-Classic, wait until Instance returns as associated during create or update * resource/aws_eip_association: Retry on additional EC2 Address eventual consistency errors on creation * resource/aws_eip_association: In EC2-Classic, wait until Instance returns as associated during creation ``` Previously in AWS Commercial: ``` === RUN TestAccAWSEIP_Ec2Classic TestAccAWSEIP_Ec2Classic: resource_aws_eip_test.go:96: Step 1/2 error: After applying this test step, the plan was not empty. stdout: An execution plan has been generated and is shown below. Resource actions are indicated with the following symbols: ~ update in-place Terraform will perform the following actions: # aws_eip.test will be updated in-place ~ resource "aws_eip" "test" { domain = "standard" id = "52.0.143.158" + instance = "i-0c0a6ad483e281c59" public_dns = "ec2-52-0-143-158.compute-1.amazonaws.com" public_ip = "52.0.143.158" public_ipv4_pool = "amazon" vpc = false } Plan: 0 to add, 1 to change, 0 to destroy. --- FAIL: TestAccAWSEIP_Ec2Classic (153.41s) === CONT TestAccAWSEIPAssociation_ec2Classic resource_aws_eip_association_test.go:97: Step 1/2 error: After applying this test step, the plan was not empty. stdout: An execution plan has been generated and is shown below. Resource actions are indicated with the following symbols: -/+ destroy and then create replacement Terraform will perform the following actions: # aws_eip_association.test must be replaced -/+ resource "aws_eip_association" "test" { + allocation_id = (known after apply) ~ id = "34.224.14.254" -> (known after apply) + instance_id = "i-0ab9e7598ae44485f" + network_interface_id = (known after apply) + private_ip_address = (known after apply) public_ip = "34.224.14.254" } Plan: 1 to add, 0 to change, 1 to destroy. --- FAIL: TestAccAWSEIPAssociation_ec2Classic (74.15s) === CONT TestAccAWSEIPAssociation_ec2Classic resource_aws_eip_association_test.go:97: Step 1/2 error: Error running apply: 2020/11/03 09:35:32 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating EIP: AuthFailure: The address '34.239.37.205' does not belong to you. status code: 400, request id: d4163627-4987-4466-a297-aa2a48331dc9 === CONT TestAccAWSEIPAssociation_disappears resource_aws_eip_association_test.go:154: Step 1/1 error: Error running apply: 2020/11/03 09:35:33 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating EIP: InvalidAllocationID.NotFound: The allocation ID 'eipalloc-0780b47e4b04f970a' does not exist status code: 400, request id: 2c1a4d76-0ec2-45d7-9427-89d6e5de03ec === CONT TestAccAWSEIPAssociation_networkInterface resource_aws_eip_association_test.go:43: Step 1/2 error: Error running apply: 2020/11/03 09:35:30 [DEBUG] Using modified User-Agent: Terraform/0.12.29 HashiCorp-terraform-exec/0.10.0 Error: Error associating EIP: InvalidAllocationID.NotFound: The allocation ID 'eipalloc-071e65b698ca98f08' does not exist status code: 400, request id: 862d2320-e52a-45ef-854c-9cc90004bf77 ``` Previously in AWS GovCloud (US): ``` === RUN TestAccAWSEIPAssociation_ec2Classic TestAccAWSEIPAssociation_ec2Classic: provider_test.go:196: [{0 error configuring Terraform AWS Provider: error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid. status code: 403, request id: f2a9b7c4-2448-47a0-b5ea-87de84dd9b7a []}] --- FAIL: TestAccAWSEIPAssociation_ec2Classic (0.36s) ``` Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSEIP_associated_user_private_ip (231.25s) --- PASS: TestAccAWSEIP_basic (18.88s) --- PASS: TestAccAWSEIP_disappears (12.62s) --- PASS: TestAccAWSEIP_Ec2Classic (195.34s) --- PASS: TestAccAWSEIP_instance (99.75s) --- PASS: TestAccAWSEIP_Instance_Reassociate (126.92s) --- PASS: TestAccAWSEIP_networkInterface (81.71s) --- PASS: TestAccAWSEIP_notAssociated (144.46s) --- PASS: TestAccAWSEIP_PublicIpv4Pool_default (18.84s) --- PASS: TestAccAWSEIP_tags_Ec2Classic (7.61s) --- PASS: TestAccAWSEIP_tags_Vpc (26.35s) --- PASS: TestAccAWSEIP_twoEIPsOneNetworkInterface (82.93s) --- SKIP: TestAccAWSEIP_CustomerOwnedIpv4Pool (2.47s) --- SKIP: TestAccAWSEIP_PublicIpv4Pool_custom (0.00s) --- PASS: TestAccAWSEIPAssociation_basic (159.35s) --- PASS: TestAccAWSEIPAssociation_disappears (101.24s) --- PASS: TestAccAWSEIPAssociation_ec2Classic (93.73s) --- PASS: TestAccAWSEIPAssociation_instance (93.00s) --- PASS: TestAccAWSEIPAssociation_networkInterface (71.25s) --- PASS: TestAccAWSEIPAssociation_spotInstance (71.11s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- PASS: TestAccAWSEIP_associated_user_private_ip (245.88s) --- PASS: TestAccAWSEIP_basic (23.76s) --- PASS: TestAccAWSEIP_disappears (16.42s) --- PASS: TestAccAWSEIP_instance (107.18s) --- PASS: TestAccAWSEIP_Instance_Reassociate (165.24s) --- PASS: TestAccAWSEIP_networkInterface (90.37s) --- PASS: TestAccAWSEIP_notAssociated (146.54s) --- PASS: TestAccAWSEIP_PublicIpv4Pool_default (24.04s) --- PASS: TestAccAWSEIP_tags_Vpc (37.31s) --- PASS: TestAccAWSEIP_twoEIPsOneNetworkInterface (90.85s) --- SKIP: TestAccAWSEIP_CustomerOwnedIpv4Pool (2.86s) --- SKIP: TestAccAWSEIP_Ec2Classic (2.89s) --- SKIP: TestAccAWSEIP_PublicIpv4Pool_custom (0.00s) --- SKIP: TestAccAWSEIP_tags_Ec2Classic (2.89s) --- PASS: TestAccAWSEIPAssociation_basic (156.32s) --- PASS: TestAccAWSEIPAssociation_disappears (130.31s) --- PASS: TestAccAWSEIPAssociation_instance (89.29s) --- PASS: TestAccAWSEIPAssociation_networkInterface (79.42s) --- PASS: TestAccAWSEIPAssociation_spotInstance (68.02s) --- SKIP: TestAccAWSEIPAssociation_ec2Classic (2.92s) ```
…ent variable handling, create public ACM certificate, improve state value checks (#16139) Reference: #8316 Reference: #14664 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSAPIGatewayDomainName_disappears (20.54s) --- PASS: TestAccAWSAPIGatewayDomainName_RegionalCertificateArn (81.84s) --- PASS: TestAccAWSAPIGatewayDomainName_SecurityPolicy (139.42s) --- PASS: TestAccAWSAPIGatewayDomainName_Tags (203.73s) --- SKIP: TestAccAWSAPIGatewayDomainName_CertificateName (0.00s) --- SKIP: TestAccAWSAPIGatewayDomainName_RegionalCertificateName (0.00s) ``` Output from acceptance testing in AWS GovCloud (US) (other tests failing with ACM quota limits): ``` --- SKIP: TestAccAWSAPIGatewayDomainName_CertificateArn (1.58s) ```
…handling and create public ACM Certificate (#16140) Reference: #8316 Reference: #15737 Output from acceptance testing in AWS Commercial: ``` --- PASS: TestAccAWSCognitoUserPoolDomain_custom (816.97s) ``` Output from acceptance testing in AWS GovCloud (US): ``` --- SKIP: TestAccAWSCognitoUserPoolDomain_custom (1.64s) ```
This has been released in version 3.16.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Description
Previously, certain test configurations that required execution against the
us-east-1
region would either hardcode a provider configuration for theus-east-1
region, e.g.Or would reset the
AWS_DEFAULT_REGION
environment variable in the acceptance test function, e.g.While this works for running single acceptance tests locally and concurrently in our TeamCity CI environment due to its usage of https://github.com/jen20/teamcity-go-test (which spins up separate provider processes per test), this breaks local testing with
go test -parallel
higher than one and likely would not work in a future CircleCI environment unless we create a separate testing handler liketeamcity-go-test
.Some scenarios where this
us-east-1
provider configuration needs to occur includes:Cost and Usage Reporting service(skip for now)Pricing service(skip for now)Notably, most of our EC2-Classic specific testing also uses similar patterns to the above, however we will treat these as a separate, special configuration so the EC2-Classic region can be defined via its own environment variable.
Test Updates
NOTE: As mentioned above, testing configurations for EC2-Classic will require a separate update.
To update existing tests, the following needs to occur:
AWS_DEFAULT_REGION
handling from the acceptance test functionvar providers []*schema.Provider
to the acceptance test functionProviders: testAccProviders
toProviderFactories: testAccProviderFactories(&providers)
Config
to anyImportState: true
TestStep
(matching previous stepConfig
)provider "aws" {...}
from test configurationtestAccUsEast1RegionProviderConfig()
to test configurationprovider = "aws.us-east-1"
to any test configuration resources requiring the explicit region settingReferences
testAccUsEast1RegionProviderConfig()
added via: tests/resource/aws_cloudfront_distribution: Remove extraneous aliases configurations and create aliased us-east-1 provider configuration #8314The text was updated successfully, but these errors were encountered: