-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_container_registry_token_password
- Handle gone container registry token and mark this password as gone
#27232
azurerm_container_registry_token_password
- Handle gone container registry token and mark this password as gone
#27232
Conversation
247ffdf
to
d89b363
Compare
internal/services/containers/container_registry_token_password_resource.go
Outdated
Show resolved
Hide resolved
…_resource.go Co-authored-by: stephybun <steph@hashicorp.com>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
There are a few test failures. Would you mind fixing those @magodo?
------- Stdout: -------
=== RUN TestAccContainerRegistryTokenPassword_replace
=== PAUSE TestAccContainerRegistryTokenPassword_replace
=== CONT TestAccContainerRegistryTokenPassword_replace
testcase.go:173: Step 4/6 error: Pre-apply plan check(s) failed:
'azurerm_container_registry_token_password.test' - expected action to not be Replace, path: [[container_registry_token_id]]
--- FAIL: TestAccContainerRegistryTokenPassword_replace (185.77s)
FAIL
------- Stdout: -------
=== RUN TestAccContainerRegistryTokenPassword_update
=== PAUSE TestAccContainerRegistryTokenPassword_update
=== CONT TestAccContainerRegistryTokenPassword_update
testcase.go:173: Step 4/9 error: Pre-apply plan check(s) failed:
'azurerm_container_registry_token_password.test' - expected action to not be Replace, path: [[password1 0 expiry] [password2 0 expiry]]
--- FAIL: TestAccContainerRegistryTokenPassword_update (185.95s)
FAIL
------- Stdout: -------
=== RUN TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
=== PAUSE TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
=== CONT TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
testcase.go:173: Step 4/6 error: Pre-apply plan check(s) failed:
'azurerm_container_registry_token_password.test' - expected action to not be Replace, path: [[password1 0 expiry]]
--- FAIL: TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue (208.13s)
FAIL
@stephybun Thank you for pointing this out! I've merged with the > TF_ACC=1 go test -v -timeout=20h -run='TestAccContainerRegistryTokenPassword_(replace|update)' ./internal/services/containers
=== RUN TestAccContainerRegistryTokenPassword_update
=== PAUSE TestAccContainerRegistryTokenPassword_update
=== RUN TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
=== PAUSE TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
=== RUN TestAccContainerRegistryTokenPassword_replace
=== PAUSE TestAccContainerRegistryTokenPassword_replace
=== CONT TestAccContainerRegistryTokenPassword_update
=== CONT TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue
=== CONT TestAccContainerRegistryTokenPassword_replace
--- PASS: TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue (272.62s)
--- PASS: TestAccContainerRegistryTokenPassword_replace (305.17s)
--- PASS: TestAccContainerRegistryTokenPassword_update (310.24s)
PASS
ok github.com/hashicorp/terraform-provider-azurerm/internal/services/containers 310.269s |
@@ -56,7 +56,7 @@ func TestAccContainerRegistryTokenPassword_update(t *testing.T) { | |||
data := acceptance.BuildTestData(t, "azurerm_container_registry_token_password", "test") | |||
r := ContainerRegistryTokenPasswordResource{Expiry: time.Now().Add(time.Hour)} | |||
|
|||
data.ResourceTest(t, r, []acceptance.TestStep{ | |||
data.ResourceTestIgnoreRecreate(t, r, []acceptance.TestStep{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
These tests are called _update
so presumably they're checking that certain properties are updating correctly on the resource and not triggering a ForceNew, which means that this isn't a proper fix for the test and is masking an underlying issue.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The reason can be found at:
Lines 59 to 66 in cd57967
"expiry": { | |
Type: pluginsdk.TypeString, | |
Optional: true, | |
// TODO: Remove the force new and add customize diff to SetNewComputed on the `value` once https://github.com/hashicorp/terraform-plugin-sdk/issues/459 is addressed. | |
ForceNew: true, | |
ValidateFunc: validation.IsRFC3339Time, | |
DiffSuppressFunc: suppress.RFC3339Time, | |
}, |
Due to this bug, we are not able to update it, but can only recreate a new token password. This doesn't make a big difference for this resource.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Keeping the test called _update
is misleading then since we're not actually updating anything, either the config should be adjusted so that we're actually correctly testing the update of update-able properties, or the test should be renamed or removed since we don't typically test for ForceNew
behaviours
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Agreed. I skip these two test cases now until we migrated to fw.
@@ -86,7 +86,7 @@ func TestAccContainerRegistryTokenPassword_updateExpiryReflectNewValue(t *testin | |||
data := acceptance.BuildTestData(t, "azurerm_container_registry_token_password", "test") | |||
r := ContainerRegistryTokenPasswordResource{} | |||
|
|||
data.ResourceTest(t, r, []acceptance.TestStep{ | |||
data.ResourceTestIgnoreRecreate(t, r, []acceptance.TestStep{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The same applies to this test.
@@ -56,7 +56,7 @@ func TestAccContainerRegistryTokenPassword_update(t *testing.T) { | |||
data := acceptance.BuildTestData(t, "azurerm_container_registry_token_password", "test") | |||
r := ContainerRegistryTokenPasswordResource{Expiry: time.Now().Add(time.Hour)} | |||
|
|||
data.ResourceTest(t, r, []acceptance.TestStep{ | |||
data.ResourceTestIgnoreRecreate(t, r, []acceptance.TestStep{ |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Keeping the test called _update
is misleading then since we're not actually updating anything, either the config should be adjusted so that we're actually correctly testing the update of update-able properties, or the test should be renamed or removed since we don't typically test for ForceNew
behaviours
This reverts commit 90476b1.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @magodo LGTM 👍
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Community Note
Description
This PR handles the case that the parent container registry token of this password has gone, and mark this resource as gone accordingly.
PR Checklist
For example: “
resource_name_here
- description of change e.g. adding propertynew_property_name_here
”Changes to existing Resource / Data Source
Testing
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azurerm_container_registry_token_password
- Handle gone container registry token and mark this password as gone [GH-00000]This is a (please select all that apply):
Related Issue(s)
Fixes #27215
Note
If this PR changes meaningfully during the course of review please update the title and description as required.