Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add audit non HMAC'd request/response keys to mount resource #1297

Merged
merged 6 commits into from
Jan 12, 2022

Conversation

benashz
Copy link
Contributor

@benashz benashz commented Jan 11, 2022

This PR continues the work done in #1194

Output from acceptance testing:

make testacc TESTARGS='-v -test.run TestResourceMount'                                             
==> Checking that code complies with gofmt requirements...
TF_ACC=1 go test -v -v -test.run TestResourceMount -timeout 20m ./...

[...]

=== RUN   TestResourceMount
--- PASS: TestResourceMount (7.74s)
=== RUN   TestResourceMount_Local
--- PASS: TestResourceMount_Local (16.50s)
=== RUN   TestResourceMount_SealWrap
--- PASS: TestResourceMount_SealWrap (7.44s)
=== RUN   TestResourceMount_AuditNonHMACRequestKeys
--- PASS: TestResourceMount_AuditNonHMACRequestKeys (2.92s)
=== RUN   TestResourceMount_KVV2
--- PASS: TestResourceMount_KVV2 (2.44s)
=== RUN   TestResourceMount_ExternalEntropyAccess
--- PASS: TestResourceMount_ExternalEntropyAccess (11.26s)
PASS
ok      github.com/hashicorp/terraform-provider-vault/vault     50.999s

@benashz benashz merged commit 3392a34 into main Jan 12, 2022
@benashz benashz deleted the VAULT-3806/fork-add-hmac-config-to-auth-mount branch January 12, 2022 19:57
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants