Skip to content
This repository has been archived by the owner on Jun 3, 2024. It is now read-only.

symopsio/terraform-provider-sym

Repository files navigation

terraform-provider-sym

The sym terraform provider is released with the following steps:

  • Draft a new release or push a tag to github, resulting in a CircleCI build off of the tag
  • The CI build sets up GPG keys and AWS
  • The CI build produces artifacts and uploads them via goreleaser
  • The CI build syncs the directory to s3

At this point, the new release should be available in the Public Terraform Registry

Releasing

Before releasing a new major version / merging breaking changes, create a branch called release/vX where X is the current major version. This allows us to continue to release fixes for old versions of the provider. For example, if the current version of the provider is v2.0.0 and you need to merge a breaking change, create release/v2 off main before merging the breaking change.

To release a new version of the Sym provider, use GitHub's built in "Releases" functionality. Go there, and click "Draft a new release". Set the tag and title to a semver prefixed with "v" (e.g. v1.0.0). (Note: do not add suffixes like -alpha or -beta. The Terraform registry does not support them.)

Most of the time, the "target" should be the main branch. Default to that. The only time you should not select main as the target is if you are releasing an update to a previous major version of the provider.

For example, if the current major version is v3.2.0, any further releases (v4.0.0, v3.3.0, or v3.2.1) should be done off main. However, any releases to v2.x.x or v1.x.x should select release/v2 or release/v1 as their target, respectively.

Click "Generate release notes" to automatically include all commits since the last release in the description. Be sure to explicitly document any breaking changes separately.

Development

  1. Add the asdf plugins: asdf plugin add golang, brew install kyoh86/tap/richgo and asdf plugin add terraform
  2. Run asdf install to install necessary tools from .tool-versions
  3. Run make local to create the binary locally

Using the Test Sample

Once you're set up with the binary, you can initialize the workspace and apply the sample configuration:

cd test-sample
terraform init && terraform apply

Running terraform apply in the example folder will create a local terraform.tfstate file. You can safely remove this file if you are testing and want to redo something.

To debug problems, first turn on trace logging: TF_LOG=trace terraform apply.

Generating Documentation

Automatically generating Terraform documentation requires the use of the terraform-plugin-docs binary. To generate docs, run tfplugindocs at the root of this repo.

Acceptance Tests

The sym/provider package defines Terraform acceptance tests which will execute real requests against an API.

Acceptance tests can be located in the <resource>_test.go file for each resource or data source. For example, the tests for runtime_resource.go are in runtime_resource_test.go.

To run them, ensure you've set the SYM_API_URL and SYM_JWT environment variables to authenticate against the correct API. Then, just run make testacc. This will go through each Step in each acceptance test, and automatically terraform destroy at the end.

Note: if a test fails, you may be left with dangling resources. You can find them by looking for DataHandles with a testacc-<randomint> prefix (e.g. testacc-62991-slack-integration).

Tips:

  • Test a specific test, from the provider dir: TF_ACC=1 richgo test -run TestAccSymIntegration_slack -v

When modifying the provider or adding acceptance tests, note that they should:

  • Exist for all resources and data sources
  • Check that all available fields are available
  • Perform updates on resources, not just creates

The acceptance tests also run against staging:

  1. On every PR
  2. Before every provider release
  3. Nightly at midnight (will notify #eng-alerts-staging on failure)

CI Setup

This repo uses goreleaser to publish releases that are signed and ready to add to the terraform registry.

GPG Keys

Followed this guide.

  • Kind: RSA and RSA (default)
  • Keysize: 4096
  • Valid for: 0 (default)
  • Real name: Sym Engineering
  • Email: [email protected]
  • Comment: CI key for Sym

The key id is EA609C8874A3E6C5.

To export private key to a string: gpg -a --export-secret-keys EA609C8874A3E6C5 | awk -v ORS='\\n' '1'

The GPG private key is stored in 1password.

The following environment variables must be set in Circle: GPG_KEY (private key), and GPG_FINGERPRINT (see 1password).

The 1password note also includes the ascii armor (necessary for the registry), key id (same), private key and fingerprint.