Closed rubenandre closed 1 month ago
Voting for Prioritization
Volunteering to Work on This Issue
@rubenandre hi! are you working on this? We were thinking on adding the support for this feature, so happy to own it or support you if you are already working on it.
@pablo19sc hi! I worked on the service client for it. Yesterday I started to work on the first resource aws_route53profiles_profile. but I'm still trying to be more acquainted with the codebase and grasp the direction for new resources, if it's preferred to go with "terraform plugin framework" or if SDKv2 it's still acceptable.
I'd be happy to work with you on these features, but since I'm quite new to this codebase, I totally understand if you prefer to go full-on this.
Edit: Add strike-through to elements already grasped. The implementation of the first resource aws_route53profiles_profile was made in bellow attached PR using Terraform Plugin Framework.
If someone pretend to start the creation of the other resources, let me know so we could join synergies together, and avoid dual work.
@rubenandre - Is there any update on this feature?
Hi! Just to give a small update - I contacted the HC AWS provider team and they will almost certainly take this up next quarter, based on the popularity/👍🏽s on this issue. @rubenandre is dependent on their review on #37124.
@rubenandre I extended your work a bit in #38172, which is very much WIP but already has working tests for the two association resources. Hope you wouldn't mind!
@aristosvo Thank you very much. I'll not be able to move further with other resources. The Route53 profiles solution has a salty price for the use case that the company I belong to has.
Glad to see this is being tracked. Do we have any guidance on if this feature is indeed slated to be worked next quarter? I have a critical multi-account use case I am trying to establish automation for.
Does it normally take this long to get new features added into this provider? Has anyone tried deploying this with the new awscc provider? I also have an imminent need for this functionality.
Yes its a bit odd that its taken this long (several months) for this feature to be added in. #38172 is the more current PR for these resources and seems very close to being merged, but that one has been sitting idle for some time.
Hi @claytonolley @tdiener01 @ajoline 👋!
I've checked again, no commitment but it is on the list of things they will pick up provided there is good progress. Best way to show the need is still adding your '👍' on the issue.
I will try to keep the PR up to date on the newest developments in the provider, you can always start with a build based on a fork of my branch.
Has anyone tried deploying this with the new awscc provider?
Yes! Worked perfectly for me.
Has anyone tried deploying this with the new awscc provider?
Yes! Worked perfectly for me.
Also thought about that, but seems like you cannot narrow down the permissions for Cloud Control to only manage certain service/ resources in an account. Hence, the role that gets the necessary Cloud Control permissions will be able to create any resource available on awscc, right?
I am referring to the Security in AWS Cloud Control API
Has anyone tried deploying this with the new awscc provider?
Yes! Worked perfectly for me.
Also thought about that, but seems like you cannot narrow down the permissions for Cloud Control to only manage certain service/ resources in an account. Hence, the role that gets the necessary Cloud Control permissions will be able to create any resource available on awscc, right?
I am referring to the Security in AWS Cloud Control API
Thanks for this information. I've only used it in a dev environment so far, where the IAM role I use to deploy isn't very restricted. Looks like this could be an issue for me later...
[!WARNING] This issue has been closed, meaning that any additional comments are hard for our team to see. Please assume that the maintainers will not see them.
Ongoing conversations amongst community members are welcome, however, the issue will be locked after 30 days. Moving conversations to another venue, such as the AWS Provider forum, is recommended. If you have additional concerns, please open a new issue, referencing this one where needed.
Feature now exists in latest aws provider release: https://github.com/hashicorp/terraform-provider-aws/releases/tag/v5.71.0
This functionality has been released in v5.72.0 of the Terraform AWS Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading.
For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you!
Description
With Route 53 Profiles, you can apply and manage DNS-related Route 53 configurations across many VPCs and in different AWS accounts. Profiles make managing the DNS settings for many VPCs as easy as managing them for a single VPC and when you update a Profile, its settings are propagated to all the VPCs associated to the Profile. You can also share a Profile with AWS accounts in the same Regions by using AWS RAM. (extracted from: https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/profiles.html)
Requested Resource(s) and/or Data Source(s)
Resources:
Data Sources:
Potential Terraform Configuration
References
https://docs.aws.amazon.com/Route53/latest/DeveloperGuide/profiles.html
Resources:
https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_CreateProfile.html (aws_route53profiles_profile) https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_AssociateResourceToProfile.html (aws_route53profiles_resource_association) https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_AssociateProfile.html (aws_route53profiles_association)
Data Sources: https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_GetProfile.html (aws_route53profiles_profile) https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_GetProfileAssociation.html (aws_route53profiles_association) https://docs.aws.amazon.com/Route53/latest/APIReference/API_route53profiles_GetProfileResourceAssociation.html (aws_route53profiles_resource_association)
Would you like to implement a fix?
Yes