Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We鈥檒l occasionally send you account related emails.

Already on GitHub? Sign in to your account

Mr miles ca cert #910

Merged
merged 15 commits into from
Jan 19, 2021
Merged

Mr miles ca cert #910

merged 15 commits into from
Jan 19, 2021

Conversation

mr-miles
Copy link
Contributor

@mr-miles mr-miles commented Nov 18, 2020

Community Note

  • Please vote on this pull request by adding a 馃憤 reaction to the original pull request comment to help the community and maintainers prioritize this request
  • Please do not leave "+1" comments, they generate extra noise for pull request followers and do not help prioritize the request

Closes #901

Release note for CHANGELOG:

Extend consul secret engine definition to cover all vault parameters

Output from acceptance testing:

(running on windows [shudder] so here's the circleci output)


https://circleci.com/api/v1.1/project/github/terraform-providers/terraform-provider-vault/1264/output/104/0?file=true&allocation-id=5fb456f218e33a661f94ba9f-0-build%2F3179242F

@jasonodonnell jasonodonnell added this to the 2.16.1 milestone Nov 19, 2020
@hashicorp-cla
Copy link

hashicorp-cla commented Nov 25, 2020

CLA assistant check
All committers have signed the CLA.

@mr-miles
Copy link
Contributor Author

The check failure is because the PR description was longer than jira's max issue size. It is not related to the PR code.

@tvoran tvoran self-requested a review January 13, 2021 07:05
Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
Copy link
Member

@tvoran tvoran left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The other thing I'd suggest is to test those new parameters a bit in TestConsulSecretBackend(). Even though these parameters don't come back from vault, the terraform state can be checked in tests.

@ghost ghost added size/M and removed size/S labels Jan 16, 2021
@mr-miles
Copy link
Contributor Author

Good idea, I added some tests for the extra properties

@mr-miles mr-miles requested a review from tvoran January 18, 2021 12:26
Copy link
Member

@tvoran tvoran left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Looks good, thanks!

@tvoran tvoran merged commit 1ebef6e into hashicorp:master Jan 19, 2021
@mr-miles mr-miles deleted the mr-miles-ca-cert branch January 19, 2021 20:30
dandandy pushed a commit to dandandy/terraform-provider-vault that referenced this pull request Jun 17, 2021
* Add support for ca_cert, client_cert, client_key

Additional options to configure to match the cli/api for the consul backend.  Important for TLS configuration.

* Update resource_consul_secret_backend.go

* Missing quote

* Adding commas

* Set optional and default value

* Update docs

* Change detection

* optional param

* Don't compare ca_cert as vault does not return it

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>

* Adding state tests for additional fields

* Add comma

* remove blank attributes

* Reinstate blank properties

* Back in business - check attribute does note exist

Co-authored-by: Theron Voran <tvoran@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Add certificate options to vault_consul_secret_backend
4 participants