-
Notifications
You must be signed in to change notification settings - Fork 9.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
#13994: Attempt to allow usage of service principals for KMS grants. #25360
#13994: Attempt to allow usage of service principals for KMS grants. #25360
Conversation
Hey @RonaldTechnative 👋 Thank you very much for your contribution! At times, our maintainers need to make direct edits to pull requests in order to help get it ready to be merged. Your current settings do not allow maintainers to make such edits. To help facilitate this, update your pull request to allow such edits as described in GitHub's Allowing changes to a pull request branch created from a fork documentation. (If you're using a fork owned by an organization, your organization may not allow you to change this setting. If that is the case, let us know.) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Welcome @RonaldTechnative 👋
It looks like this is your first Pull Request submission to the Terraform AWS Provider! If you haven’t already done so please make sure you have checked out our CONTRIBUTING guide and FAQ to make sure your contribution is adhering to best practice and has all the necessary elements in place for a successful approval.
Also take a look at our FAQ which details how we prioritize Pull Requests for inclusion.
Thanks again, and welcome to the community! 😃
It appears that I'm unable to grant access to allow anyone here to push. I think we can work around by giving people write access to the forked repository which I'm ok with. This is my first contribution so please let me know if I missed anything. |
Hello all, |
It appears that Hashicorp has a backlog on these issues and is prioritizing based on thumbs op on the main issue. Can you do that? I'm asking our customers to do the same 😄 . |
@ewbankkit sorry for pinging you directly, but it seems like you are the latest active contributor. |
@RonaldTechnative there is a small fix that needs to be made in reading the resource on this line: https://github.com/hashicorp/terraform-provider-aws/pull/25360/files#diff-d07eb791766a340751ea762e950c2b06b06d77a6dcb7112209a365745c765e7dR330 The read operation also needs to use the new |
Hey @RonaldTechnative 👋 Given the permissions difficulties, I've opened a separate pull request that covers this and a couple of other minor changes. With that in mind, we'll close this one out in favor of that one. Thank you for taking the time to contribute; we really appreciate it! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Closes #13994
Output from acceptance testing: