-
Notifications
You must be signed in to change notification settings - Fork 1.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Added is_secret_data_base64
field to google_secret_manager_secret_version
#8873
Added is_secret_data_base64
field to google_secret_manager_secret_version
#8873
Conversation
Hello! I am a robot. It looks like you are a: Community Contributor @trodge, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
google_secret_manager_secret_version
38ff752
to
2c461bc
Compare
Just to clarify, while importing the |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 4 files changed, 102 insertions(+), 4 deletions(-)) |
Tests analyticsTotal tests: Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccDataprocClusterIamPolicy|TestAccSecretManagerSecretVersion_secretVersionWithBase64StringSecretDataExample |
Rerun these tests in REPLAYING mode to catch issues
|
@trodge This PR is now ready for review |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Why does this field need to be added this way as opposed to being in the yaml properties?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This field is a terraform-only field that decides whether the secret_data
is to be sent as is or after base64-encoding and whether to decode it while flattening. As this field affects the state value of secret_data
, we need to keep it ForceNew
. The virtual_field
property doesn't provide a way to mark the fields immutable. Hence, I've used extra_schema_entry
for this purpose.
…t-manager-add-secret-data-base64
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 4 files changed, 102 insertions(+), 4 deletions(-)) |
Tests analyticsTotal tests: Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccDataSourceGoogleServiceAccountIdToken_impersonation |
Rerun these tests in REPLAYING mode to catch issues
|
google_secret_manager_secret_version
google_secret_manager_secret_version
google_secret_manager_secret_version
Added the
is_secret_data_base64
field to thegoogle_secret_manager_secret_version
resourcefixes hashicorp/terraform-provider-google#10129
Release Note Template for Downstream PRs (will be copied)