Description
Description
Some resource types, such as those with an ARN identity, have an inherent region in their import ID, so it is redundant to append the region during import.
The PR #42549 starts the work of allowing import without an appended region. This issue will track remaining work.
To indicate that a resource type uses an ARN identity, add the annotation @ArnIdentity
. To ensure that tests are generated, add the line //go:generate go run ../../generate/identitytests/main.go
to the service's generate.go
file.
A number of annotations that control test generation can be found at https://hashicorp.github.io/terraform-provider-aws/resource-tagging/#controlling-test-generation
If a resource type does not support import, add the annotation @NoImport
.
If the generated test functions cannot be used, create the test functions by hand and add the annotation @Testing(identityTest=false)
If the resource type needs a custom import handler, add the annotation @WrappedImport(false)
When creating configuration templates, use the _tags.gtpl
format if the resource type also supports tagging, and the _basic.htpl
format otherwise.
In the configuration template, add {{- template "region" }}
to the top of the resource block for all resources that support a region.
If creating a template for a resource type that supports tagging, add {{- template "tags" . }}
to the bottom of only the resource that is being tested.
Affected Resource(s) or Data Source(s)
-
elbv2
-
aws_lb_listener_rule
-
aws_lb_listener
-
aws_lb_target_group
-
aws_lb_trust_store
-
-
evidently
-
aws_evidently_segment
-
-
globalaccelerator
-
aws_globalaccelerator_accelerator
-
aws_globalaccelerator_custom_routing_accelerator
-
aws_globalaccelerator_custom_routing_endpoint_group
-
aws_globalaccelerator_custom_routing_listener
-
aws_globalaccelerator_endpoint_group
-
aws_globalaccelerator_listener
-
-
glue
-
aws_glue_registry
-
aws_glue_schema
-
-
iam
-
aws_iam_openid_connect_provider
-
aws_iam_policy
-
aws_iam_saml_provider
-
aws_iam_service_linked_role
-
-
imagebuilder
-
aws_imagebuilder_component
-
aws_imagebuilder_container_recipe
-
aws_imagebuilder_distribution_configuration
-
aws_imagebuilder_image_pipeline
-
aws_imagebuilder_image_recipe
-
aws_imagebuilder_image
-
aws_imagebuilder_infrastructure_configuration
-
aws_imagebuilder_workflow
-
-
inspector
-
aws_inspector_assessment_target
-
aws_inspector_assessment_template
-
aws_inspector_resource_group
-
-
iot
-
aws_iot_topic_rule_destination
-
-
ivs
-
aws_ivs_channel
-
aws_ivs_playback_key_pair
-
aws_ivs_recording_configuration
-
-
ivschat
-
aws_ivschat_logging_configuration
-
aws_ivschat_room
-
-
kafka
-
aws_msk_cluster_policy
-
aws_msk_cluster
-
aws_msk_configuration
-
aws_msk_replicator
-
aws_msk_scram_secret_association
-
aws_msk_serverless_cluster
-
aws_msk_vpc_connection
-
-
kafkaconnect
-
aws_mskconnect_connector
-
aws_mskconnect_custom_plugin
-
aws_mskconnect_worker_configuration
-
-
kinesis
-
aws_kinesis_stream_consumer
-
-
kinesisanalytics
-
aws_kinesis_analytics_application
-
-
kinesisvideo
-
aws_kinesis_video_stream
-
-
lakeformation
-
aws_lakeformation_resource
-
-
lambda
-
aws_lambda_alias
-
aws_lambda_code_signing_config
-
aws_lambda_layer_version
-
-
licensemanager
-
aws_licensemanager_grant_accepter
-
aws_licensemanager_grant
-
aws_licensemanager_license_configuration
-
-
networkfirewall
-
aws_networkfirewall_firewall_policy
-
aws_networkfirewall_firewall
-
aws_networkfirewall_logging_configuration
-
aws_networkfirewall_resource_policy
-
aws_networkfirewall_rule_group
-
-
oam
-
aws_oam_link
-
aws_oam_sink
-
-
ram
-
aws_ram_resource_share_accepter
-
aws_ram_resource_share
-
-
rds
-
aws_rds_cluster_activity_stream
-
aws_db_instance_automated_backups_replication
-
-
redshift
-
aws_redshift_resource_policy
-
-
redshiftserverless
-
aws_redshiftserverless_resource_policy
-
-
route53recoverycontrolconfig
-
aws_route53recoverycontrolconfig_cluster
-
aws_route53recoverycontrolconfig_control_panel
-
aws_route53recoverycontrolconfig_routing_control
-
aws_route53recoverycontrolconfig_safety_rule
-
-
s3control
-
aws_s3control_bucket
-
-
sagemaker
-
aws_sagemaker_app
-
aws_sagemaker_space
-
aws_sagemaker_user_profile
-
-
secretsmanager
-
aws_secretsmanager_secret_policy
-
aws_secretsmanager_secret_rotation
-
aws_secretsmanager_secret
-
-
securityhub
-
aws_securityhub_action_target
-
aws_securityhub_finding_aggregator
-
aws_securityhub_insight
-
aws_securityhub_standards_control
-
aws_securityhub_standards_subscription
-
-
sfn
-
aws_sfn_activity
-
aws_sfn_alias
-
aws_sfn_state_machine
-
-
sns
-
aws_sns_platform_application
-
aws_sns_topic_data_protection_policy
-
aws_sns_topic_policy
-
aws_sns_topic_subscription
-
aws_sns_topic
-
-
ssmcontacts
-
aws_ssmcontacts_contact_channel
-
aws_ssmcontacts_contact
-
-
ssmincidents
-
aws_ssmincidents_replication_set
-
aws_ssmincidents_response_plan
-
-
ssoadmin
-
aws_ssoadmin_instance_access_control_attributes
-
-
storagegateway
-
aws_storagegateway_cached_iscsi_volume
-
aws_storagegateway_file_system_association
-
aws_storagegateway_gateway
-
aws_storagegateway_nfs_file_share
-
aws_storagegateway_smb_file_share
-
aws_storagegateway_stored_iscsi_volume
-
aws_storagegateway_tape_pool
-
aws_storagegateway_upload_buffer
-
-
synthetics
-
aws_synthetics_group_association
-
-
vpclattice
-
aws_vpclattice_resource_policy
-
-
wafv2
-
aws_wafv2_web_acl_logging_configuration
-
Potential Terraform Configuration
References
No response
Would you like to implement the enhancement?
No