-
Notifications
You must be signed in to change notification settings - Fork 766
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Some resources can only be used in the context of an organization #501
Comments
hi @emmasax4, thank you for creating this issue! as of v2.9.0 only the resources listed in the description of #465 , a subset of resources prefixed with |
Ah okay sounds good. I will keep an eye out on future versions of the provider for |
Aiming to tackle one or both of these resources in an upcoming release to mop up issues with |
@anGie44 @jcudit I couldn't create a github_actions_secret of individual Github repository similarly on |
@anGie44 @jcudit According to this (https://github.com/terraform-providers/terraform-provider-github/blob/master/CHANGELOG.md#291-july-01-2020) it looks like the ability to use Is that an accurate assumption? |
This is really confusing with the revert that happened, I had to look at code changes and CHANGELOG to figure out why it was not working for personal repositories. For now I switched to provider version |
Apologies for the mixup there @frezbo, definitely confusing 🙃 As for the next major release a couple of items are blocking:
Given available bandwidth, my hope is that the release will ship sometime between September and October. |
Is there anything blocking further review of that PR? anything I could do to help? Context is that I'm blocked from using github action secret resources with a non organization account |
@dvargas92495 changes to unblock you (🤞) are now merged into the default branch. Any chance you can test this out? |
I would love to test this out! Let me know when it's ready! |
This appears to be working for me! provider "github" {
owner = "dvargas92495"
}
resource "github_actions_secret" "deploy_aws_access_key" {
repository = "example-repo"
secret_name = "DEPLOY_AWS_ACCESS_KEY"
plaintext_value = "VALUE"
} |
yeh, this seems to be fixed in the |
According to this page, |
@emmasax4 it's released: https://github.com/terraform-providers/terraform-provider-github/releases/tag/v3.0.0 |
Apparently Error: This resource can only be used in the context of an organization, "foobar" is a user.
on ../terraform/branch_protection.tf line 1, in resource "github_branch_protection" "branch_protection":
1: resource "github_branch_protection" "branch_protection" {
Error: This resource can only be used in the context of an organization, "foobar" is a user.
on ../terraform/branch_protection.tf line 1, in resource "github_branch_protection" "branch_protection":
1: resource "github_branch_protection" "branch_protection" { Perhaps it's planned for this resource to be added in a future release? @jcudit perhaps knows something? |
We revamped the branch protection resource and the changes should be landing in v3.1.0. |
I believe this is complete and will be released this week. Please re-open if I've misunderstood. |
Apparently, as of 2020-10-10, version 3.1.0 is not yet released. Do we know what day this is planning to be released? |
This message also appears if your github token has expired. Just FYI and hope it saves someone some time. |
Docs overview | integrations/github | Terraform | Terraform Registry
|
Terraform Version
Terraform Version:
0.12.28
Provider Version:
2.9.0
Affected Resource(s)
github_branch
github_issue_label
Terraform Configuration Files
Debug Output
Setting debugging seems to yield any separate results from running w/out debugging.
Panic Output
No panic output.
Expected Behavior
Terraform should've had no problems creating GitHub branches and labels on repositories that are owned by a GitHub user.
Actual Behavior
Terraform erred with the following:
Steps to Reproduce
Please list the steps required to reproduce the issue, for example:
terraform init
terraform apply
Important Factoids
None that I can think of.
References
The text was updated successfully, but these errors were encountered: