-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for advanced SSM parameters #8525
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @davidcelis 👋 Thanks for contributing this! Its off to a good start -- a few testing things and it should be good to go. Please reach out with any questions or if you do not have time to implement the feedback.
Co-Authored-By: Brian Flad <bflad417@gmail.com>
Hey @davidcelis, thanks for the updates here! When testing this for merging I swapped out the testing to also perform updates for the
So! Turns out this needed some extra love for that specific scenario and in this case a relatively safe and simple CustomizeDiff: customdiff.All(
// Prevent the following error during tier update from Advanced to Standard:
// ValidationException: This parameter uses the advanced-parameter tier. You can't downgrade a parameter from the advanced-parameter tier to the standard-parameter tier. If necessary, you can delete the advanced parameter and recreate it as a standard parameter.
customdiff.ForceNewIfChange("tier", func(old, new, meta interface{}) bool {
return old.(string) == ssm.ParameterTierAdvanced && new.(string) == ssm.ParameterTierStandard
}),
), With this in place, everything looks good. 🚀 Thanks so much for your contribution here! Should be able to get this released today. 👍 Output from acceptance testing after above changes:
|
… trigger recreation for Advanced to Standard Reference: #8525 (comment) Output from acceptance testing: ``` --- PASS: TestAccAWSSSMParameter_disappears (9.99s) --- PASS: TestAccAWSSSMParameter_basic (13.47s) --- PASS: TestAccAWSSSMParameter_secure (13.74s) --- PASS: TestAccAWSSSMParameter_fullPath (19.63s) --- PASS: TestAccAWSSSMParameter_importBasic (21.78s) --- PASS: TestAccAWSSSMParameter_updateTags (26.12s) --- PASS: TestAccAWSSSMParameter_changeNameForcesNew (30.26s) --- PASS: TestAccAWSSSMParameter_overwrite (32.02s) --- PASS: TestAccAWSSSMParameter_updateDescription (35.51s) --- PASS: TestAccAWSSSMParameter_Tier (37.83s) --- PASS: TestAccAWSSSMParameter_secure_with_key (46.98s) --- PASS: TestAccAWSSSMParameter_secure_keyUpdate (61.83s) ```
oh wow, thank you for helping me bring this across the finish line, @bflad!! |
This has been released in version 2.10.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
@davidcelis thank you for being awesome! |
Hi guys. I'm afraid this pull request breaks SSM parameters management in AWS China. Please check #8662. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Community Note
Release note for CHANGELOG: