-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
AWS ConfigService KMS encryption support #20800
AWS ConfigService KMS encryption support #20800
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @nickyamanaka 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
Commercial
% make testacc TESTARGS='-run=TestAccAWSConfig_serial/DeliveryChannel'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSConfig_serial/DeliveryChannel -timeout 180m
=== RUN TestAccAWSConfig_serial
=== RUN TestAccAWSConfig_serial/DeliveryChannel
=== RUN TestAccAWSConfig_serial/DeliveryChannel/basic
=== RUN TestAccAWSConfig_serial/DeliveryChannel/allParams
=== RUN TestAccAWSConfig_serial/DeliveryChannel/importBasic
--- PASS: TestAccAWSConfig_serial (119.70s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel (119.70s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/basic (41.45s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/allParams (39.94s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/importBasic (38.31s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 123.710s
GovCloud
% make testacc TESTARGS='-run=TestAccAWSConfig_serial/DeliveryChannel'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSConfig_serial/DeliveryChannel -timeout 180m
=== RUN TestAccAWSConfig_serial
=== RUN TestAccAWSConfig_serial/DeliveryChannel
=== RUN TestAccAWSConfig_serial/DeliveryChannel/basic
=== RUN TestAccAWSConfig_serial/DeliveryChannel/allParams
=== RUN TestAccAWSConfig_serial/DeliveryChannel/importBasic
--- PASS: TestAccAWSConfig_serial (123.26s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel (123.26s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/basic (40.91s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/allParams (41.72s)
--- PASS: TestAccAWSConfig_serial/DeliveryChannel/importBasic (40.63s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 126.517s
@nickyamanaka Thanks for the contribution 🎉 👏. |
This functionality has been released in v3.59.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Adds
s3_kms_key_arn
allowing Config to encrypt files to the target S3 bucket. Does not support AWS Managed keys, has to be a Customer Managed one.Updates DeliveryChannel Schema to v1.9.0 https://pkg.go.dev/github.com/aws/aws-sdk-go-v2/service/configservice@v1.9.0/types#DeliveryChannel
https://docs.aws.amazon.com/config/latest/developerguide/DocumentHistory.html (February 16, 2021)
Notes: adds a KMS key for testing, adds IAM permission to the role to use the KMS key.
Verified bucket ConfigWritabilityCheckFile file generated by AWSConfig, within its SSE details, is using the KMS key correctly.
Community Note
Closes #20600
Output from acceptance testing: