Skip to content

Commit

Permalink
Merge pull request #7578 from kl4w/kinesis-firehose-input
Browse files Browse the repository at this point in the history
fix kinesis firehose input creation
  • Loading branch information
bflad committed Feb 22, 2019
2 parents 48bef30 + 36157c1 commit 3d3e607
Show file tree
Hide file tree
Showing 2 changed files with 136 additions and 5 deletions.
5 changes: 5 additions & 0 deletions aws/resource_aws_kinesis_analytics_application.go
Original file line number Diff line number Diff line change
Expand Up @@ -582,9 +582,14 @@ func resourceAwsKinesisAnalyticsApplicationCreate(d *schema.ResourceData, meta i
err := resource.Retry(1*time.Minute, func() *resource.RetryError {
output, err := conn.CreateApplication(createOpts)
if err != nil {
// Kinesis Stream: https://github.com/terraform-providers/terraform-provider-aws/issues/7032
if isAWSErr(err, kinesisanalytics.ErrCodeInvalidArgumentException, "Kinesis Analytics service doesn't have sufficient privileges") {
return resource.RetryableError(err)
}
// Kinesis Firehose: https://github.com/terraform-providers/terraform-provider-aws/issues/7394
if isAWSErr(err, kinesisanalytics.ErrCodeInvalidArgumentException, "Kinesis Analytics doesn't have sufficient privileges") {
return resource.RetryableError(err)
}
// InvalidArgumentException: Given IAM role arn : arn:aws:iam::123456789012:role/xxx does not provide Invoke permissions on the Lambda resource : arn:aws:lambda:us-west-2:123456789012:function:yyy
if isAWSErr(err, kinesisanalytics.ErrCodeInvalidArgumentException, "does not provide Invoke permissions on the Lambda resource") {
return resource.RetryableError(err)
Expand Down
136 changes: 131 additions & 5 deletions aws/resource_aws_kinesis_analytics_application_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -126,6 +126,28 @@ func TestAccAWSKinesisAnalyticsApplication_updateCloudwatchLoggingOptions(t *tes
})
}

func TestAccAWSKinesisAnalyticsApplication_inputsKinesisFirehose(t *testing.T) {
var application kinesisanalytics.ApplicationDetail
resName := "aws_kinesis_analytics_application.test"
rInt := acctest.RandInt()

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckKinesisAnalyticsApplicationDestroy,
Steps: []resource.TestStep{
{
Config: testAccKinesisAnalyticsApplication_prereq(rInt) + testAccKinesisAnalyticsApplication_inputsKinesisFirehose(rInt),
Check: resource.ComposeTestCheckFunc(
testAccCheckKinesisAnalyticsApplicationExists(resName, &application),
resource.TestCheckResourceAttr(resName, "inputs.#", "1"),
resource.TestCheckResourceAttr(resName, "inputs.0.kinesis_firehose.#", "1"),
),
},
},
})
}

func TestAccAWSKinesisAnalyticsApplication_inputsKinesisStream(t *testing.T) {
var application kinesisanalytics.ApplicationDetail
resName := "aws_kinesis_analytics_application.test"
Expand Down Expand Up @@ -567,6 +589,93 @@ resource "aws_kinesis_analytics_application" "test" {
`, rInt, streamName, rInt, rInt)
}

func testAccKinesisAnalyticsApplication_inputsKinesisFirehose(rInt int) string {
return fmt.Sprintf(`
data "aws_iam_policy_document" "trust_firehose" {
statement = {
actions = ["sts:AssumeRole"]
principals = {
type = "Service"
identifiers = ["firehose.amazonaws.com"]
}
}
}
resource "aws_iam_role" "firehose" {
name = "testAcc-firehose-%d"
assume_role_policy = "${data.aws_iam_policy_document.trust_firehose.json}"
}
data "aws_iam_policy_document" "trust_lambda" {
statement = {
actions = ["sts:AssumeRole"]
principals = {
type = "Service"
identifiers = ["lambda.amazonaws.com"]
}
}
}
resource "aws_iam_role" "lambda" {
name = "testAcc-lambda-%d"
assume_role_policy = "${data.aws_iam_policy_document.trust_lambda.json}"
}
resource "aws_s3_bucket" "test" {
bucket = "testacc-%d"
acl = "private"
}
resource "aws_lambda_function" "test" {
filename = "test-fixtures/lambdatest.zip"
function_name = "testAcc-%d"
handler = "exports.example"
role = "${aws_iam_role.lambda.arn}"
runtime = "nodejs8.10"
}
resource "aws_kinesis_firehose_delivery_stream" "test" {
name = "testAcc-%d"
destination = "extended_s3"
extended_s3_configuration = {
role_arn = "${aws_iam_role.firehose.arn}"
bucket_arn = "${aws_s3_bucket.test.arn}"
}
}
resource "aws_kinesis_analytics_application" "test" {
name = "testAcc-%d"
code = "testCode\n"
inputs = {
name_prefix = "test_prefix"
kinesis_firehose = {
resource_arn = "${aws_kinesis_firehose_delivery_stream.test.arn}"
role_arn = "${aws_iam_role.test.arn}"
}
parallelism = {
count = 1
}
schema = {
record_columns = {
mapping = "$.test"
name = "test"
sql_type = "VARCHAR(8)"
}
record_encoding = "UTF-8"
record_format = {
mapping_parameters = {
csv = {
record_column_delimiter = ","
record_row_delimiter = "\n"
}
}
}
}
}
}
`, rInt, rInt, rInt, rInt, rInt, rInt)
}

func testAccKinesisAnalyticsApplication_inputsKinesisStream(rInt int) string {
return fmt.Sprintf(`
resource "aws_kinesis_stream" "test" {
Expand Down Expand Up @@ -889,10 +998,10 @@ resource "aws_kinesis_analytics_application" "test" {
// this is used to set up the IAM role
func testAccKinesisAnalyticsApplication_prereq(rInt int) string {
return fmt.Sprintf(`
data "aws_iam_policy_document" "test" {
statement {
data "aws_iam_policy_document" "trust" {
statement = {
actions = ["sts:AssumeRole"]
principals {
principals = {
type = "Service"
identifiers = ["kinesisanalytics.amazonaws.com"]
}
Expand All @@ -901,7 +1010,24 @@ data "aws_iam_policy_document" "test" {
resource "aws_iam_role" "test" {
name = "testAcc-%d"
assume_role_policy = "${data.aws_iam_policy_document.test.json}"
assume_role_policy = "${data.aws_iam_policy_document.trust.json}"
}
`, rInt)
data "aws_iam_policy_document" "test" {
statement = {
actions = ["firehose:*"]
resources = ["*"]
}
}
resource "aws_iam_policy" "test" {
name = "testAcc-%d"
policy = "${data.aws_iam_policy_document.test.json}"
}
resource "aws_iam_role_policy_attachment" "test" {
role = "${aws_iam_role.test.name}"
policy_arn = "${aws_iam_policy.test.arn}"
}
`, rInt, rInt)
}

0 comments on commit 3d3e607

Please sign in to comment.