-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
f/provider - Add validation for provider session-name #18085
f/provider - Add validation for provider session-name #18085
Conversation
1edcecb
to
d3f7d38
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @pierre-borckmans 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
Pull request #21306 has significantly refactored the AWS Provider codebase. As a result, most PRs opened prior to the refactor now have merge conflicts that must be resolved before proceeding. Specifically, PR #21306 relocated the code for all AWS resources and data sources from a single We recognize that many pull requests have been open for some time without yet being addressed by our maintainers. Therefore, we want to make it clear that resolving these conflicts in no way affects the prioritization of a particular pull request. Once a pull request has been prioritized for review, the necessary changes will be made by a maintainer -- either directly or in collaboration with the pull request author. For a more complete description of this refactor, including examples of how old filepaths and function names correspond to their new counterparts: please refer to issue #20000. For a quick guide on how to amend your pull request to resolve the merge conflicts resulting from this refactor and bring it in line with our new code patterns: please refer to our Service Package Refactor Pull Request Guide. |
…n 'assume_role' configuration block.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀.
% make testacc TESTARGS='-run=TestAccAcctestProvider_AssumeRole_' PKG_NAME=internal/acctest
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/acctest/... -v -count 1 -parallel 20 -run=TestAccAcctestProvider_AssumeRole_ -timeout 180m
=== RUN TestAccAcctestProvider_AssumeRole_empty
=== PAUSE TestAccAcctestProvider_AssumeRole_empty
=== CONT TestAccAcctestProvider_AssumeRole_empty
--- PASS: TestAccAcctestProvider_AssumeRole_empty (9.43s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/acctest 13.048s
@pierre-borckmans Thanks for the contribution 🎉 👏. |
This functionality has been released in v3.71.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
@pierre-borckmans / @ewbankkit I believe due to these validations: I am now getting these sort of errors and I believe this is leading to our cicd pipelines to fail: with the following terragrunt.hcl code:
Why is an empty string not allowed? |
I think I am okay by setting a default value which can be overridden if the env_var is present:
|
…rovider-session-name f/provider - Add validation for provider session-name
The current issue we have is:
The error above leads me to this PR. And I am thinking about what the logic should the code be rather than remove these two values from our various code repos which previously works well. As the AWS docs mentioned, ExternalId and RoleSessionName are not required. Shall the code have the logic as AWS docs:
Also another suggestion: It will be appreciated to hear your feedback. Thanks |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
This PR adds validation for the provider
session-name
.The regex was found on this AWS documentation page:
https://docs.aws.amazon.com/STS/latest/APIReference/API_AssumeRole.html
Community Note
Output from acceptance testing: