Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(credlib): Force new resource on credential_type change #389

Merged
merged 1 commit into from
May 3, 2023

Conversation

hugoghx
Copy link
Contributor

@hugoghx hugoghx commented May 2, 2023

Fixes a bug where if the credential_type in a boundary_credential_library_vault resource is changed, TF will register the change and report that the resource was updated but doesn't actually change credential_type.

This is because credential_type is immutable in Boundary and we don't take it into account when updating a boundary_credential_library_vault resource, so this isn't actually valid operation.

I wasn't able to write tests for this, but I was able to manually validate it

@hugoghx hugoghx requested a review from louisruch May 2, 2023 17:11
@hugoghx hugoghx self-assigned this May 2, 2023
@psekar psekar merged commit a0c1a6f into main May 3, 2023
@psekar psekar deleted the hugo-cred-lib-type-force-new branch May 3, 2023 21:13
elimt added a commit that referenced this pull request May 5, 2023
* feature: Use default auth method if no auth method ID is provided for provider (#385)

* Use default auth method if no auth method ID is provided for provider

* docs: Fix typo in Managed Group resource page (#370)

* fix(credlib): Force new resource on credential_type change (#389)

* update changelog

---------

Co-authored-by: Dan Heath <[email protected]>
Co-authored-by: Hugo <[email protected]>
grantorchard pushed a commit to grantorchard/terraform-provider-boundary that referenced this pull request Aug 28, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants