-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support AWS PrivateLink for AWS Services #2253
Conversation
e01a9d0
to
12ebc3f
Compare
76194fc
to
0bd6644
Compare
OK, finally completed this. |
Acceptance tests:
|
0bd6644
to
ee5d198
Compare
Removed WIP. |
VpcId: aws.String(d.Get("vpc_id").(string)), | ||
ServiceName: aws.String(d.Get("service_name").(string)), | ||
func resourceAwsVpcEndpointCreate(d *schema.ResourceData, meta interface{}) error { | ||
if d.Get("vpc_endpoint_type").(string) == ec2.VpcEndpointTypeInterface && |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we can now replace this "apply-time" logic with "plan-time" logic using these changes.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I can't get the "plan-time" logic
CustomizeDiff: func(diff *schema.ResourceDiff, v interface{}) error {
if diff.Get("vpc_endpoint_type").(string) == ec2.VpcEndpointTypeInterface {
_, new := diff.GetChange("security_group_ids")
if new.(*schema.Set).Len() == 0 {
return errors.New("An Interface VPC Endpoint must always have at least one Security Group")
}
}
return nil
},
to work - the new length is always 0 when creating the resource the first time.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Rebased and added the |
Any idea when this might be good to go? |
Work merged in to #2515. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. Thanks! |
Fixes #2222.
aws_vpc_endpoint_service
data source - Updateaws_vpc_endpoint
data source - Updateaws_vpc_endpoint
resource - Updateaws_vpc_endpoint_subnet_association
resource - Newaws_vpc_endpoint_security_group_association
resource - New