Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix: support updating backend descriptions #1550

Merged
merged 1 commit into from
Jul 25, 2022
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions .gitignore
Original file line number Diff line number Diff line change
Expand Up @@ -23,6 +23,7 @@ website/node_modules
*.iml
*.test
.vscode
*.orig

website/vendor

Expand Down
2 changes: 1 addition & 1 deletion vault/import_mount_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ import (

func TestAccMount_importBasic(t *testing.T) {
path := "test-" + acctest.RandString(10)
cfg := mountConfig{
cfg := testMountConfig{
path: path,
mountType: "kv",
version: "1",
Expand Down
1 change: 0 additions & 1 deletion vault/resource_azure_secret_backend_role.go
Original file line number Diff line number Diff line change
Expand Up @@ -42,7 +42,6 @@ func azureSecretBackendRoleResource() *schema.Resource {
"description": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Description: "Human-friendly description of the mount for the backend.",
},
"azure_roles": {
Expand Down
1 change: 0 additions & 1 deletion vault/resource_jwt_auth_backend.go
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,6 @@ func jwtAuthBackendResource() *schema.Resource {
"description": {
Type: schema.TypeString,
Required: false,
ForceNew: true,
Optional: true,
Description: "The description of the auth backend",
},
Expand Down
1 change: 1 addition & 0 deletions vault/resource_kubernetes_secret_backend_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ import (

"github.com/hashicorp/terraform-plugin-sdk/v2/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"

"github.com/hashicorp/terraform-provider-vault/internal/consts"
"github.com/hashicorp/terraform-provider-vault/testutil"
)
Expand Down
1 change: 0 additions & 1 deletion vault/resource_mount.go
Original file line number Diff line number Diff line change
Expand Up @@ -32,7 +32,6 @@ func getMountSchema(excludes ...string) schemaMap {
Type: schema.TypeString,
Optional: true,
Required: false,
ForceNew: false,
Description: "Human-friendly description of the mount",
},
"default_lease_ttl_seconds": {
Expand Down
88 changes: 51 additions & 37 deletions vault/resource_mount_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,11 +15,12 @@ import (
"github.com/hashicorp/terraform-provider-vault/testutil"
)

type mountConfig struct {
path string
mountType string
version string
seal_wrap bool
type testMountConfig struct {
path string
mountType string
version string
sealWrap bool
description string
}

func TestZeroTTLDoesNotCauseUpdate(t *testing.T) {
Expand Down Expand Up @@ -51,10 +52,18 @@ func TestZeroTTLDoesNotCauseUpdate(t *testing.T) {

func TestResourceMount(t *testing.T) {
path := "example-" + acctest.RandString(10)
cfg := mountConfig{
path: path,
mountType: "kv",
version: "1",
cfg := testMountConfig{
path: path,
mountType: "kv",
version: "1",
description: "initial",
}

cfg2 := testMountConfig{
path: path,
mountType: "kv",
version: "1",
description: "updated",
}
resource.Test(t, resource.TestCase{
Providers: testProviders,
Expand All @@ -64,6 +73,10 @@ func TestResourceMount(t *testing.T) {
Config: testResourceMount_initialConfig(cfg),
Check: testResourceMount_initialCheck(cfg),
},
{
Config: testResourceMount_initialConfig(cfg2),
Check: testResourceMount_initialCheck(cfg2),
},
{
Config: testResourceMount_updateConfig,
Check: testResourceMount_updateCheck,
Expand Down Expand Up @@ -165,6 +178,13 @@ func TestResourceMount_KVV2(t *testing.T) {
default_lease_ttl_seconds = 3600
max_lease_ttl_seconds = 36000
}`, path)

config := testMountConfig{
path: path,
mountType: "kv",
version: "2",
description: "Example mount for testing",
}
resource.Test(t, resource.TestCase{
Providers: testProviders,
PreCheck: func() { testutil.TestAccPreCheck(t) },
Expand All @@ -173,11 +193,7 @@ func TestResourceMount_KVV2(t *testing.T) {
Config: kvv2Cfg,

// Vault will store this and report it back as "kv", version 2
Check: testResourceMount_initialCheck(mountConfig{
path: path,
mountType: "kv",
version: "2",
}),
Check: testResourceMount_initialCheck(config),
},
{
PlanOnly: true,
Expand Down Expand Up @@ -217,22 +233,22 @@ func TestResourceMount_ExternalEntropyAccess(t *testing.T) {
})
}

func testResourceMount_initialConfig(cfg mountConfig) string {
func testResourceMount_initialConfig(cfg testMountConfig) string {
return fmt.Sprintf(`
resource "vault_mount" "test" {
path = "%s"
type = "%s"
description = "Example mount for testing"
default_lease_ttl_seconds = 3600
max_lease_ttl_seconds = 36000
options = {
version = "1"
}
path = "%s"
type = "%s"
description = "%s"
default_lease_ttl_seconds = 3600
max_lease_ttl_seconds = 36000
options = {
version = "1"
}
}
`, cfg.path, cfg.mountType)
`, cfg.path, cfg.mountType, cfg.description)
}

func testResourceMount_initialCheck(cfg mountConfig) resource.TestCheckFunc {
func testResourceMount_initialCheck(cfg testMountConfig) resource.TestCheckFunc {
return func(s *terraform.State) error {
resourceState := s.Modules[0].Resources["vault_mount.test"]
if resourceState == nil {
Expand All @@ -259,7 +275,7 @@ func testResourceMount_initialCheck(cfg mountConfig) resource.TestCheckFunc {
return fmt.Errorf("error reading back mount %q: %s", path, err)
}

if wanted := "Example mount for testing"; mount.Description != wanted {
if wanted := cfg.description; mount.Description != wanted {
return fmt.Errorf("description is %v; wanted %v", mount.Description, wanted)
}

Expand Down Expand Up @@ -485,19 +501,17 @@ func testResourceMount_InitialCheckSealWrap(expectedPath string) resource.TestCh
}

var testResourceMount_UpdateConfigSealWrap = `
resource "vault_mount" "test" {
path = "remountingExample"
type = "kv"
description = "Example mount for testing"
default_lease_ttl_seconds = 7200
max_lease_ttl_seconds = 72000
options = {
version = "1"
}
seal_wrap = false
path = "remountingExample"
type = "kv"
description = "Example mount for testing"
default_lease_ttl_seconds = 7200
max_lease_ttl_seconds = 72000
options = {
version = "1"
}
seal_wrap = false
}
`

func testResourceMount_UpdateCheckSealWrap(s *terraform.State) error {
Expand Down
1 change: 0 additions & 1 deletion vault/resource_okta_auth_backend.go
Original file line number Diff line number Diff line change
Expand Up @@ -48,7 +48,6 @@ func oktaAuthBackendResource() *schema.Resource {
"description": {
Type: schema.TypeString,
Required: false,
ForceNew: true,
Optional: true,
Description: "The description of the auth backend",
},
Expand Down
1 change: 0 additions & 1 deletion vault/resource_rabbitmq_secret_backend.go
Original file line number Diff line number Diff line change
Expand Up @@ -38,7 +38,6 @@ func rabbitMQSecretBackendResource() *schema.Resource {
"description": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Description: "Human-friendly description of the mount for the backend.",
},
"default_lease_ttl_seconds": {
Expand Down