-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Move tag creation for secrets manager from being a seperate step to be part of the creati… #9023
Conversation
…on. This is necessary when IAM policies are in place that have conditions for RequestTag.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for this, @syntastical 🚀
Output from acceptance testing in AWS Commercial:
--- PASS: TestAccAwsSecretsManagerSecret_policy (10.26s)
--- PASS: TestAccAwsSecretsManagerSecret_withNamePrefix (11.06s)
--- PASS: TestAccAwsSecretsManagerSecret_Basic (11.30s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_BasicString (11.61s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_Base64Binary (11.67s)
--- PASS: TestAccAwsSecretsManagerSecret_Description (16.23s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_VersionStages (20.71s)
--- PASS: TestAccAwsSecretsManagerSecret_Tags (25.66s)
--- PASS: TestAccAwsSecretsManagerSecret_RotationRules (32.84s)
--- PASS: TestAccAwsSecretsManagerSecret_RotationLambdaARN (34.45s)
--- PASS: TestAccAwsSecretsManagerSecret_KmsKeyID (35.86s)
--- PASS: TestAccAwsSecretsManagerSecret_RecoveryWindowInDays_Recreate (51.73s)
Output from acceptance testing in AWS GovCloud (US):
--- PASS: TestAccAwsSecretsManagerSecret_policy (8.68s)
--- PASS: TestAccAwsSecretsManagerSecret_withNamePrefix (9.46s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_BasicString (9.64s)
--- PASS: TestAccAwsSecretsManagerSecret_Basic (10.07s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_Base64Binary (10.11s)
--- PASS: TestAccAwsSecretsManagerSecret_Description (11.33s)
--- PASS: TestAccAwsSecretsManagerSecretVersion_VersionStages (13.19s)
--- PASS: TestAccAwsSecretsManagerSecret_Tags (14.24s)
--- PASS: TestAccAwsSecretsManagerSecret_RotationRules (16.46s)
--- PASS: TestAccAwsSecretsManagerSecret_RotationLambdaARN (16.80s)
--- PASS: TestAccAwsSecretsManagerSecret_KmsKeyID (30.12s)
--- PASS: TestAccAwsSecretsManagerSecret_RecoveryWindowInDays_Recreate (45.91s)
@bflad Hey Brian, I was wondering, you included the AWS GovCloud and AWS Commercial test output, was I supposed to do that? |
@syntastical showing passing acceptance testing in AWS Commercial is generally good enough for community contributions as we understand that not everyone has an AWS GovCloud (US) account. The maintainers will always re-run AWS Commercial testing to ensure that special testing account setup wasn't used and that it passes before merging for release, but in the case of switching Terraform resources from tag-after-create to tag-on-create, we have seen that sometimes AWS GovCloud (US) has not received the API update yet so we try to be extra careful with this particular type of update to ensure we aren't introducing a regression there. |
This has been released in version 2.16.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
…on. This is necessary when IAM policies are in place that have conditions for RequestTag.
Community Note
Fixes #0000
Release note for CHANGELOG:
Output from acceptance testing: