-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
r/aws_rds_cluster_role_association - New resource #12370
r/aws_rds_cluster_role_association - New resource #12370
Conversation
33aa34c
to
ad113f4
Compare
ad113f4
to
cafcf3e
Compare
This comment has been minimized.
This comment has been minimized.
@breathingdust - do you think you will be able to merge it somewhen soon? we really need this feature |
cafcf3e
to
39306ae
Compare
a5894a5
to
d90b347
Compare
Co-authored-by: Matthieu ANTOINE <[email protected]>
d90b347
to
b56d161
Compare
Note that RDS Cluster IAM Role Associations can now be managed via either the aws_rds_cluster.iam_roles attribute or the aws_rds_cluster_role_association resource, not both.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
Commercial
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSRDSClusterRoleAssociation_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSRDSClusterRoleAssociation_ -timeout 180m
=== RUN TestAccAWSRDSClusterRoleAssociation_basic
=== PAUSE TestAccAWSRDSClusterRoleAssociation_basic
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears_cluster
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears_cluster
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears_role
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears_role
=== CONT TestAccAWSRDSClusterRoleAssociation_basic
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears_role
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears_cluster
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears_cluster (131.22s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears (163.37s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears_role (163.77s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_basic (165.71s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 168.798s
GovCloud
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSRDSClusterRoleAssociation_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSRDSClusterRoleAssociation_ -timeout 180m
=== RUN TestAccAWSRDSClusterRoleAssociation_basic
=== PAUSE TestAccAWSRDSClusterRoleAssociation_basic
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears_cluster
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears_cluster
=== RUN TestAccAWSRDSClusterRoleAssociation_disappears_role
=== PAUSE TestAccAWSRDSClusterRoleAssociation_disappears_role
=== CONT TestAccAWSRDSClusterRoleAssociation_basic
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears_role
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears
=== CONT TestAccAWSRDSClusterRoleAssociation_disappears_cluster
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears (124.68s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears_cluster (135.43s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_disappears_role (146.71s)
--- PASS: TestAccAWSRDSClusterRoleAssociation_basic (147.35s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 150.454s
@thehunt33r Thanks for the contribution 🎉 👏. |
Thank you @ewbankkit for all the work you've poured in this PR! I had indeed hesitated on the naming of the resource, and I also agree with Looking forward to getting this PR merged and to start using it! |
@ewbankkit & @thehunt33r - Thanks for the hard work, this will be very useful for us! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Closes #9552
Closes #13641
Release note for CHANGELOG:
Output from acceptance testing:
There seems to a problem with the
iam_roles
argument inaws_rds_cluster
, which can also be used to associate a role but only with Aurora MySQL (and doesn't allow passing a feature with the role) and I'd love to have feedback / advice on this.I have two ideas on how to fix this, but both would be breaking changes:
iam_roles
structure inaws_rds_cluster
to belist(object({role_arn=string,feature=string}))
which would allow for it to work on both MySQL and PostgreSQL.iam_roles
argument fromaws_rds_cluster
aws_db_instance
andaws_db_instance_role_association
Additionally, I am not sure on the naming. Of course, Aurora clusters use the
aws_rds_*
namespace for most of their resources, but there are some usingaws_db_cluster_*
. Happy either way.