-
Notifications
You must be signed in to change notification settings - Fork 9.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added custom key stores for aws_kms_key & custom key store data source #24787
Conversation
golangci-lint seems to work for me:
but providerlint I assume I've got something setup wrong as its failing on stuff I haven't changed:
|
$ make testacc TESTARGS='-run=TestAccKMSCustomKeyStoreDataSource_' PKG=kms ACCTEST_TIMEOUT=180m
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/kms/... -v -count 1 -parallel 20 -run=TestAccKMSCustomKeyStoreDataSource_ -timeout 180m
=== RUN TestAccKMSCustomKeyStoreDataSource_basic
=== PAUSE TestAccKMSCustomKeyStoreDataSource_basic
=== CONT TestAccKMSCustomKeyStoreDataSource_basic
--- PASS: TestAccKMSCustomKeyStoreDataSource_basic (13.40s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/kms 16.515s |
$ make testacc TESTARGS='-run=TestAccKMSKey_' PKG=kms ACCTEST_TIMEOUT=180m
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/kms/... -v -count 1 -parallel 20 -run=TestAccKMSKey_ -timeout 180m
=== RUN TestAccKMSKey_basic
=== PAUSE TestAccKMSKey_basic
=== RUN TestAccKMSKey_disappears
=== PAUSE TestAccKMSKey_disappears
=== RUN TestAccKMSKey_multiRegion
=== PAUSE TestAccKMSKey_multiRegion
=== RUN TestAccKMSKey_asymmetricKey
=== PAUSE TestAccKMSKey_asymmetricKey
=== RUN TestAccKMSKey_hmacKey
=== PAUSE TestAccKMSKey_hmacKey
=== RUN TestAccKMSKey_Policy_basic
=== PAUSE TestAccKMSKey_Policy_basic
=== RUN TestAccKMSKey_Policy_bypass
=== PAUSE TestAccKMSKey_Policy_bypass
=== RUN TestAccKMSKey_Policy_bypassUpdate
=== PAUSE TestAccKMSKey_Policy_bypassUpdate
=== RUN TestAccKMSKey_Policy_iamRole
=== PAUSE TestAccKMSKey_Policy_iamRole
=== RUN TestAccKMSKey_Policy_iamRoleUpdate
=== PAUSE TestAccKMSKey_Policy_iamRoleUpdate
=== RUN TestAccKMSKey_Policy_iamRoleOrder
=== PAUSE TestAccKMSKey_Policy_iamRoleOrder
=== RUN TestAccKMSKey_Policy_iamServiceLinkedRole
=== PAUSE TestAccKMSKey_Policy_iamServiceLinkedRole
=== RUN TestAccKMSKey_Policy_booleanCondition
=== PAUSE TestAccKMSKey_Policy_booleanCondition
=== RUN TestAccKMSKey_isEnabled
=== PAUSE TestAccKMSKey_isEnabled
=== RUN TestAccKMSKey_tags
=== PAUSE TestAccKMSKey_tags
=== CONT TestAccKMSKey_basic
=== CONT TestAccKMSKey_Policy_iamRole
=== CONT TestAccKMSKey_hmacKey
=== CONT TestAccKMSKey_Policy_booleanCondition
=== CONT TestAccKMSKey_Policy_iamRoleOrder
=== CONT TestAccKMSKey_Policy_iamServiceLinkedRole
=== CONT TestAccKMSKey_multiRegion
=== CONT TestAccKMSKey_asymmetricKey
=== CONT TestAccKMSKey_tags
=== CONT TestAccKMSKey_disappears
=== CONT TestAccKMSKey_isEnabled
=== CONT TestAccKMSKey_Policy_iamRoleUpdate
=== CONT TestAccKMSKey_Policy_bypass
=== CONT TestAccKMSKey_Policy_bypassUpdate
=== CONT TestAccKMSKey_Policy_basic
--- PASS: TestAccKMSKey_disappears (18.89s)
--- PASS: TestAccKMSKey_hmacKey (22.17s)
--- PASS: TestAccKMSKey_asymmetricKey (22.19s)
--- PASS: TestAccKMSKey_multiRegion (24.88s)
--- PASS: TestAccKMSKey_basic (25.05s)
--- PASS: TestAccKMSKey_Policy_booleanCondition (26.42s)
--- PASS: TestAccKMSKey_Policy_basic (38.44s)
--- PASS: TestAccKMSKey_Policy_bypassUpdate (39.74s)
--- PASS: TestAccKMSKey_Policy_iamRole (45.35s)
--- PASS: TestAccKMSKey_Policy_iamServiceLinkedRole (55.62s)
--- PASS: TestAccKMSKey_tags (60.18s)
--- PASS: TestAccKMSKey_Policy_iamRoleOrder (69.67s)
--- PASS: TestAccKMSKey_Policy_iamRoleUpdate (69.86s)
--- PASS: TestAccKMSKey_isEnabled (119.75s)
--- PASS: TestAccKMSKey_Policy_bypass (152.29s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/kms 154.808s |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! 🚀
@ZeePal Thanks for the contribution! 👏🏾 🎉 |
This functionality has been released in v4.33.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Closes #16491
aws_kms_key
(addedcustom_key_store_id
field)aws_kms_custom_key_store
Output from acceptance testing:
I haven't added/updated any acceptance testing as to test these you need to have KMS configured with CloudHSM which isn't a trivial build: https://github.com/ZeePal/test-kms-with-cloudhsm
Not sure what we would like to do as it requires
expect
scripts to automate due to the nature of the CloudHSM cli tool (cloudhsm_mgmt_util
):