Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Add support for CreateVPCAssociationAuthorization AWS API #10208

Closed
rginev opened this issue Nov 18, 2016 · 7 comments
Closed

Comments

@rginev
Copy link

rginev commented Nov 18, 2016

Hey there,

Terraform does have route53_zone_association resource, but it works for private zones and VPCs in the same AWS account.
If you want to associate a VPC that you created with one AWS account with a private hosted zone that you created with a different account you had to ask AWS support to create authorisation manually.
Now they added an API for this. It would be great to have this implemented in terraform e.g. new resource.

Thanks in advance!

References

@bigkraig
Copy link
Contributor

Terraform will also need to be modified on how it detects if a zone is associated. I get errors that I am unable to access the resource (after it takes 30+ seconds to create the association) but when I run a aws cli, I see that it made the association successfully.

@druidsbane
Copy link

This would definitely be useful as I've just run into this issue myself.

@RyanJarv
Copy link

So the issue right now is there doesn't seem to be a way to check what zones are associated with a VPC without access to the zone. You can verify that the change completed successfully but if the association was ever modified outside of terraform the account that created the association wouldn't be able to detect this.

@opetch
Copy link

opetch commented Mar 1, 2018

I've created the following module which by no means solves this issue but provides me with an alternative in the meantime.
https://github.com/opetch/terraform-aws-cli-resource

@bevanbennett
Copy link

Just as a note... when dealing with cross-account aws_route53_zone_association resources:

  1. To CREATE the association the resource provider needs to point to the owner of the VPC
    After creation terraform will generate the following error:
  • aws_route53_zone_association.allowlocal: AccessDenied: User: arn:aws:iam::111111111111111:user/terraform_user is not authorized to access this resource
    status code: 403, request id: REDACTED
  1. To VERIFY the association the resource provider needs to be switched to the owner of the ZONE

This should not effect the ability to run create-vpc-association-authorization, which needs to be executed as the owner of the ZONE. Our current process is:

  • manually run create-vpc-association-authorization from the CLI
  • temporarily edit the aws_route53_zone_association resource to swap provider to the VPC owner
  • Run TF. Ignore the error.
  • Undo the provider swap and verify plan is clean

@emulanob
Copy link

Will this ever gonna be tackled?

@ghost
Copy link

ghost commented Aug 13, 2019

I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.

If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@ghost ghost locked and limited conversation to collaborators Aug 13, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

9 participants