-
Notifications
You must be signed in to change notification settings - Fork 87
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Initial Provider Review #38
Comments
Assigning @mevansam to this issue. |
Hi @paultyng, thanks for providing the initial code review feedback. We prioritized the above list at our weekly meeting yesterday and plan to have them addressed within the next couple of weeks. We will reach back to you in this thread if we need any further clarifications. |
Feel free to drop a note here if you would like to discuss any of those items or drop me an email. |
Here is a rewording of the analysis from March 8th 2018 team weekly meeting
|
@paultyng we would like to prevent future regressions to suggestions you reported. Would should share URLs to some of the tools you used (e.g. linters) so that we can integrate them into our build ? We tried to see if terraform-provider-aws travis build used them but did not yet spotted them. Please add you comments into in #54 |
Additional dispatching of issues as part of Tuesday April 4th team meeting
|
@cgriggs01 @paultyng The team worked hard to get the 0.9.9 release out with the objective to reach a stable resource naming as to avoid breaking changes in the future, and having outstanding bugs fixed. Most of the suggestions above have been addressed, with the exception of the list below which have been assigned to a later milestone:
Note that there are few additional changes that we'd like to bring into a 1.0 version in the coming days. We believe that it should not affect too much the review process: #150 #147 #149 #125 #151 Besides, we'd like input on whether #126 is a prereq for an 1.0 official release. We're eager to proceed with further the review of the provider, and moving forward with the Terraform Provider Development Program. We'd like to learn how this could affect the team's travis-based CI workflow in the future (Travis-ci enforces that security credentials used to run acceptance tests can only be used on PRs of branches of the repos, and PR of from branches from forked repositories. All team members submitting PRs have therefore push access to the repo, although we have not yet completed the setup of the protected branches, probably |
Hey Team, hope you all are doing well. This review was unfortunately sidelined over the last month, but I'd like to get it back on track an accessible through Now that we've release Terraform 0.12, we'll need to make sure up update to the new 0.12 Terraform sdk. Let me know if you have questions or are interested in meeting me for a short call to align next steps. |
hi @cgriggs01 we actually working on the provider in best effort. I don't think we are matching all your requirements right now. But at least we are compatible with terraform 0.12, we have move sdk inside the provider to its own repo and documentation is compatible with your new documentation format. Thanks for your time |
What's the latest news on this effort? I'm quite excited for the prospect of having this provider distributed as part of terraform :) |
@candrews do we follow your rules/requirements ? Our actual state is:
The good part:
Let me know what is your thought about this, if we can distributed as part of terraform or not :) |
I'm not actually with terraform - I'm just an interested user :-) Thank you for the info - perhaps we can reach out to terraform and see if this is now includable? |
The provider is now published on the Terraform Registry. @cgriggs01 @paultyng would this provider qualify for a |
Hey Andy,
Unfortunately at this time we can only onboard and verify providers from
ISVs. We're still trying to figure out how to fit in open source
organizations or foundations into our program.
Hope this answers your question.
Best,
Chris
…On Thu, Mar 31, 2022 at 7:13 AM Andy Lo-A-Foe ***@***.***> wrote:
The provider is now published on the Terraform Registry. @cgriggs01
<https://github.com/cgriggs01> @paultyng <https://github.com/paultyng>
would this provider qualify for a Verified flag?
—
Reply to this email directly, view it on GitHub
<#38 (comment)>,
or unsubscribe
<https://github.com/notifications/unsubscribe-auth/ACU7UYSWZ7LHECARZ3XLVT3VCWXI5ANCNFSM4ETKEPDA>
.
You are receiving this because you were mentioned.Message ID:
<cloudfoundry-community/terraform-provider-cloudfoundry/issues/38/1084645054
@github.com>
--
Chris Griggs(He/Him)
Partner Alliances Manager, Terraform & Packer
e ***@***.***
m +1 (530) 913-7497 <+15309137497>
------------------------------
<https://www.hashicorp.com/>
|
@cgriggs01 thanks for the quick response! will close this ticket and open a new one once there is program for foundations. |
Hello!
My name is Paul, I'm a member of the Terraform team @ HashiCorp.
I’ve taken a look at the provider here and would like to say great work so far! I do have feedback outlined below that I’d like to see addressed before we move on to the next steps. I’m opening this issue as a sort of checklist for tracking remaining items and discussion. The review was done on the git commit c8532f9.
cf
(cloudfoundry
?) It does seem like the internal package is calledcloudfoundry
. Maybe this is due to conflicts with the other cloudfoundry provider?generate-schema
? how is it meant to be used? Is that solely for use in intellij? Is it possible to split that out of the repository?.test_env
folder for?terraform
astf
) unless you have a conflict, as it will throw off contributors who are used to unaliased ones.goimports
on the code (many editors can do this automatically, vim-go, vscode, etc.), optionally you could also usegolint
or evengometalinter
to help find additional issues. Passinggometalinter
is unnecessary for CI, but it’s a good tool when developing, below is a sampling of other issues I found with the tools.errcheck
), if these are meant to be explicit use_
and possibly comment as to why the error is discarded, and you should definitely log the error so it can be found in trace if desired:goimports
cleans up your imports) and ensure they are all necessary.cfapi
andrepo
packages SDKs? If so, we traditionally keep the SDK’s outside of the provider repos.repo
package is pulling a release locally, modifying it, and then it will be pushed up to Cloud Foundry as part of theresource_cf_app
, is that understanding correct? You should switch to using the ioutil.Temp* methods instead of having the case where it uses the home directory. Also, please make sure to clean up any temp files or directories the provider creates during its execution. FWIW you may want to try to integrate this using an addition to the GitHub provider, HTTP, or Archive providers so you aren't left having to implement things like this for every possible storage location.I realize this is a lot but I think overall this is in good shape. Some of these issues may be due to misunderstandings of your use cases so feel free to let me know if so, or if there are any other things you'd like an eye on in this issue.
Thanks again!
Paul
The text was updated successfully, but these errors were encountered: