Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

update fork from upstream #2

Merged
merged 113 commits into from
Jul 25, 2019
Merged

update fork from upstream #2

merged 113 commits into from
Jul 25, 2019

Conversation

jtcressy
Copy link
Owner

No description provided.

Ninir and others added 30 commits May 2, 2019 11:36
aws_secret_backend_role: support role_arns argument
skip_tls_verify expects a boolean, but defaulted to an empty string,
which causes an error under 0.12.
The test case for updating a v2 generic secret had a check function that
hardcoded in the initial value, and then proceeded to check that against
the updated value, which would never work.

This updates to add a check function for the updated config, with the
updated value coded in.
0.12 complained about our plan changing because we were interpolating a
backend's path. Backend paths cannot be specified using a trailing / but
are always set in state with a trailing /. That means the plan will
always change when creating a backend and using it in the same request.

This commit changes that to set the backend in state with no trailing
slash, which resolves the issue because it will always match user input
now. This may be considered a breaking change.
Modify provider_test to load GCP test creds from file _or_ accept them
as the contents of the file. Also, run go mod tidy.
The service_account_project field the tests were expecting from the API
has been transitioned to the project field. Update the test to check the
right field.
We're storing the path in state without the trailing slash, and we need
to update the test that assumes we'll have the trailing slash.
Blocks can no longer be specified using =.
Blocks can no longer be specified using =.
Update the error message we're testing agains, as it has changed in
0.12.
The basic LDAP auth backend group test had policies specified as a list,
with the util function for turning a slice into a Terraform list inside
that list. Except the util helper also returned the square brackets, so
we had `[[item, item]]` instead of `[item, item]`. In Terraform 0.11,
this was fine. In Terraform 0.12, it is not.
It appears 0.12 doesn't consider HasChange true when the change has been
marked by CustomizeDiff? By refactoring the logic for checking if
renewal is necessary into a helper function and calling that function
again instead of HasChange we can work around this limitation.
Write to a different path with every test run, so our version is
predictable.
paddycarver and others added 29 commits June 19, 2019 12:05
…nt-menu

Add sidebar menu link to vault_policy_document document
Update AWS Auth Backend Role resources to take sets instead of lists
…kend_role_bound_claims

Add list type for bound claims of vault_jwt_auth_backend_role
Add STS TTLs to `vault_aws_secret_backend_role`
Always set attribute 'data' if read is disabled
…ibe-paths

Add tool for analyzing Vault API coverage
@jtcressy jtcressy merged commit 209043f into jtcressy:master Jul 25, 2019
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.