-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added data source google kms secret asymmetric #4609
Added data source google kms secret asymmetric #4609
Conversation
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
/gcbrun - agent failed to spin up |
CLA not required - all in third_party |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
/gcbrun - same reason |
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
This comment has been minimized.
/gcbrun for the same reason again |
I have triggered VCR tests based on this PR's diffs. See the results here: "https://ci-oss.hashicorp.engineering/viewQueued.html?itemId=178114" |
I have triggered VCR tests in RECORDING mode for the following tests that failed during VCR: TestAccAccessContextManager|TestAccNotebooksInstance_notebookInstanceFullExample You can view the result here: "https://ci-oss.hashicorp.engineering/viewQueued.html?itemId=178125" |
Tests failed during RECORDING mode: TestAccNotebooksInstance_notebookInstanceFullExample Please fix these to complete your PR |
|
||
func dataSourceGoogleKmsSecretAsymmetric() *schema.Resource { | ||
return &schema.Resource{ | ||
ReadContext: dataSourceGoogleKmsSecretAsymmetricReadContext, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this is the first datasource/resource in TPG to use the new context-aware CRUD ops.
All (the pull request submitter and all commit authors) CLAs are signed, but one or more commits were authored or co-authored by someone other than the pull request submitter. We need to confirm that all authors are ok with their commits being contributed to this project. Please have them confirm that by leaving a comment that contains only Note to project maintainer: There may be cases where the author cannot leave a comment, or the comment is not properly detected as consent. In those cases, you can manually confirm consent of the commit author(s), and set the ℹ️ Googlers: Go here for more info. |
@googlebot I consent. |
@mvanholsteijn - we ended up having to revert this. Would you be able to open a new PR to take a stab at fixing this issue? The error we're seeing is specifically:
Followed by:
|
projectOrg := getTestOrgFromEnv(t) | ||
projectBillingAccount := getTestBillingAccountFromEnv(t) | ||
|
||
projectID := "terraform-" + randString(t, 10) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
As a side note, this will also need to use tf-test-
rather than terraform-
My implementation used the new, recommended Google Cloud KMS Client Library cloud.google.com/go/kms/apiv1. This library uses the gRPC transport and does not work with the HTTP client setup in the config.LoadAndValidate() method. I failed to pass in the credentials when creating a new KMS client and failed to check the result for nil. hence the crash. Aside from the credentials, the LoadAndValidate() method also prepare the client with retry and timeout configuration for the HTTP client. As I am unsure how this would be done for the gRPC client, I am reverting the implementation back to the "google.golang.org/api/cloudkms/v1" library, which is also used by |
Checkout my PR on hashicorp/terraform-provider-google-beta#3126. Do you want a PR on the magic modules? |
@mvanholsteijn I've upstreamed the new changes and made a new PR against Magic Modules: #4664 - thanks! |
Upstreams hashicorp/terraform-provider-google-beta#3052. Note that although the original PR was against tpg-beta, it seems to be a GA API.
Related to hashicorp/terraform-provider-google#6462.
If this PR is for Terraform, I acknowledge that I have:
make test
andmake lint
to ensure it passes unit and linter tests.Release Note Template for Downstream PRs (will be copied)