-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add aws_acmpca_permission resource #12485
Conversation
Still needs acceptance tests writing and running, but docs are there and it compiles at least! |
This is failing the 1st acceptance test with the following:
It looks like it's doing the following:
When, what I'd obviously like it to do is:
I'll take a look as soon as time allows as to how to influence the destruction/test order. |
2 out of 3 acceptance tests are passing now. I still have an issue with the cert authority being deleted before the check for a destroyed permission is being run. Or at least I think that's the right interpretation of the output below:
|
@mattburgess Thanks for this. The |
That was an incredibly quick review, thanks @ewbankkit ! Thanks for the pointers. I've pushed a fixup commit now, but am getting an odd error. It's obviously getting further than it was before, but for the life of me I can't see how my test step isn't configured correctly:
testing.go:614 spits out that error when |
@mattburgess It must be the test step {
ResourceName: resourceName,
}, that causes that error. |
Doh! Must've been working too late last night. Fixed and all the acceptance tests now pass. Many thanks for the review & patience! |
Notification of Recent and Upcoming Changes to ContributionsThank you for this contribution! There have been a few recent development changes that affect this pull request. We apologize for the inconvenience, especially if there have been long review delays up until now. Please note that this is automated message from an unmonitored account. See the FAQ for additional information on the maintainer team and review prioritization. If you are unable to complete these updates, please leave a comment for the community and maintainers so someone can potentially continue the work. The maintainers will encourage other contributors to use the existing contribution as the base for additional changes as appropriate. Otherwise, contributions that do not receive updated code or comments from the original contributor may be closed in the future so the maintainers can focus on active items. For the most up to date information about Terraform AWS Provider development, see the Contributing Guide. Additional technical debt changes can be tracked with the As part of updating a pull request with these changes, the most current unit testing and linting will run. These may report issues that were not previously reported. Action Required: Terraform 0.12 SyntaxReference: #8950 Version 3 and later of the Terraform AWS Provider, which all existing contributions would potentially be added, only supports Terraform 0.12 and later. Certain syntax elements of Terraform 0.11 and earlier show deprecation warnings during runs with Terraform 0.12. Documentation and test configurations, such as those including deprecated string interpolations ( Action Required: Terraform Plugin SDK Version 2Reference: #14551 The Terraform AWS Provider has been upgraded to the latest version of the Terraform Plugin SDK. Generally, most changes to contributions should only involve updating Go import paths in source code files. Please see the referenced issue for additional information. Action Required: Removal of website/aws.erb FileReference: #14712 Any changes to the Upcoming Change of Git Branch NamingReference: #14292 Development environments will need their upstream Git branch updated from Upcoming Change of GitHub OrganizationReference: #14715 This repository will be migrating from https://github.com/terraform-providers/terraform-provider-aws to https://github.com/hashicorp/terraform-provider-aws. No practitioner or developer action is anticipated and most GitHub functionality will automatically redirect to the new location. Go import paths including |
26864b9
to
ae599ce
Compare
Any ETA on when this will be merged please? |
fe5dd80
to
ad393cd
Compare
hi, can we have a review on this PR? I think all the checks are passing now. |
Any news on getting this merged? |
Pull request #21306 has significantly refactored the AWS Provider codebase. As a result, most PRs opened prior to the refactor now have merge conflicts that must be resolved before proceeding. Specifically, PR #21306 relocated the code for all AWS resources and data sources from a single We recognize that many pull requests have been open for some time without yet being addressed by our maintainers. Therefore, we want to make it clear that resolving these conflicts in no way affects the prioritization of a particular pull request. Once a pull request has been prioritized for review, the necessary changes will be made by a maintainer -- either directly or in collaboration with the pull request author. For a more complete description of this refactor, including examples of how old filepaths and function names correspond to their new counterparts: please refer to issue #20000. For a quick guide on how to amend your pull request to resolve the merge conflicts resulting from this refactor and bring it in line with our new code patterns: please refer to our Service Package Refactor Pull Request Guide. |
I've rebased to fix up the merge conflict, and fixed up a couple of minor issues I saw with the PR while I was at it. This PR would be a bit more useful with resource import support added as I'd well imagine folks needing this feature will have already added the relevant permissions to their private CAs. I had a stab at that this evening but the trivial implementation I attempted failed miserably. I'll have another go tomorrow and reach out for some help if I don't get anywhere with it. |
b2d8a13
to
d0b04b7
Compare
019c8b7
to
33740c5
Compare
Current workaround:
|
Hello @breathingdust, any chance this will still make it within this quarters roadmap? Thanks and have a good one! |
% make semall providerlint golangci-lint
==> Running Semgrep checks locally (must have semgrep installed)...
Scanning 4123 files with 37 go rules.
100%|██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|4123/4123 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 37 rules on 4123 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 4123 files with 24 go rules.
100%|██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|4123/4123 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 24 rules on 4123 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 1561 files with 4 go rules.
100%|██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|1561/1561 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 4 rules on 1561 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 991 files with 206 go rules.
100%|████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|991/991 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 206 rules on 991 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 1112 files with 205 go rules.
100%|██████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|1112/1112 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 206 rules on 1112 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 929 files with 202 go rules.
100%|████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|929/929 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 206 rules on 929 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
Scanning 999 files with 205 go rules.
100%|████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████████|999/999 tasks
Some files were skipped or only partially analyzed.
Scan was limited to files tracked by git.
Scan skipped: 1645 files matching .semgrepignore patterns
For a full list of skipped files, run semgrep with the --verbose flag.
Ran 205 rules on 999 files: 0 findings.
If Semgrep missed a finding, please send us feedback to let us know!
$ semgrep shouldafound --help
==> Checking source code with providerlint...
==> Checking source code with golangci-lint... |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
% make testacc TESTARGS='-run=TestAccACMPCAPermission_' PKG=acmpca ACCTEST_PARALLELISM=2
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/acmpca/... -v -count 1 -parallel 2 -run=TestAccACMPCAPermission_ -timeout 180m
=== RUN TestAccACMPCAPermission_basic
=== PAUSE TestAccACMPCAPermission_basic
=== RUN TestAccACMPCAPermission_disappears
=== PAUSE TestAccACMPCAPermission_disappears
=== RUN TestAccACMPCAPermission_sourceAccount
=== PAUSE TestAccACMPCAPermission_sourceAccount
=== CONT TestAccACMPCAPermission_basic
=== CONT TestAccACMPCAPermission_sourceAccount
--- PASS: TestAccACMPCAPermission_basic (26.28s)
=== CONT TestAccACMPCAPermission_disappears
--- PASS: TestAccACMPCAPermission_sourceAccount (27.24s)
--- PASS: TestAccACMPCAPermission_disappears (24.03s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/acmpca 61.489s
@mattburgess Thanks for the contribution 🎉 👏. |
This functionality has been released in v4.24.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Closes #10090
Release note for CHANGELOG:
Output from acceptance testing: