The sym terraform provider is released with the following steps:
- Draft a new release or push a tag to github, resulting in a CircleCI build off of the tag
- The CI build sets up GPG keys and AWS
- The CI build produces artifacts and uploads them via
goreleaser
- The CI build syncs the directory to s3
At this point, the new release should be available in the Public Terraform Registry
Before releasing a new major version / merging breaking changes, create a branch called release/vX
where X
is the current major version. This allows us to continue to release fixes for old versions of the provider. For example, if the current version of the provider is v2.0.0
and you need to merge a breaking change, create release/v2
off main
before merging the breaking change.
To release a new version of the Sym provider, use GitHub's built in "Releases" functionality. Go there, and click "Draft a new release". Set the tag and title to a semver prefixed with "v" (e.g. v1.0.0
). (Note: do not add suffixes like -alpha
or -beta
. The Terraform registry does not support them.)
Most of the time, the "target" should be the main
branch. Default to that. The only time you should not select main
as the target is if you are releasing an update to a previous major version of the provider.
For example, if the current major version is v3.2.0
, any further releases (v4.0.0
, v3.3.0
, or v3.2.1
) should be done off main
. However, any releases to v2.x.x
or v1.x.x
should select release/v2
or release/v1
as their target, respectively.
Click "Generate release notes" to automatically include all commits since the last release in the description. Be sure to explicitly document any breaking changes separately.
- Add the asdf plugins:
asdf plugin add golang
,brew install kyoh86/tap/richgo
andasdf plugin add terraform
- Run
asdf install
to install necessary tools from .tool-versions - Run
make local
to create the binary locally
Once you're set up with the binary, you can initialize the workspace and apply the sample configuration:
cd test-sample
terraform init && terraform apply
Running terraform apply
in the example folder will create a local terraform.tfstate
file. You can safely remove this file if you are testing and want to redo something.
To debug problems, first turn on trace logging: TF_LOG=trace terraform apply
.
Automatically generating Terraform documentation requires the use of the terraform-plugin-docs binary. To generate docs, run tfplugindocs
at the root of this repo.
The sym/provider
package defines Terraform acceptance tests which will execute real requests against an API.
Acceptance tests can be located in the <resource>_test.go
file for each resource or data source. For example, the tests for runtime_resource.go
are in runtime_resource_test.go
.
To run them, ensure you've set the SYM_API_URL
and SYM_JWT
environment variables to authenticate against the correct API. Then, just run make testacc
. This will go through each Step
in each acceptance test, and automatically terraform destroy
at the end.
Note: if a test fails, you may be left with dangling resources. You can find them by looking for DataHandles
with a testacc-<randomint>
prefix (e.g. testacc-62991-slack-integration
).
Tips:
- Test a specific test, from the provider dir:
TF_ACC=1 richgo test -run TestAccSymIntegration_slack -v
When modifying the provider or adding acceptance tests, note that they should:
- Exist for all resources and data sources
- Check that all available fields are available
- Perform updates on resources, not just creates
The acceptance tests also run against staging:
- On every PR
- Before every provider release
- Nightly at midnight (will notify #eng-alerts-staging on failure)
This repo uses goreleaser
to publish releases that are signed and ready to add to the terraform registry.
Followed this guide.
- Kind: RSA and RSA (default)
- Keysize: 4096
- Valid for: 0 (default)
- Real name: Sym Engineering
- Email: [email protected]
- Comment: CI key for Sym
The key id is EA609C8874A3E6C5
.
To export private key to a string:
gpg -a --export-secret-keys EA609C8874A3E6C5 | awk -v ORS='\\n' '1'
The GPG private key is stored in 1password.
The following environment variables must be set in Circle: GPG_KEY
(private key), and GPG_FINGERPRINT
(see 1password).
The 1password note also includes the ascii armor (necessary for the registry), key id (same), private key and fingerprint.