-
Notifications
You must be signed in to change notification settings - Fork 9.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
add support for create instance with eni #10516
Conversation
i'm pretty sure the important todo bits are in https://github.com/hashicorp/terraform/blob/master/builtin/providers/aws/resource_aws_instance.go#L1017 , but i'm not groking it all the way yet. |
This reverts commit ef6b1555fa686dd946917f9613a8b0c91358cbb0. no good. need to add to interface array instead
e141713
to
d657e9c
Compare
all i have for now is that it seems to work. i think maybe i should add a forcenew for the new instance attribute. not super clear on whether my implementation method (if id set, skip auto stuff - subnet/publicip) is solid. and i guess there is a way to test that it does to aws what it should? |
Hi @automaticgiant I'll let Terraform team choose how to deal with all of this :) |
those both look more thorough than mine. i only needed a little bit more functionality. should we try to collaborate on these and turn them into one solid pr? |
- Update Terraform’s documentation
@automaticgiant Which little functionality did you need? I think I missed it comparing our PRs :) |
@Ninir the bit about exposing id from eni creation so you can create one and get the id from it to add to the new ec2 instance |
should we be organizing related PR conversation in the original issue or any particular place? i think buy-in/guidance/coordination help from core team would be really helpful. we need to get the right people connected and looking at these. |
i almost want to use chef-provisioning, but it looks like it's on life-support, so hesitant. need this TF feature. |
@automaticgiant Ok I got it :) Instead of setting a new attribute, why not getting the id attribute directly? For sure, this subject needs to be merged asap in order to prevent more and more PRs. If you want, I can work on the aggregation of everyone works! I might need to add a few acceptance tests :) this will close so much issues / PRs! 😄 |
@Ninir i don't understand the question. could you link to a code line or do a line comment? i just made something that solved my specific problem, however naive it may have been. do you think we should request an integration branch to pr pieces to? |
@automaticgiant Well, for instance, you can use ...
resource "aws_network_interface" "test" {
subnet_id = "${aws_subnet.main.id}"
private_ips = ["10.0.1.50"]
}
output "test" {
value = "${aws_network_interface.test.id}"
} Well, I think that we can put pieces together in 2 PRs: one for the network_interface_id addition, and one for network_interfaces for instance! |
oh! is that the same value? didn't realize that. if we get HC to do a branch we can pr to, everyone gets credit. not sure how important that is, but don't really want to steal code from PRs without crediting them. |
Yes it is the same value :) |
* aws/feature/r-instance-net-iface-id: (74 commits) - Properly exercise network_interface_id from AWS SDK - Update Terraform’s documentation Update CHANGELOG.md provider/aws: Forces the api gateway domain name certificates to recreate the resource (hashicorp#10588) Update CHANGELOG.md provider/aws: FIxed the api_gw_domain_name replace operation (hashicorp#10179) Fixed note formatting Explicitly say `count` is not supported by modules (hashicorp#10553) docs/aws: Fix the discrepencies of the emr_cluster documentation (hashicorp#10578) Update CHANGELOG.md Service role is not updated on AWS for a CodeDeploy deployment group (hashicorp#9866) Update CHANGELOG.md provider/datadog hashicorp#9375: Refactor tags to a list instead of a map. (hashicorp#10570) Update the Vagrantfile to resolve package update/installation issue. (hashicorp#9783) docs/aws: Add iam_server_certificate data source to nav bar (hashicorp#10576) Update CHANGELOG.md feat/aws: add iam_server_certificate data source (hashicorp#10558) provider/azurerm: arm_virtual_machine panic fix Update .travis.yml provider/aws: Improved the documentation for EMR Cluster (hashicorp#10563) provider/azurerm: Do not pass an empty string of license_type to AMR VMs (hashicorp#10564) ... # Conflicts: # builtin/providers/aws/resource_aws_instance.go
@automaticgiant I have pulled your branch and merged with mine, not sure how I can create PR against yours though. Here's the branch. Let me know if there's anything more I could do to move this forward :-) |
This reverts commit ef6b1555fa686dd946917f9613a8b0c91358cbb0. no good. need to add to interface array instead
This reverts commit ef6b1555fa686dd946917f9613a8b0c91358cbb0. no good. need to add to interface array instead
0135c0e
to
e8868c4
Compare
@pielu check it out yo automaticgiant#1 |
@automaticgiant I think it's sorted out now. Should you need more actions on my side please give me a shout. |
Create with eni
Last I checked they made significant changes that caused all changes to fail. Don't know when I'll have time to take a look at it again. Very busy...
…Sent from my iPhone
On Jan 24, 2017, at 6:11 AM, Hunter Morgan ***@***.***> wrote:
@Ninir @freimer @choosy
have two merged, mine and @pielu
pls check to see if yours can contribute.
volunteers for tests appreciated! i can start next week, but don't know what i'm doing :D
—
You are receiving this because you were mentioned.
Reply to this email directly, view it on GitHub, or mute the thread.
|
Closing via #12933 |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further. |
pretty unfamiliar with golang and codebase, but i'll give it a shot. hopefully ppl will help.
hopefully this will finish #1149 for real at some point.
it looks like it's still not set up to send the eni in the request.
idk how to get request logs from the aws go sdk while it's being used by tf, but the sts message i got back is consistent - says I can't use default sg/subnet - it's not taking the eni's sg/subnet.
hard to say whether being in vpc affects it, but i'm not encouraged to set up in a personal aws account to test.
ima keep working on it.