Adding Resource Tagging Support#
AWS provides key-value metadata across many services and resources, which can be used for a variety of use cases including billing, ownership, and more. See the AWS Tagging Strategy page for more information about tagging at a high level.
The Terraform AWS Provider supports default tags configured on the provider in addition to tags configured on the resource. Implementing tagging support for Terraform AWS Provider resources requires the following, each with its own section below:
- Generated Service Tagging Code: Each service has a
generate.go
file where generator directives live. Through these directives and their flags, you can customize code generation for the service. You can find the code that the tagging generator generates in atags_gen.go
file in a service, such asinternal/service/ec2/tags_gen.go
. You should generally not need to edit the generator code itself (i.e., ininternal/generate/tags
). - Resource Code: In the resource code, add the
tags
andtags_all
schema attributes, along with a plan modification in the resource definition, and handling inCreate
,Read
, andUpdate
functions. - Resource Acceptance Tests: In the resource acceptance tests, add new acceptance test functions and configurations to exercise the new tagging logic.
- Resource Documentation: In the resource documentation, add the
tags
argument andtags_all
attribute.
Generating Tag Code for a Service#
This step is generally only necessary for the first implementation and may have been previously completed.
More details about this code generation,
including fixes for potential error messages in this process,
can be found in the generate
package documentation.
The generator will create several types of tagging-related code.
All services that support tagging will generate the function KeyValueTags
, which converts from service-specific structs returned by the AWS SDK into a common format used by the provider,
and the function Tags
, which converts from the common format back to the service-specific structs.
In addition, many services have separate functions to list or update tags, so the corresponding listTags
and updateTags
can be generated.
Optionally, to retrieve a specific tag, you can generate the GetTag
function.
If the service directory does not contain a generate.go
file, create one.
This file must only contain generate directives and a package declaration (e.g., package eks
).
For examples of the generate.go
file, many service directories contain one, e.g., internal/service/eks/generate.go
.
If the generate.go
file does not contain a generate directive for tagging code, i.e., //go:generate go run ../../generate/tags/main.go
, add it.
Note that without flags, the directive itself will not do anything useful.
You must not include more than one generate/tags/main.go
directive, as subsequent directives will overwrite previous directives.
To generate multiple types of tag code, use multiple flags with the directive.
Generating Tagging Types#
Determine how the service implements tagging:
Some services will use a simple map style (map[string]*string
in Go),
while others will have a separate structure, often a []service.Tag
struct with Key
and Value
fields.
If the service uses the simple map style, pass the flag -ServiceTagsMap
.
If the service uses a slice of structs, pass the flag -ServiceTagsSlice
.
If the name of the tag struct is not Tag
, pass the flag -TagType=<struct name>
.
Note that the struct name is used without the package name.
For example, the AppMesh service uses the struct TagRef
, so the flag is -TagType=TagRef
.
If the key and value fields on the struct are not Key
and Value
,
specify the names using the flags -TagTypeKeyElem
and -TagTypeValElem
respectively.
For example, the KMS service uses the struct Tag
, but the key and value fields are TagKey
and TagValue
,
so the flags are -TagTypeKeyElem=TagKey
and -TagTypeValElem=TagValue
.
Some services, such as EC2 and Auto Scaling, return a different type depending on the API call used to retrieve the tag.
To indicate the additional type, include the flag -TagType2=<struct name>
.
For example, the Auto Scaling uses the struct Tag
as part of resource calls, but returns the struct TagDescription
from the DescribeTags
API call. The flag used is -TagType2=TagDescription
.
For more details on flags for generating service keys, see the documentation for the tag generator
Generating Standalone Tag Listing Functions#
If the service API uses a standalone function to retrieve tags instead of including them with the resource (usually a ListTags
or ListTagsForResource
API call), pass the flag -ListTags
.
If the API call is not ListTagsForResource
, pass the flag -ListTagsOp=<API call name>
.
Note that this does not include the package name.
For example, the Auto Scaling service uses the API call DescribeTags
, so the flag is -ListTagsOp=DescribeTags
.
If the API call uses a field other than ResourceArn
to identify the resource, pass the flag -ListTagsInIDElem=<field name>
.
For example, the CloudWatch service uses the field ResourceARN
, so the flag is -ListTagsInIDElem=ResourceARN
.
Some API calls take a slice of identifiers instead of a single identifier.
In this case, pass the flag -ListTagsInIDNeedSlice=yes
.
If the field containing the tags in the result of the API call is not named Tags
, pass the flag -ListTagsOutTagsElem=<struct name>
.
For example, the CloudTrail service returns a nested structure, where the resulting flag is -ListTagsOutTagsElem=ResourceTagList[0].TagsList
.
In some cases, it can be useful to retrieve single tags.
Pass the flag -GetTag
to generate a function to do so.
For more details on flags for generating tag listing functions, see the documentation for the tag generator
Generating Standalone Tag Updating Functions#
If the service API uses a standalone function to update tags instead of including them when updating the resource (usually a TagResource
and UntagResource
API call), pass the flag -UpdateTags
.
If the API call to add tags is not TagResource
, pass the flag -TagOp=<API call name>
.
Note that this does not include the package name.
For example, the ElastiCache service uses the API call AddTagsToResource
, so the flag is -TagOp=AddTagsToResource
.
If the API call to add tags uses a field other than ResourceArn
to identify the resource, pass the flag -TagInIDElem=<field name>
.
For example, the EC2 service uses the field Resources
, so the flag is -TagInIDElem=Resources
.
Some API calls take a slice of identifiers instead of a single identifier.
In this case, pass the flag -TagInIDNeedSlice=yes
.
If the API call to remove tags is not UntagResource
, pass the flag -UntagOp=<API call name>
.
Note that this does not include the package name.
For example, the ElastiCache service uses the API call RemoveTagsFromResource
, so the flag is -UntagOp=RemoveTagsFromResource
.
If the API call to remove tags uses a field other than ResourceArn
to identify the resource, pass the flag -UntagInTagsElem=<field name>
.
For example, the Route 53 service uses the field Keys
, so the flag is -UntagInTagsElem=Keys
.
For more details on flags for generating tag updating functions, see the documentation for the tag generator
Generating Standalone Post-Creation Tag Updating Functions#
When creating a resource, some AWS APIs support passing tags in the Create call while others require setting the tags after the initial creation.
If the API does not support tagging on creation, pass the -CreateTags
flag to generate a createTags
function that can be called from the resource Create handler function.
Running Code generation#
Run the command make gen
to run the code generators for the project.
To ensure that the code compiles, run make test
.
Resource Code#
Resource Schema#
Add the following imports to the resource's Go source file:
imports (
/* ... other imports ... */
tftags "github.com/hashicorp/terraform-provider-aws/internal/tags"
"github.com/hashicorp/terraform-provider-aws/internal/verify"
"github.com/hashicorp/terraform-provider-aws/names"
)
Add the tags
parameter and tags_all
attribute to the schema, using constants defined in the names
package.
The tags
parameter contains the tags set directly on the resource.
The tags_all
attribute contains a union of the tags set directly on the resource and default tags configured on the provider.
func (r *resourceExample) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) {
resp.Schema = schema.Schema{
Attributes: map[string]schema.Attribute{
/* ... other configuration ... */
names.AttrTags: tftags.TagsAttribute(),
names.AttrTagsAll: tftags.TagsAttributeComputedOnly(),
},
}
}
func ResourceExample() *schema.Resource {
return &schema.Resource{
/* ... other configuration ... */
Schema: map[string]*schema.Schema{
/* ... other configuration ... */
names.AttrTags: tftags.TagsSchema(),
names.AttrTagsAll: tftags.TagsSchemaComputed(),
},
}
}
Add a plan modifier (Terraform Plugin Framework) or a CustomizeDiff
function (Terraform Plugin SDK V2) to ensure tagging diffs are handled appropriately.
These functions handle the combination of tags set on the resource and default tags, and must be set for tagging to function properly.
func (r *resourceExample) ModifyPlan(ctx context.Context, req resource.ModifyPlanRequest, resp *resource.ModifyPlanResponse) {
r.SetTagsAll(ctx, req, resp)
}
func ResourceExample() *schema.Resource {
return &schema.Resource{
/* ... other configuration ... */
CustomizeDiff: verify.SetTagsDiff,
}
}
If the resource already implements ModifyPlan
, simply include the SetTagsAll
function at the end of the method body.
Transparent Tagging#
Most services can use a facility we call transparent (or implicit) tagging, where the majority of resource tagging functionality is implemented using code located in the provider's runtime packages (see internal/provider/intercept.go
and internal/provider/fwprovider/intercept.go
for details) and not in the resource's CRUD handler functions. Resource implementers opt-in to transparent tagging by adding an annotation (a specially formatted Go comment) to the resource's factory function (similar to the resource self-registration mechanism).
// @FrameworkResource("aws_service_example", name="Example")
// @Tags(identifierAttribute="arn")
func newResourceExample(_ context.Context) (resource.ResourceWithConfigure, error) {
return &resourceExample{}, nil
}
// @SDKResource("aws_service_example", name="Example")
// @Tags(identifierAttribute="arn")
func ResourceExample() *schema.Resource {
return &schema.Resource{
...
}
}
The identifierAttribute
argument to the @Tags
annotation identifies the attribute in the resource type's schema whose value is used in tag listing and updating API calls.
Common values are "arn"
and "id"
.
If the resource type does not need separate createTags
, listTags
, or updateTags
functions, do not specify an identifierAttribute
.
Once the annotation has been added to the resource's code, run make gen
to register the resource for transparent tagging.
This will add an entry to the service_package_gen.go
file located in the service package folder.
Resource Create Operation#
When creating a resource, some AWS APIs support passing tags in the Create call while others require setting the tags after the initial creation.
If the API supports tagging on creation (e.g., the Input
struct accepts a Tags
field),
use the getTagsIn
function to get any configured tags.
input := &service.CreateExampleInput{
/* ... other configuration ... */
Tags: getTagsIn(ctx),
}
input := &service.CreateExampleInput{
/* ... other configuration ... */
Tags: getTagsIn(ctx),
}
Otherwise, if the API does not support tagging on creation, call createTags
after the resource has been created.
if err := createTags(ctx, conn, plan.ID.ValueString(), getTagsIn(ctx)); err != nil {
resp.Diagnostics.AddError(
create.ProblemStandardMessage(names.Service, create.ErrActionCreating, ResNameExample, plan.ID.String(), nil),
err.Error(),
)
return
}
if err := createTags(ctx, conn, d.Id(), getTagsIn(ctx)); err != nil {
return sdkdiag.AppendErrorf(diags, "setting Service Example (%s) tags: %s", d.Id(), err)
}
Resource Read Operation#
In the resource Read
operation, use the setTagsOut
function to signal to the transparent tagging mechanism that the resource has tags that should be saved into Terraform state.
setTagsOut(ctx, out.Tags)
setTagsOut(ctx, out.Tags)
If the service API does not return the tags directly from reading the resource and requires use of the generated listTags
function, do nothing and the transparent tagging mechanism will make the listTags
call and save any tags into the Terraform state.
Resource Update Operation#
In the resource Update
operation, only non-tags
updates need to be done as the transparent tagging mechanism makes the updateTags
call.
if !plan.Name.Equal(state.Name) ||
!plan.Description.Equal(state.Description) ||
// etc.
// Do NOT check for tags changes here.
!plan.OtherField.Equal(state.OtherField) {
...
}
if d.HasChangesExcept("tags", "tags_all") {
...
}
For Terraform Plugin SDK V2 based resources, ensure that the Update
operation always calls the resource Read
operation before returning so that the transparent tagging mechanism correctly saves any tags into the Terraform state.
func resourceAnalyzerUpdate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
var diags diag.Diagnostics
// Tags only.
return append(diags, resourceAnalyzerRead(ctx, d, meta)...)
}
Explicit Tagging#
If the resource cannot opt-in to transparent tagging, more boilerplate code must be explicitly added to the resource CRUD handler functions. This section describes how to do this.
Note
There are currently no Terraform Plugin Framework based resources which use explicit tagging. As such, the remaining examples in this section will reference legacy Terraform Plugin SDK V2 patterns.
Resource Create Operation#
When creating a resource, some AWS APIs support passing tags in the Create call while others require setting the tags after the initial creation.
If the API supports tagging on creation (e.g., the Input
struct accepts a Tags
field),
implement the logic to convert the configuration tags into the service tags, e.g., with EKS Clusters:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
tags := defaultTagsConfig.MergeTags(tftags.New(ctx, d.Get("tags").(map[string]interface{})))
input := &eks.CreateClusterInput{
/* ... other configuration ... */
Tags: Tags(tags.IgnoreAWS()),
}
If the service API does not allow passing an empty list, the logic can be adjusted similarly to:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
tags := defaultTagsConfig.MergeTags(tftags.New(ctx, d.Get("tags").(map[string]interface{})))
input := &eks.CreateClusterInput{
/* ...other configuration... */
}
if len(tags) > 0 {
input.Tags = Tags(tags.IgnoreAWS())
}
Otherwise, if the API does not support tagging on creation, implement the logic to convert the configuration tags into the service API call to tag a resource, e.g., with Device Farm device pools:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
tags := defaultTagsConfig.MergeTags(tftags.New(ctx, d.Get("tags").(map[string]interface{})))
/* ... creation steps ... */
if len(tags) > 0 {
if err := updateTags(ctx, conn, d.Id(), nil, tags); err != nil {
return fmt.Errorf("adding DeviceFarm Device Pool (%s) tags: %w", d.Id(), err)
}
}
Some EC2 resources (e.g., aws_ec2_fleet
) have a TagSpecifications
field in the InputStruct
instead of a Tags
field.
In these cases the tagSpecificationsFromKeyValue()
helper function should be used.
This example shows using TagSpecifications
:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
tags := defaultTagsConfig.MergeTags(tftags.New(ctx, d.Get("tags").(map[string]interface{})))
input := &ec2.CreateFleetInput{
/* ... other configuration ... */
TagSpecifications: tagSpecificationsFromKeyValue(tags, ec2.ResourceTypeFleet),
}
Resource Read Operation#
In the resource Read
operation, implement the logic to convert the service tags to save them into the Terraform state for drift detection, e.g., with EKS Clusters:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
ignoreTagsConfig := meta.(*conns.AWSClient).IgnoreTagsConfig(ctx)
/* ... other d.Set(...) logic ... */
tags := KeyValueTags(ctx, cluster.Tags).IgnoreAWS().IgnoreConfig(ignoreTagsConfig)
if err := d.Set("tags", tags.RemoveDefaultConfig(defaultTagsConfig).Map()); err != nil {
return fmt.Errorf("setting tags: %w", err)
}
if err := d.Set("tags_all", tags.Map()); err != nil {
return fmt.Errorf("setting tags_all: %w", err)
}
If the service API does not return the tags directly from reading the resource and requires a separate API call,
use the generated listTags
function, e.g., with Athena Workgroups:
// Typically declared near conn := /*...*/
defaultTagsConfig := meta.(*conns.AWSClient).DefaultTagsConfig(ctx)
ignoreTagsConfig := meta.(*conns.AWSClient).IgnoreTagsConfig(ctx)
/* ... other d.Set(...) logic ... */
tags, err := listTags(ctx, conn, arn.String())
if err != nil {
return fmt.Errorf("listing tags for resource (%s): %w", arn, err)
}
tags = tags.IgnoreAWS().IgnoreConfig(ignoreTagsConfig)
if err := d.Set("tags", tags.RemoveDefaultConfig(defaultTagsConfig).Map()); err != nil {
return fmt.Errorf("setting tags: %w", err)
}
if err := d.Set("tags_all", tags.Map()); err != nil {
return fmt.Errorf("setting tags_all: %w", err)
}
Resource Update Operation#
In the resource Update
operation, implement the logic to handle tagging updates, e.g., with EKS Clusters:
if d.HasChange("tags_all") {
o, n := d.GetChange("tags_all")
if err := updateTags(ctx, conn, d.Get("arn").(string), o, n); err != nil {
return fmt.Errorf("updating tags: %w", err)
}
}
If the resource Update
function applies specific updates to attributes regardless of changes to tags, implement the following e.g., with IAM Policy:
if d.HasChangesExcept("tags", "tags_all") {
/* ... other logic ...*/
request := &iam.CreatePolicyVersionInput{
PolicyArn: aws.String(d.Id()),
PolicyDocument: aws.String(d.Get("policy").(string)),
SetAsDefault: aws.Bool(true),
}
if _, err := conn.CreatePolicyVersionWithContext(ctx, request); err != nil {
return fmt.Errorf("updating IAM policy (%s): %w", d.Id(), err)
}
}
Resource Acceptance Tests#
Some services, and some resource or data source types within services, have generated acceptance tests for tagging support. These tests cover a broad set of tagging behaviors. New services should use the generated acceptance tests.
Generated Acceptance Tests#
To enable generated acceptance tests for a service, add the following line to the service's generate.go
file:
//go:generate go run ../../generate/tagstests/main.go
Controlling Test Generation#
By default, all resource or data source types which support transparent tagging will have tagging tests generated.
Individual resource or data source types can be excluded from generated acceptance tests by adding the annotation @Testing(tagsTest=false)
to the resource type declaration.
If a resource or data source type supports tags but does not use transparent tagging, generate the tests by adding the annotion @Testing(tagsTest=true)
Additional @Testing(...)
parameters can be used to control the generated tests.
Most testing configurations take a single parameter, often a name or a domain name.
The most common case is parameter rName
with a value generated by sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
, so this is the default.
If no rName
is required, add the annotation @Testing(generator=false)
.
Other values can be used by setting the generator
to a reference to a function call.
The reference optionally contains a Go package path and package alias, using the format
[<package path>;[<package alias>;]]<function call>
.
For example, the Service Catalog Portfolio uses a five-character long random string
// @Testing(generator="github.com/hashicorp/terraform-plugin-testing/helper/acctest;sdkacctest;sdkacctest.RandString(5)")
Some acceptance tests also require a TLS key and certificate.
This can be included by setting the annotation @Testing(tlsKey=true)
,
which will add the Terraform variables certificate_pem
and private_key_pem
to the configuration.
By default, the common name for the certificate is example.com
.
To override the common name, set the annotation @Testing(tlsKeyDomain=<reference>) to reference an existing variable.
For example, the API Gateway v2 Domain Name sets the variable
rNameto
acctest.RandomSubdomain()and sets the annotation
@Testing(tlsKeyDomain=rName)` to reference it.
No additional parameters can be defined currently.
If additional parameters are required, and cannot be derived from rName
, the resource type must use manually created acceptance tests as described below.
Most Exists
functions used in acceptance tests take a pointer to the returned API object.
To specify the type of this parameter, use the annotion @Testing(existsType=<reference>)
.
This references a Go type and package path with optional package alias, using the format
<package path>;[<package alias>;]<function call>
.
For example, the S3 Object uses
// @Testing(existsType="github.com/aws/aws-sdk-go-v2/service/s3;s3.GetObjectOutput")
Some services or resource types are using a new variant of the standard Exists
and DestroyCheck
functions that use acctest.ProviderMeta
internally, and thus take a testing.T
as a parameter.
In that case, add the annotations @Testing(existsTakesT=true)
and @Testing(destroyTakesT=true)
, respectively.
The generated acceptance tests use ImportState
steps.
In most cases, these will work as-is.
To ignore the values of certain parameters when importing, set the annotation @Testing(importIgnore="...")
to a list of the parameter names separated by semi-colons (;
).
There are multiple methods for overriding the import ID, if needed.
To use the value of an existing variable, use the annotation @Testing(importStateId=<var name>)
.
If the identifier can be retrieved from a specific resource attribute, use the annotation @Testing(importStateIdAttribute=<attribute name>)
.
If the identifier can be retrieved from a resource.ImportStateIdFunc
, use the annotation @Testing(importStateIdFunc=<func name>)
.
If the resource type does not support importing, use the annotation @Testing(noImport=true)
.
If the tests need to be serialized, use the annotion @Testing(serialize=true)
.
If a delay is needed between serialized tests, also use the annotation @Testing(serializeDelay=<duration>)
with a duration in the format used by time.ParseDuration()
.
For example, 3 minutes and 30 seconds is 3m30s
.
Some services do not support tags with an empty string value.
In that case, use the annotation @Testing(skipEmptyTags=true)
.
Some services do not support tags with an null string value.
In that case, use the annotation @Testing(skipNullTags=true)
.
Some resource types use the no-op CheckDestroy
function acctest.CheckDestroyNoop
.
Use the annotation @Testing(checkDestroyNoop=true)
.
For some resource types, tags cannot be modified without recreating the resource.
Use the annotation @Testing(tagsUpdateForceNew=true)
.
Resource types which pass the result of getTagsIn
directly onto their Update Input may have an error where ignored tags are not correctly excluded from the update.
Use the annotation @Testing(tagsUpdateGetTagsIn=true)
.
Some tests read the tag values directly from the AWS API.
If the resource type does not specify identifierAttribute
in its @Tags
annotation, specify a @Testing(tagsIdentifierAttribute=<attribute name>)
annotation to identify which attribute value should be used by the listTags
function.
If a resource type is also needed for the listTags
function, also specify the tagsResourceType
annotation.
At least one resource type, the Service Catalog Provisioned Product, does not support removing tags.
This is likely an error on the AWS side.
Add the annotation @Testing(noRemoveTags=true)
as a workaround.
Test Terraform Configurations#
The generated acceptance tests use ConfigDirectory
to specify the test configurations in a directory of Terraform .tf
files.
The configuration files are generated from a Go template file located in testdata/tmpl/<name>_tags.gtpl
,
where name
is the name of the resource type's implementation file wihtout the .go
extension.
For example, the ELB v2 Load Balancer's implementation file is load_balancer.go
, so the template is testdata/tmpl/load_balancer_tags.gtpl
.
To generate a configuration for a data source test, the generator reuses the configuration for the corresponding resource type.
Add an additional file testdata/tmpl/<name>_data_source.gtpl
which contains only the data source block populated with the parameters needed to associate it with the resource.
For example, the ELB v2 Load Balancer's data source template is testdata/tmpl/load_balancer_data_source.gtpl
.
Replace the tags
attribute with the Go template directive {{- template "tags" . }}
.
When the configurations are generated, this will be replaced with the appropriate assignment to the tags
attribute.
Tags should only be applied to the resource that is being tested.
Manually Created Acceptance Tests#
In the resource acceptance tests (e.g., internal/service/eks/cluster_test.go
), verify that existing resources without tagging are unaffected and do not have tags saved into their Terraform state. This should be done in the _basic
acceptance test by adding one line similar to resource.TestCheckResourceAttr(resourceName, "tags.%", "0"),
and one similar to resource.TestCheckResourceAttr(resourceName, "tags_all.%", "0"),
Add a new test named _tags
with associated configurations, that verifies creating the resource with tags and updating tags. E.g., EKS Clusters:
func TestAccEKSCluster_tags(t *testing.T) {
ctx := acctest.Context(t)
var cluster1, cluster2, cluster3 eks.Cluster
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
resourceName := "aws_eks_cluster.test"
resource.ParallelTest(t, resource.TestCase{
PreCheck: func() { acctest.PreCheck(ctx, t); testAccPreCheck(t) },
ErrorCheck: acctest.ErrorCheck(t, names.EKSServiceID),
ProtoV5ProviderFactories: acctest.ProtoV5ProviderFactories,
CheckDestroy: testAccCheckClusterDestroy(ctx),
Steps: []resource.TestStep{
{
Config: testAccClusterConfig_tags1(rName, "key1", "value1"),
Check: resource.ComposeTestCheckFunc(
testAccCheckClusterExists(ctx, resourceName, &cluster1),
resource.TestCheckResourceAttr(resourceName, "tags.%", "1"),
resource.TestCheckResourceAttr(resourceName, "tags.key1", "value1"),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccClusterConfig_tags2(rName, "key1", "value1updated", "key2", "value2"),
Check: resource.ComposeTestCheckFunc(
testAccCheckClusterExists(ctx, resourceName, &cluster2),
resource.TestCheckResourceAttr(resourceName, "tags.%", "2"),
resource.TestCheckResourceAttr(resourceName, "tags.key1", "value1updated"),
resource.TestCheckResourceAttr(resourceName, "tags.key2", "value2"),
),
},
{
Config: testAccClusterConfig_tags1(rName, "key2", "value2"),
Check: resource.ComposeTestCheckFunc(
testAccCheckClusterExists(ctx, resourceName, &cluster3),
resource.TestCheckResourceAttr(resourceName, "tags.%", "1"),
resource.TestCheckResourceAttr(resourceName, "tags.key2", "value2"),
),
},
},
})
}
func testAccClusterConfig_tags1(rName, tagKey1, tagValue1 string) string {
return acctest.ConfigCompose(testAccClusterConfig_base(rName), fmt.Sprintf(`
resource "aws_eks_cluster" "test" {
name = %[1]q
role_arn = aws_iam_role.test.arn
tags = {
%[2]q = %[3]q
}
vpc_config {
subnet_ids = aws_subnet.test[*].id
}
depends_on = [aws_iam_role_policy_attachment.test-AmazonEKSClusterPolicy]
}
`, rName, tagKey1, tagValue1))
}
func testAccClusterConfig_tags2(rName, tagKey1, tagValue1, tagKey2, tagValue2 string) string {
return acctest.ConfigCompose(testAccClusterConfig_base(rName), fmt.Sprintf(`
resource "aws_eks_cluster" "test" {
name = %[1]q
role_arn = aws_iam_role.test.arn
tags = {
%[2]q = %[3]q
%[4]q = %[5]q
}
vpc_config {
subnet_ids = aws_subnet.test[*].id
}
depends_on = [aws_iam_role_policy_attachment.test-AmazonEKSClusterPolicy]
}
`, rName, tagKey1, tagValue1, tagKey2, tagValue2))
}
Verify all acceptance testing passes for the resource (e.g., make testacc TESTS=TestAccEKSCluster_ PKG=eks
)
Resource Documentation#
In the resource documentation (e.g., website/docs/r/service_example.html.markdown
), add the following to the arguments reference:
* `tags` - (Optional) Map of tags assigned to the resource. If configured with a provider [`default_tags` configuration block](/docs/providers/aws/index.html#default_tags-configuration-block) present, tags with matching keys will overwrite those defined at the provider-level.
In the resource documentation (e.g., website/docs/r/service_example.html.markdown
), add the following to the attribute reference:
* `tags_all` - Map of tags assigned to the resource, including those inherited from the provider [`default_tags` configuration block](/docs/providers/aws/index.html#default_tags-configuration-block).