-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add support for AllowClassicFlow to the Cognito Identity Pool resource. #19176
Conversation
This adds an allow_classic_flow attribute to the aws_cognito_identity_pool resource type. Fix hashicorp#12926
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @dtascione 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
@dtascione Thanks for the contribution 👏. |
Sorry -- it looks like because I created this from a fork in an organization, it won't let me change that setting. I can re-create this PR under my individual user account if that makes it easier. |
@dtascione No need for that.
```release-note:enhancement
If you could make those 2 additions then this LGTM. |
Thanks! Updated! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
Commercial
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSCognitoIdentityPool_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSCognitoIdentityPool_ -timeout 180m
=== RUN TestAccAWSCognitoIdentityPool_basic
=== PAUSE TestAccAWSCognitoIdentityPool_basic
=== RUN TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== PAUSE TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== RUN TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== PAUSE TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== RUN TestAccAWSCognitoIdentityPool_samlProviderArns
=== PAUSE TestAccAWSCognitoIdentityPool_samlProviderArns
=== RUN TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== PAUSE TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== RUN TestAccAWSCognitoIdentityPool_addingNewProviderKeepsOldProvider
--- PASS: TestAccAWSCognitoIdentityPool_addingNewProviderKeepsOldProvider (30.73s)
=== RUN TestAccAWSCognitoIdentityPool_tags
=== PAUSE TestAccAWSCognitoIdentityPool_tags
=== CONT TestAccAWSCognitoIdentityPool_basic
=== CONT TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== CONT TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== CONT TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== CONT TestAccAWSCognitoIdentityPool_samlProviderArns
=== CONT TestAccAWSCognitoIdentityPool_tags
--- PASS: TestAccAWSCognitoIdentityPool_basic (26.16s)
--- PASS: TestAccAWSCognitoIdentityPool_supportedLoginProviders (34.45s)
--- PASS: TestAccAWSCognitoIdentityPool_openidConnectProviderArns (36.24s)
--- PASS: TestAccAWSCognitoIdentityPool_tags (37.81s)
--- PASS: TestAccAWSCognitoIdentityPool_cognitoIdentityProviders (37.85s)
--- PASS: TestAccAWSCognitoIdentityPool_samlProviderArns (38.06s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 72.376s
GovCloud
% make testacc TEST=./aws TESTARGS='-run=TestAccAWSCognitoIdentityPool_'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccAWSCognitoIdentityPool_ -timeout 180m
=== RUN TestAccAWSCognitoIdentityPool_basic
=== PAUSE TestAccAWSCognitoIdentityPool_basic
=== RUN TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== PAUSE TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== RUN TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== PAUSE TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== RUN TestAccAWSCognitoIdentityPool_samlProviderArns
=== PAUSE TestAccAWSCognitoIdentityPool_samlProviderArns
=== RUN TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== PAUSE TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== RUN TestAccAWSCognitoIdentityPool_addingNewProviderKeepsOldProvider
--- PASS: TestAccAWSCognitoIdentityPool_addingNewProviderKeepsOldProvider (41.60s)
=== RUN TestAccAWSCognitoIdentityPool_tags
=== PAUSE TestAccAWSCognitoIdentityPool_tags
=== CONT TestAccAWSCognitoIdentityPool_basic
=== CONT TestAccAWSCognitoIdentityPool_cognitoIdentityProviders
=== CONT TestAccAWSCognitoIdentityPool_openidConnectProviderArns
=== CONT TestAccAWSCognitoIdentityPool_samlProviderArns
=== CONT TestAccAWSCognitoIdentityPool_supportedLoginProviders
=== CONT TestAccAWSCognitoIdentityPool_tags
--- PASS: TestAccAWSCognitoIdentityPool_basic (32.62s)
--- PASS: TestAccAWSCognitoIdentityPool_supportedLoginProviders (44.51s)
--- PASS: TestAccAWSCognitoIdentityPool_tags (44.54s)
--- PASS: TestAccAWSCognitoIdentityPool_cognitoIdentityProviders (45.52s)
--- PASS: TestAccAWSCognitoIdentityPool_openidConnectProviderArns (45.55s)
--- PASS: TestAccAWSCognitoIdentityPool_samlProviderArns (47.68s)
PASS
ok github.com/terraform-providers/terraform-provider-aws/aws 92.171s
This has been released in version 3.39.0 of the Terraform AWS provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template for triage. Thanks! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
This adds an allow_classic_flow attribute to the aws_cognito_identity_pool
resource type. The default was chosen based on the current default when
using the AWS APIs directly.
Closes #12926
Community Note
Output from acceptance testing: