Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New Data Source: aws_s3_bucket_policy #17738

Merged
merged 24 commits into from
Apr 21, 2022

Conversation

yuonoda
Copy link
Contributor

@yuonoda yuonoda commented Feb 21, 2021

Community Note

  • Please vote on this pull request by adding a 👍 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for pull request followers and do not help prioritize the request

Closes #17649.
Relates #6334.

Output from acceptance testing:

$ make testacc TEST=./aws TESTARGS='-run=TestAccDataSourceS3BucketPolicy_basic'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccDataSourceS3BucketPolicy_basic -timeout 120m
=== RUN   TestAccDataSourceS3BucketPolicy_basic
=== PAUSE TestAccDataSourceS3BucketPolicy_basic
=== CONT  TestAccDataSourceS3BucketPolicy_basic
--- PASS: TestAccDataSourceS3BucketPolicy_basic (94.96s)
PASS
ok      github.com/terraform-providers/terraform-provider-aws/aws       99.214s

@ghost ghost added size/L Managed by automation to categorize the size of a PR. provider Pertains to the provider itself, rather than any interaction with AWS. service/s3 Issues and PRs that pertain to the s3 service. tests PRs: expanded test coverage. Issues: expanded coverage, enhancements to test infrastructure. labels Feb 21, 2021
@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label Feb 21, 2021
@ghost ghost added the documentation Introduces or discusses updates to documentation. label Feb 23, 2021
@yuonoda yuonoda marked this pull request as ready for review February 23, 2021 03:56
@yuonoda yuonoda requested a review from a team as a code owner February 23, 2021 03:56
}

output "foo" {
value = data.aws_s3_bucket_policy.policy
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

should this be data.aws_s3_bucket_policy.policy.policy?

@breathingdust breathingdust added new-data-source Introduces a new data source. and removed needs-triage Waiting for first response or review from a maintainer. labels Sep 4, 2021
@zhelding
Copy link
Contributor

Pull request #21306 has significantly refactored the AWS Provider codebase. As a result, most PRs opened prior to the refactor now have merge conflicts that must be resolved before proceeding.

Specifically, PR #21306 relocated the code for all AWS resources and data sources from a single aws directory to a large number of separate directories in internal/service, each corresponding to a particular AWS service. This separation of code has also allowed for us to simplify the names of underlying functions -- while still avoiding namespace collisions.

We recognize that many pull requests have been open for some time without yet being addressed by our maintainers. Therefore, we want to make it clear that resolving these conflicts in no way affects the prioritization of a particular pull request. Once a pull request has been prioritized for review, the necessary changes will be made by a maintainer -- either directly or in collaboration with the pull request author.

For a more complete description of this refactor, including examples of how old filepaths and function names correspond to their new counterparts: please refer to issue #20000.

For a quick guide on how to amend your pull request to resolve the merge conflicts resulting from this refactor and bring it in line with our new code patterns: please refer to our Service Package Refactor Pull Request Guide.

@github-actions github-actions bot added the service/kms Issues and PRs that pertain to the kms service. label Apr 20, 2022
@github-actions github-actions bot removed the service/kms Issues and PRs that pertain to the kms service. label Apr 20, 2022
johnsonaj added a commit to yuonoda/terraform-provider-aws that referenced this pull request Apr 20, 2022
@johnsonaj johnsonaj force-pushed the f-data_source_aws_s3_bucket_policy branch from 43f1e9d to b6dce67 Compare April 20, 2022 22:51
@johnsonaj
Copy link
Contributor

johnsonaj commented Apr 21, 2022

LGTM 🚀

Commercial

% make testacc TESTS=TestAccDataSourceBucketPolicy_ PKG=s3
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/s3/... -v -count 1 -parallel 20 -run='TestAccDataSourceBucketPolicy_'  -timeout 180m
=== RUN   TestAccDataSourceBucketPolicy_basic
=== PAUSE TestAccDataSourceBucketPolicy_basic
=== CONT  TestAccDataSourceBucketPolicy_basic
--- PASS: TestAccDataSourceBucketPolicy_basic (16.39s)
PASS

Gov cloud

% make testacc TESTS=TestAccDataSourceBucketPolicy_ PKG=s3
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/s3/... -v -count 1 -parallel 20 -run='TestAccDataSourceBucketPolicy_'  -timeout 180m
=== RUN   TestAccDataSourceBucketPolicy_basic
=== PAUSE TestAccDataSourceBucketPolicy_basic
=== CONT  TestAccDataSourceBucketPolicy_basic
--- PASS: TestAccDataSourceBucketPolicy_basic (14.64s)
PASS

@johnsonaj
Copy link
Contributor

@yuonoda Thanks for the contribution! 🎉 👏🏾

@johnsonaj johnsonaj merged commit aa96ab4 into hashicorp:main Apr 21, 2022
@github-actions github-actions bot added this to the v4.11.0 milestone Apr 21, 2022
@github-actions
Copy link

This functionality has been released in v4.11.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!

@yermulnik
Copy link

@yuonoda Could there be an option to not fail but return an empty object (along with a warning message) for when S3 bucket has no bucket policy attached?
My use case is to amend policy of manually created S3 bucket hence I use source_policy_documents parameter within aws_iam_policy_document resource and the input for this parameter is retrieved by means of aws_s3_bucket_policy data source which obviously fails with Error: failed getting S3 bucket policy (my-cool-bucket-name): couldn't find resource when bucket policy doesn't exist at all.
Thanks

@github-actions
Copy link

github-actions bot commented Jun 6, 2022

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Jun 6, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
documentation Introduces or discusses updates to documentation. new-data-source Introduces a new data source. provider Pertains to the provider itself, rather than any interaction with AWS. service/s3 Issues and PRs that pertain to the s3 service. size/L Managed by automation to categorize the size of a PR. tests PRs: expanded test coverage. Issues: expanded coverage, enhancements to test infrastructure.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

aws_s3_bucket_policy data source
6 participants