Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Bump sdk version + fix hvs breaking changes #1122

Merged
merged 7 commits into from
Oct 23, 2024
Merged

Conversation

keeefer
Copy link
Contributor

@keeefer keeefer commented Oct 17, 2024

🛠️ Description

Bump sdk version link.
Use name instead of secret_name for rotating secrets.

🏗️ Acceptance tests

  • Are there any feature flags that are required to use this functionality?
  • Have you added an acceptance test for the functionality being added?
  • Have you run the acceptance tests on this branch?

Output from acceptance testing:

$ make testacc TESTARGS='-run=TestAccXXX'

...

@keeefer keeefer requested review from a team as code owners October 17, 2024 20:21
Copy link

hashicorp-cla-app bot commented Oct 17, 2024

CLA assistant check
All committers have signed the CLA.

Copy link

CLA assistant check

Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement

Learn more about why HashiCorp requires a CLA and what the CLA includes

Have you signed the CLA already but the status is still pending? Recheck it.

Copy link
Contributor

@averche averche left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good! Are there any responses that need to be adjusted as well (e.g. for MongoDB)?

@keeefer
Copy link
Contributor Author

keeefer commented Oct 17, 2024

Looks good! Are there any responses that need to be adjusted as well (e.g. for MongoDB)?

afaik that was covered here pr

Whoops disregard above, misread your comment. We just return the config atm, but since secret_details are already passed in it might be ok? Unfortunately MongoDB rotation responses are the odd one out returning things outside of the config 🙃

@@ -23,7 +23,7 @@ type DataSourceVaultSecretsRotatingSecretModel struct {
AppName types.String `tfsdk:"app_name"`
ProjectID types.String `tfsdk:"project_id"`
OrgID types.String `tfsdk:"organization_id"`
SecretName types.String `tfsdk:"secret_name"`
Name types.String `tfsdk:"name"`
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I think we should leave this as SecretName since this is part of the TF provider data source API. Changing it will break existing TF configs.

Copy link
Contributor

@averche averche left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I believe the above might be a breaking change

@pierluc-codes
Copy link
Contributor

I believe the above might be a breaking change

I know that the version is pre 1.0 and according to symver we can push breaking change but we should consider to keep thing as they are.

@@ -0,0 +1,3 @@
```release-note:improvement
Upgrade the HCP SDK and fix breaking change w/ Vault Secrets
```
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Should we leave out the breaking change part of the changelog notes?

For someone that consumes the provider, they only care that the SDK was bumped and things work exactly like they used to. Seeing "breaking change" might trigger some false alarms.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Ah good point, ill update

Copy link
Member

@jasonpilz jasonpilz left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Thanks

@keeefer keeefer merged commit 653a266 into main Oct 23, 2024
6 checks passed
@keeefer keeefer deleted the hvs/update-secret-name branch October 23, 2024 19:45
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants