-
Notifications
You must be signed in to change notification settings - Fork 50
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Bump sdk version + fix hvs breaking changes #1122
Conversation
Thank you for your submission! We require that all contributors sign our Contributor License Agreement ("CLA") before we can accept the contribution. Read and sign the agreement Learn more about why HashiCorp requires a CLA and what the CLA includes Have you signed the CLA already but the status is still pending? Recheck it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Looks good! Are there any responses that need to be adjusted as well (e.g. for MongoDB)?
Whoops disregard above, misread your comment. We just return the config atm, but since |
@@ -23,7 +23,7 @@ type DataSourceVaultSecretsRotatingSecretModel struct { | |||
AppName types.String `tfsdk:"app_name"` | |||
ProjectID types.String `tfsdk:"project_id"` | |||
OrgID types.String `tfsdk:"organization_id"` | |||
SecretName types.String `tfsdk:"secret_name"` | |||
Name types.String `tfsdk:"name"` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think we should leave this as SecretName since this is part of the TF provider data source API. Changing it will break existing TF configs.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I believe the above might be a breaking change
I know that the version is pre 1.0 and according to symver we can push breaking change but we should consider to keep thing as they are. |
@@ -0,0 +1,3 @@ | |||
```release-note:improvement | |||
Upgrade the HCP SDK and fix breaking change w/ Vault Secrets | |||
``` |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Should we leave out the breaking change part of the changelog notes?
For someone that consumes the provider, they only care that the SDK was bumped and things work exactly like they used to. Seeing "breaking change" might trigger some false alarms.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Ah good point, ill update
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks
🛠️ Description
Bump sdk version link.
Use
name
instead ofsecret_name
for rotating secrets.🏗️ Acceptance tests
Output from acceptance testing:
$ make testacc TESTARGS='-run=TestAccXXX' ...