-
Notifications
You must be signed in to change notification settings - Fork 9.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
F finspace kx environment nacls #33123
F finspace kx environment nacls #33123
Conversation
Community NoteVoting for Prioritization
For Submitters
|
…s/terraform-provider-aws into f-finspace_kx_environment-nacls
…etwork_acl_configuration args
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM 🚀
% make testacc PKG=finspace TESTS=TestAccFinSpaceKxEnvironment_
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./internal/service/finspace/... -v -count 1 -parallel 20 -run='TestAccFinSpaceKxEnvironment_' -timeout 180m
=== RUN TestAccFinSpaceKxEnvironment_basic
=== PAUSE TestAccFinSpaceKxEnvironment_basic
=== RUN TestAccFinSpaceKxEnvironment_disappears
=== PAUSE TestAccFinSpaceKxEnvironment_disappears
=== RUN TestAccFinSpaceKxEnvironment_updateName
=== PAUSE TestAccFinSpaceKxEnvironment_updateName
=== RUN TestAccFinSpaceKxEnvironment_description
=== PAUSE TestAccFinSpaceKxEnvironment_description
=== RUN TestAccFinSpaceKxEnvironment_customDNS
=== PAUSE TestAccFinSpaceKxEnvironment_customDNS
=== RUN TestAccFinSpaceKxEnvironment_transitGateway
=== PAUSE TestAccFinSpaceKxEnvironment_transitGateway
=== RUN TestAccFinSpaceKxEnvironment_attachmentNetworkACLConfiguration
=== PAUSE TestAccFinSpaceKxEnvironment_attachmentNetworkACLConfiguration
=== RUN TestAccFinSpaceKxEnvironment_tags
=== PAUSE TestAccFinSpaceKxEnvironment_tags
=== CONT TestAccFinSpaceKxEnvironment_basic
=== CONT TestAccFinSpaceKxEnvironment_customDNS
=== CONT TestAccFinSpaceKxEnvironment_description
=== CONT TestAccFinSpaceKxEnvironment_updateName
=== CONT TestAccFinSpaceKxEnvironment_disappears
=== CONT TestAccFinSpaceKxEnvironment_attachmentNetworkACLConfiguration
=== CONT TestAccFinSpaceKxEnvironment_tags
=== CONT TestAccFinSpaceKxEnvironment_transitGateway
--- PASS: TestAccFinSpaceKxEnvironment_basic (1063.24s)
--- PASS: TestAccFinSpaceKxEnvironment_description (1185.44s)
--- PASS: TestAccFinSpaceKxEnvironment_updateName (1207.15s)
--- PASS: TestAccFinSpaceKxEnvironment_disappears (1211.73s)
--- PASS: TestAccFinSpaceKxEnvironment_tags (1225.83s)
--- PASS: TestAccFinSpaceKxEnvironment_customDNS (1667.83s)
--- PASS: TestAccFinSpaceKxEnvironment_transitGateway (1806.95s)
--- PASS: TestAccFinSpaceKxEnvironment_attachmentNetworkACLConfiguration (2409.77s)
PASS
ok github.com/hashicorp/terraform-provider-aws/internal/service/finspace 2412.750s
Thanks for your contribution, @kavan-aws! 👏 |
This functionality has been released in v5.14.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Description
This pull request introduces the option to specify network ACLs during environment creation and updates as part of a transit gateway configuration.
Relations
Relates #31802
References
AWS documentation API reference involving the new feature: https://docs.aws.amazon.com/finspace/latest/management-api/API_TransitGatewayConfiguration.html
Output from Acceptance Testing