-
Notifications
You must be signed in to change notification settings - Fork 132
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding aws_msk_scram_secret_association to v1beta1 #836
Adding aws_msk_scram_secret_association to v1beta1 #836
Conversation
/test-examples="examples/kafka/scramsecretassociation.yaml" EDIT: I don't know what this is supposed to trigger or where I can see the results. |
@mbbush the test command can only be triggered by Upbound org members. |
/test-examples="examples/kafka/scramsecretassociation.yaml" |
@jeanduplessis Unfortunately I didn't get a chance to look at the logs for the test failure, and now they're expired. Could you run it again? Or even better, is there an easy way I can run the same thing locally? |
/test-examples="examples/kafka/scramsecretassociation.yaml" |
5c7d500
to
67daba6
Compare
67daba6
to
e108c80
Compare
If we can get #877 merged I can update the example to pass without manual intervention. |
e108c80
to
a813532
Compare
@turkenf this should be ready to merge. |
/test-examples="examples/kafka/scramsecretassociation.yaml" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@mbbush we have the plan to cut the release on Thursday this week. If you want to include this PR in the release, could you please remove the lines about the resource from |
Done, thanks! |
I also added a more verbose description to the secretArnList to clarify that you can really only have one ScramSecretAssociation per MSK cluster. |
Description of your changes
Added MSK scram secret association, generated from the terraform provider.
Note: the terraform provider has some open bugs related to this resource, but most significantly it seems to assume that there is at most one of these per MSK cluster. Creating more than one
aws_msk_scram_secret_association
using provider-terraform results in the two resources each attempting to make their secret the only one associated with the cluster. I'd love it if there was a way for me to make this more visible to the user. Can I just customize the description field(s) inconfig/kafka/config.go
?Fixes #43
I have:
make reviewable test
to ensure this PR is ready for review.How has this code been tested
With these managed resources in this state (applied from
examples/scramsecretassociation.yaml
,) I can see both secrets listed as associated with the MSK cluster in the aws console.make e2e UPTEST_EXAMPLE_LIST='examples/kafka/scramsecretassociation.yaml'
After a lot of babysitting, some manual intervention around the kafka cluster's configuration and a whole lot of waiting, the tests passed:
Uptest: https://github.com/upbound/provider-aws/actions/runs/6297489952