Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

ISO-Friendly tagging fixups #22559

Merged
merged 9 commits into from Jan 13, 2022
Merged
Show file tree
Hide file tree
Changes from 8 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
4 changes: 2 additions & 2 deletions .golangci.yml
Expand Up @@ -48,8 +48,8 @@ linters-settings:
- request.WithWaiterMaxAttempts
# AWS Provider
- mapMaxItems
- wafv2RootStatementSchema
- wafv2WebACLRootStatementSchema
- rootStatementSchema
- webACLRootStatementSchema
- nullable.*
- sweep.SweepOrchestratorContext
# Terraform Plugin SDK
Expand Down
2 changes: 1 addition & 1 deletion internal/service/ecr/repository.go
Expand Up @@ -156,7 +156,7 @@ func resourceRepositoryCreate(d *schema.ResourceData, meta interface{}) error {

// Some partitions (i.e., ISO) may not support tag-on-create, attempt tag after create
if input.Tags == nil && len(tags) > 0 && meta.(*conns.AWSClient).Partition != endpoints.AwsPartitionID {
err := UpdateTags(conn, d.Id(), nil, tags)
err := UpdateTags(conn, aws.StringValue(repository.RepositoryArn), nil, tags)

// If default tags only, log and continue. Otherwise, error.
if v, ok := d.GetOk("tags"); (!ok || len(v.(map[string]interface{})) == 0) && (tfawserr.ErrCodeContains(err, ErrCodeAccessDenied) || tfawserr.ErrCodeContains(err, ecr.ErrCodeInvalidParameterException) || tfawserr.ErrCodeContains(err, ecr.ErrCodeValidationException)) {
Expand Down
4 changes: 2 additions & 2 deletions internal/service/ecs/capacity_provider.go
Expand Up @@ -136,6 +136,8 @@ func resourceCapacityProviderCreate(d *schema.ResourceData, meta interface{}) er
return fmt.Errorf("error creating ECS Capacity Provider (%s): %w", name, err)
}

d.SetId(aws.StringValue(output.CapacityProvider.CapacityProviderArn))

// Some partitions (i.e., ISO) may not support tag-on-create, attempt tag after create
if input.Tags == nil && len(tags) > 0 {
err := UpdateTags(conn, d.Id(), nil, tags)
Expand All @@ -151,8 +153,6 @@ func resourceCapacityProviderCreate(d *schema.ResourceData, meta interface{}) er
}
}

d.SetId(aws.StringValue(output.CapacityProvider.CapacityProviderArn))

return resourceCapacityProviderRead(d, meta)
}

Expand Down
2 changes: 1 addition & 1 deletion internal/service/ecs/task_definition.go
Expand Up @@ -540,7 +540,7 @@ func resourceTaskDefinitionCreate(d *schema.ResourceData, meta interface{}) erro

// Some partitions (i.e., ISO) may not support tag-on-create, attempt tag after create
if input.Tags == nil && len(tags) > 0 {
err := UpdateTags(conn, d.Id(), nil, tags)
err := UpdateTags(conn, aws.StringValue(taskDefinition.TaskDefinitionArn), nil, tags)

// If default tags only, log and continue. Otherwise, error.
if v, ok := d.GetOk("tags"); (!ok || len(v.(map[string]interface{})) == 0) && (tfawserr.ErrCodeContains(err, ecs.ErrCodeAccessDeniedException) || tfawserr.ErrCodeContains(err, ecs.ErrCodeInvalidParameterException) || tfawserr.ErrCodeContains(err, ecs.ErrCodeUnsupportedFeatureException)) {
Expand Down
2 changes: 1 addition & 1 deletion internal/service/ecs/task_set.go
Expand Up @@ -359,7 +359,7 @@ func resourceTaskSetCreate(d *schema.ResourceData, meta interface{}) error {

// Some partitions (i.e., ISO) may not support tag-on-create, attempt tag after create
if input.Tags == nil && len(tags) > 0 {
err := UpdateTags(conn, d.Id(), nil, tags)
err := UpdateTags(conn, aws.StringValue(output.TaskSet.TaskSetArn), nil, tags)

if v, ok := d.GetOk("tags"); (!ok || len(v.(map[string]interface{})) == 0) && (tfawserr.ErrCodeContains(err, ecs.ErrCodeAccessDeniedException) || tfawserr.ErrCodeContains(err, ecs.ErrCodeInvalidParameterException) || tfawserr.ErrCodeContains(err, ecs.ErrCodeUnsupportedFeatureException)) {
// If default tags only, log and continue. Otherwise, error.
Expand Down
6 changes: 3 additions & 3 deletions internal/service/events/bus.go
Expand Up @@ -68,13 +68,13 @@ func resourceBusCreate(d *schema.ResourceData, meta interface{}) error {

log.Printf("[DEBUG] Creating EventBridge event bus: %v", input)

_, err := conn.CreateEventBus(input)
output, err := conn.CreateEventBus(input)

// Some partitions may not support tag-on-create
if input.Tags != nil && (tfawserr.ErrCodeContains(err, ErrCodeAccessDenied) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeInternalException) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeOperationDisabledException)) {
log.Printf("[WARN] EventBridge Bus (%s) create failed (%s) with tags. Trying create without tags.", d.Id(), err)
input.Tags = nil
_, err = conn.CreateEventBus(input)
output, err = conn.CreateEventBus(input)
}

if err != nil {
Expand All @@ -87,7 +87,7 @@ func resourceBusCreate(d *schema.ResourceData, meta interface{}) error {

// Post-create tagging supported in some partitions
if input.Tags == nil && len(tags) > 0 {
err := UpdateTags(conn, d.Id(), nil, tags)
err := UpdateTags(conn, aws.StringValue(output.EventBusArn), nil, tags)

if v, ok := d.GetOk("tags"); (!ok || len(v.(map[string]interface{})) == 0) && (tfawserr.ErrCodeContains(err, ErrCodeAccessDenied) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeInternalException) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeOperationDisabledException)) {
log.Printf("[WARN] error adding tags after create for EventBridge Bus (%s): %s", d.Id(), err)
Expand Down
4 changes: 4 additions & 0 deletions internal/service/events/consts.go
Expand Up @@ -7,3 +7,7 @@ const (
const (
DefaultEventBusName = "default"
)

const (
mapMaxItemsCount = 100
)
24 changes: 17 additions & 7 deletions internal/service/events/rule.go
Expand Up @@ -121,13 +121,13 @@ func resourceRuleCreate(d *schema.ResourceData, meta interface{}) error {

log.Printf("[DEBUG] Creating EventBridge Rule: %s", input)

err = retryPutRule(conn, input)
arn, err := retryPutRule(conn, input)

// Some partitions may not support tag-on-create
if input.Tags != nil && (tfawserr.ErrCodeContains(err, ErrCodeAccessDenied) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeInternalException) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeOperationDisabledException)) {
log.Printf("[WARN] EventBridge Rule (%s) create failed (%s) with tags. Trying create without tags.", d.Id(), err)
input.Tags = nil
err = retryPutRule(conn, input)
arn, err = retryPutRule(conn, input)
}

if err != nil {
Expand All @@ -138,7 +138,7 @@ func resourceRuleCreate(d *schema.ResourceData, meta interface{}) error {

// Post-create tagging supported in some partitions
if input.Tags == nil && len(tags) > 0 {
err := UpdateTags(conn, d.Id(), nil, tags)
err := UpdateTags(conn, arn, nil, tags)

if v, ok := d.GetOk("tags"); (!ok || len(v.(map[string]interface{})) == 0) && (tfawserr.ErrCodeContains(err, ErrCodeAccessDenied) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeInternalException) || tfawserr.ErrCodeContains(err, eventbridge.ErrCodeOperationDisabledException)) {
log.Printf("[WARN] error adding tags after create for EventBridge Rule (%s): %s", d.Id(), err)
Expand Down Expand Up @@ -329,9 +329,11 @@ func resourceRuleDelete(d *schema.ResourceData, meta interface{}) error {
return nil
}

func retryPutRule(conn *eventbridge.EventBridge, input *eventbridge.PutRuleInput) error {
func retryPutRule(conn *eventbridge.EventBridge, input *eventbridge.PutRuleInput) (string, error) {
var output *eventbridge.PutRuleOutput
err := resource.Retry(tfiam.PropagationTimeout, func() *resource.RetryError {
_, err := conn.PutRule(input)
var err error
output, err = conn.PutRule(input)

if tfawserr.ErrMessageContains(err, "ValidationException", "cannot be assumed by principal") {
return resource.RetryableError(err)
Expand All @@ -345,10 +347,18 @@ func retryPutRule(conn *eventbridge.EventBridge, input *eventbridge.PutRuleInput
})

if tfresource.TimedOut(err) {
_, err = conn.PutRule(input)
output, err = conn.PutRule(input)
}

if err != nil {
return "", err
}

if output == nil || output.RuleArn == nil {
return "", fmt.Errorf("empty output returned putting EventBridge Rule (%s)", aws.StringValue(input.EventBusName))
}

return err
return aws.StringValue(output.RuleArn), nil
}

func buildPutRuleInputStruct(d *schema.ResourceData, name string) (*eventbridge.PutRuleInput, error) {
Expand Down
2 changes: 1 addition & 1 deletion internal/service/events/target.go
Expand Up @@ -335,7 +335,7 @@ func ResourceTarget() *schema.Resource {
Optional: true,
Elem: &schema.Schema{Type: schema.TypeString},
ValidateFunc: validation.All(
mapMaxItems(100),
mapMaxItems(mapMaxItemsCount),
mapKeysDoNotMatch(regexp.MustCompile(`^AWS.*$`), "input_path must not start with \"AWS\""),
),
},
Expand Down
4 changes: 4 additions & 0 deletions internal/service/iam/consts.go
Expand Up @@ -3,3 +3,7 @@ package iam
const (
ErrCodeAccessDenied = "AccessDenied"
)

const (
policyModelMarshallJSONStartSliceSize = 2
)
2 changes: 1 addition & 1 deletion internal/service/iam/policy_model.go
Expand Up @@ -110,7 +110,7 @@ func (ps IAMPolicyStatementPrincipalSet) MarshalJSON() ([]byte, error) {
raw[p.Type] = i
case string:
// Convert to []string to stop drop of principals
raw[p.Type] = make([]string, 0, 2)
raw[p.Type] = make([]string, 0, policyModelMarshallJSONStartSliceSize)
raw[p.Type] = append(raw[p.Type].([]string), v)
raw[p.Type] = append(raw[p.Type].([]string), i)
case []string:
Expand Down
6 changes: 3 additions & 3 deletions internal/service/s3/bucket_notification.go
Expand Up @@ -163,7 +163,7 @@ func resourceBucketNotificationPut(d *schema.ResourceData, meta interface{}) err
}

// Filter
filterRules := make([]*s3.FilterRule, 0, 2)
filterRules := make([]*s3.FilterRule, 0, filterRulesSliceStartLen)
if val, ok := c["filter_prefix"].(string); ok && val != "" {
filterRule := &s3.FilterRule{
Name: aws.String("prefix"),
Expand Down Expand Up @@ -216,7 +216,7 @@ func resourceBucketNotificationPut(d *schema.ResourceData, meta interface{}) err
}

// Filter
filterRules := make([]*s3.FilterRule, 0, 2)
filterRules := make([]*s3.FilterRule, 0, filterRulesSliceStartLen)
if val, ok := c["filter_prefix"].(string); ok && val != "" {
filterRule := &s3.FilterRule{
Name: aws.String("prefix"),
Expand Down Expand Up @@ -269,7 +269,7 @@ func resourceBucketNotificationPut(d *schema.ResourceData, meta interface{}) err
}

// Filter
filterRules := make([]*s3.FilterRule, 0, 2)
filterRules := make([]*s3.FilterRule, 0, filterRulesSliceStartLen)
if val, ok := c["filter_prefix"].(string); ok && val != "" {
filterRule := &s3.FilterRule{
Name: aws.String("prefix"),
Expand Down
5 changes: 5 additions & 0 deletions internal/service/s3/consts.go
@@ -0,0 +1,5 @@
package s3

const (
filterRulesSliceStartLen = 2
)
6 changes: 6 additions & 0 deletions internal/service/wafv2/consts.go
@@ -0,0 +1,6 @@
package wafv2

const (
rootStatementSchemaLevel = 3
webACLRootStatementSchemaLevel = 3
)