Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

support iam role for cloud services and agencies #1302

Merged
merged 2 commits into from
Jul 23, 2021

Conversation

ShiChangkuo
Copy link
Collaborator

What this PR does / why we need it:

Which issue this PR fixes:
(optional, in fixes #<issue number>(, fixes #<issue_number>, ...) format, will close that issue when PR gets merged)
fixes #1289

Special notes for your reviewer:

Release note:


PR Checklist

  • Tests added/passed.
  • Documentation updated.
  • Schema updated.

Acceptance Steps Performed

$ make testacc TEST='./huaweicloud' TESTARGS='-run TestAccIdentityRole'
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test ./huaweicloud -v -run TestAccIdentityRole -timeout 360m -parallel 4
=== RUN   TestAccIdentityRoleDataSource_basic
=== PAUSE TestAccIdentityRoleDataSource_basic
=== RUN   TestAccIdentityRole_basic
=== PAUSE TestAccIdentityRole_basic
=== RUN   TestAccIdentityRole_agency
=== PAUSE TestAccIdentityRole_agency
=== CONT  TestAccIdentityRoleDataSource_basic
=== CONT  TestAccIdentityRole_agency
=== CONT  TestAccIdentityRole_basic
--- PASS: TestAccIdentityRole_agency (10.72s)
--- PASS: TestAccIdentityRoleDataSource_basic (14.28s)
--- PASS: TestAccIdentityRole_basic (16.59s)
PASS
ok      github.com/huaweicloud/terraform-provider-huaweicloud/huaweicloud       16.650s

@ShiChangkuo ShiChangkuo merged commit f2fc739 into huaweicloud:master Jul 23, 2021
@ShiChangkuo ShiChangkuo deleted the iam-role branch November 22, 2021 03:26
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Not being able to create policy using a Resource type list.
1 participant