Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

resource/kubernetes_secret: Prevent binary data corruption #103

Merged
merged 1 commit into from
Feb 22, 2018

Conversation

sl1pm4t
Copy link
Contributor

@sl1pm4t sl1pm4t commented Dec 19, 2017

Prior to this change, when creating a secret containing binary data (e.g. where the data value is read from a binary file with ${file(....)} ), the data would be corrupt after the initial apply.

A subsequent apply would detect the binary data does not match the source and it would be corrected.

@radeksimko radeksimko added the bug label Jan 2, 2018
Copy link
Member

@radeksimko radeksimko left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry for the delay in reviewing this.

Thanks for the patch and the attached test. Both look great 👍

=== RUN   TestAccKubernetesSecret_basic
--- PASS: TestAccKubernetesSecret_basic (0.24s)
=== RUN   TestAccKubernetesSecret_importBasic
--- PASS: TestAccKubernetesSecret_importBasic (0.07s)
=== RUN   TestAccKubernetesSecret_generatedName
--- PASS: TestAccKubernetesSecret_generatedName (0.06s)
=== RUN   TestAccKubernetesSecret_importGeneratedName
--- PASS: TestAccKubernetesSecret_importGeneratedName (0.07s)
=== RUN   TestAccKubernetesSecret_binaryData
--- PASS: TestAccKubernetesSecret_binaryData (0.12s)

@radeksimko radeksimko changed the title FIX: kubernetes_secret corrupts binary data resource/kubernetes_secret: Prevent binary data corruption Feb 22, 2018
@radeksimko radeksimko merged commit 2a9beaf into hashicorp:master Feb 22, 2018
@sl1pm4t sl1pm4t deleted the secret-binary-data branch February 23, 2018 07:53
@ghost ghost locked and limited conversation to collaborators Apr 21, 2020
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants