-
Notifications
You must be signed in to change notification settings - Fork 556
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Identity improvements #321
Identity improvements #321
Conversation
2fe2243
to
3c4a5a6
Compare
I guess the test was a random failure, closing and reopening |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would like to see this merged in. Would be useful to manage policies for entities and groups.
If you would like, I could help work on the suggestions next week.
@@ -53,6 +55,13 @@ func identityGroupResource() *schema.Resource { | |||
Description: "Policies to be tied to the group.", | |||
}, | |||
|
|||
"external_policies": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This field seems a bit counter-intuitive if you compare it with the google_xxx_iam_*
or other similar resources.
May I suggest that:
- if
policies
is not provided, do aDiffSuppressFunc
to suppress a diff onpolicies
- Likewise, do not set
policies
while writing the entity.
Then, users can use the new resources you have added to manage policies.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I don't think it is possible to tell whether the value was set by user or read from the Vault.
3c4a5a6
to
1f484ac
Compare
…pplicable Signed-off-by: Krzysztof Nazarewski <3494992+nazarewk@users.noreply.github.com>
…ment Signed-off-by: Krzysztof Nazarewski <3494992+nazarewk@users.noreply.github.com>
…lusive Signed-off-by: Krzysztof Nazarewski <3494992+nazarewk@users.noreply.github.com>
@nazarewk since you got this underway, would you mind breaking a few more eggs and addressing the problem described in #343? |
@cvbarros i'm not sure what is the interaction of |
Signed-off-by: Krzysztof Nazarewski <3494992+nazarewk@users.noreply.github.com>
@nazarewk with previous Terraform versions, one could get away of having What happens is that it is a common mistake to assume that in order to have a resource's |
Is there some maintainer participating in conversation? It is ready for merging and I would like to proceed. |
Hello, I just downloaded Terraform 0.12 (latest release, not beta or rc) and I'm getting this issue: I don't really know the src of Terraform of the provider, can anyone explain why this happen? Is there a solution? Thanks 👍 |
…vements Identity improvements
This PR implements #320 ideas, except for group membership management.
Fixes #343
Fixes #320
Major change
Adds
vault_identity_group_policies
resource andvault_identity_group.external_policies
attribute.It solves chicken & egg problem of using
vault_identity_group.id
inside templatedvault_policy
.Bug fixes
d.Set(...)
vault_identity_entity.disabled
not working at all (usedTypeString
instead of expectedTypeBool
)AppRole
instead of specificIdentity*
invault_identity_*
resourcesMinor changes
vault_identity_*
resourcesname
autogeneration (by default Vault assignsgroup-<UUID>
orentity-<UUID>
names) byRequired: true
->Optional: true
vault_identity_entity
andvault_identity_group
resources (ForceNew: false
was enough),