-
Notifications
You must be signed in to change notification settings - Fork 540
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use new semantic version checking for Consul secrets backend logic #1593
Conversation
Note that I have a gofmt commit before my feature commits. |
94e2a0e
to
861fd6f
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
|
…r to provide a better error when trying to bootstrap on a Vault version too low
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
a few minor nits to address then 👍
Each test conditionally runs on Vault version. A new custom ImportStateCheck function is needed to check importing of policies as the provider now always returns consul_policies for an import
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
A few minor suggestions then 👍
Previously we used a workaround to check which Consul policies field was needed by peeking at the Vault response. With semantic version checking we can more simply get which version of Vault is being used, then reconcile that with the field provided by the user.
For backwards compatibility, both
policies
andconsul_policies
work regardless of Vault version, 1.11 being where the field name changed in Vault, but the provider handles mapping the data given by the user to the correct parameter name for Vault depending on version.Release note for CHANGELOG:
Output from acceptance testing:
Community Note