Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

New resource/aws_vpc_endpoint_connection_accepter #19083

Merged

Conversation

shedimon
Copy link
Contributor

@shedimon shedimon commented Apr 23, 2021

Community Note

  • Please vote on this pull request by adding a 👍 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" or other comments that do not add relevant new information or questions, they generate extra noise for pull request followers and do not help prioritize the request

Closes #22288.

New resource justification

With the current state it is impossible to accept VPC Endpoint Connection request in AWS account, that differs from the AWS Endpoint AWS account. This PR adds the resource, that accepts the connection request.

Open questions

  1. Should state be tracked and exported as an attribute? Should we force new resource in case it's changed?
  2. I've failed to run the test config with the alternate provider, since it failed on missing the security token and session token for the assumed role. I've ran it using the inlined providers with assume_role configs, but removed it and replicated the approach I've discovered in the source code.

Output from acceptance testing:

make testacc TEST=./aws TESTARGS='-run=TestAccVpcEndpointServiceAccepter_crossAccount'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./aws -v -count 1 -parallel 20 -run=TestAccVpcEndpointServiceAccepter_crossAccount -timeout 180m
=== RUN   TestAccVpcEndpointServiceAccepter_crossAccount
--- PASS: TestAccVpcEndpointServiceAccepter_crossAccount (425.90s)
PASS
ok  	github.com/terraform-providers/terraform-provider-aws/aws	428.578s

@shedimon shedimon requested a review from a team as a code owner April 23, 2021 14:55
@ghost ghost added size/XL Managed by automation to categorize the size of a PR. documentation Introduces or discusses updates to documentation. provider Pertains to the provider itself, rather than any interaction with AWS. service/ec2 Issues and PRs that pertain to the ec2 service. tests PRs: expanded test coverage. Issues: expanded coverage, enhancements to test infrastructure. labels Apr 23, 2021
@github-actions github-actions bot added the needs-triage Waiting for first response or review from a maintainer. label Apr 23, 2021
@shedimon shedimon force-pushed the f-aws_vpc_endpoint_connection_accepter branch from ce03f54 to 2509981 Compare April 23, 2021 16:52
@shedimon
Copy link
Contributor Author

shedimon commented Apr 26, 2021

Hi @bflad @ewbankkit @anGie44 could you please take a look at this PR? There are some questions regarding linting and computed attributes.

  • AWS Go SDK pointer conversion function for d.Set() value is extraneous:
    d.Set("state", aws.StringValue(vpceConn.(ec2.VpcEndpointConnection).VpcEndpointState))

  • AWSAT005: avoid hardcoded ARN AWS partitions, use aws_partition data source:
    allowed_principals = ["arn:aws:iam::${data.aws_caller_identity.alternate.account_id}:root"]

UPD: Should be fixed by dd9e969. The questions regarding the state attribute in the next comment are still relevant.

@shedimon
Copy link
Contributor Author

shedimon commented Apr 26, 2021

The issue with the connection state seems a bit tricky. You can reject and then accept the connection again. From my perspective if connection was rejected in the UI connection_accepter resource should try and re-create itself - accept the connection from the endpoint to the service again. Or it can be destroyed and removed from the config. What is the right way to make such changes with the Computed attribute?

@breathingdust breathingdust added new-resource Introduces a new resource. and removed needs-triage Waiting for first response or review from a maintainer. labels Sep 4, 2021
@zhelding
Copy link
Contributor

Pull request #21306 has significantly refactored the AWS Provider codebase. As a result, most PRs opened prior to the refactor now have merge conflicts that must be resolved before proceeding.

Specifically, PR #21306 relocated the code for all AWS resources and data sources from a single aws directory to a large number of separate directories in internal/service, each corresponding to a particular AWS service. This separation of code has also allowed for us to simplify the names of underlying functions -- while still avoiding namespace collisions.

We recognize that many pull requests have been open for some time without yet being addressed by our maintainers. Therefore, we want to make it clear that resolving these conflicts in no way affects the prioritization of a particular pull request. Once a pull request has been prioritized for review, the necessary changes will be made by a maintainer -- either directly or in collaboration with the pull request author.

For a more complete description of this refactor, including examples of how old filepaths and function names correspond to their new counterparts: please refer to issue #20000.

For a quick guide on how to amend your pull request to resolve the merge conflicts resulting from this refactor and bring it in line with our new code patterns: please refer to our Service Package Refactor Pull Request Guide.

@ewbankkit ewbankkit force-pushed the f-aws_vpc_endpoint_connection_accepter branch from ecb8546 to d364bdb Compare December 21, 2021 14:56
…t_id'.

Acceptance test output:

% make testacc PKG=ec2 TESTS=TestAccEC2VPCEndpointConnectionAccepter_
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/ec2/... -v -count 1 -parallel 20 -run='TestAccEC2VPCEndpointConnectionAccepter_' -timeout 180m
=== RUN   TestAccEC2VPCEndpointConnectionAccepter_crossAccount
--- PASS: TestAccEC2VPCEndpointConnectionAccepter_crossAccount (352.10s)
PASS
ok  	github.com/hashicorp/terraform-provider-aws/internal/service/ec2	355.650s
…_service_id'.

Acceptance test output:

% make testacc PKG=ec2 TESTS=TestAccEC2VPCEndpointConnectionAccepter_
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/ec2/... -v -count 1 -parallel 20 -run='TestAccEC2VPCEndpointConnectionAccepter_' -timeout 180m
=== RUN   TestAccEC2VPCEndpointConnectionAccepter_crossAccount
--- PASS: TestAccEC2VPCEndpointConnectionAccepter_crossAccount (399.50s)
PASS
ok  	github.com/hashicorp/terraform-provider-aws/internal/service/ec2	405.824s
Copy link
Contributor

@ewbankkit ewbankkit left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM 🚀.

% make testacc PKG=ec2 TESTS=TestAccEC2VPCEndpointConnectionAccepter_                     
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/ec2/... -v -count 1 -parallel 20 -run='TestAccEC2VPCEndpointConnectionAccepter_' -timeout 180m
=== RUN   TestAccEC2VPCEndpointConnectionAccepter_crossAccount
--- PASS: TestAccEC2VPCEndpointConnectionAccepter_crossAccount (361.52s)
PASS
ok  	github.com/hashicorp/terraform-provider-aws/internal/service/ec2	365.176s

@ewbankkit
Copy link
Contributor

@shedimon Thanks for the contribution 🎉 👏.
In general everything was great.
I refactored to fit into the new per-service package structure and renamed the attributes to match other resources:

  • state -> vpc_endpoint_state
  • endpoint_id -> vpc_endpoint_id
  • service_id -> vpc_endpoint_service_id

@ewbankkit ewbankkit merged commit 82b69c0 into hashicorp:main Dec 21, 2021
@github-actions github-actions bot added this to the v3.71.0 milestone Dec 21, 2021
@shedimon
Copy link
Contributor Author

Hi @ewbankkit, thanks a lot!

Happy holidays! :)

@shedimon shedimon deleted the f-aws_vpc_endpoint_connection_accepter branch December 22, 2021 07:27
@github-actions
Copy link

github-actions bot commented Jan 6, 2022

This functionality has been released in v3.71.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.

For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!

@github-actions
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators May 30, 2022
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
documentation Introduces or discusses updates to documentation. new-resource Introduces a new resource. provider Pertains to the provider itself, rather than any interaction with AWS. service/ec2 Issues and PRs that pertain to the ec2 service. size/XL Managed by automation to categorize the size of a PR. tests PRs: expanded test coverage. Issues: expanded coverage, enhancements to test infrastructure.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Provide a way to accept VPC Endpoints when the VPC Endpoint Service is managed in a separate account
4 participants