-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unblock EXTERNAL/EXTERNAL_VPC Cloud KMS key creation. #9931
Conversation
Hello! I am a robot. It looks like you are a: @trodge, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Breaking Change(s) DetectedThe following breaking change(s) were detected within your pull request.
If you believe this detection to be incorrect please raise the concern with your reviewer. Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 165 insertions(+), 52 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_kms_crypto_key_version" "primary" {
external_protection_level_options {
ekm_connection_key_path = # value needed
external_key_uri = # value needed
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptions |
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Breaking Change(s) DetectedThe following breaking change(s) were detected within your pull request.
If you believe this detection to be incorrect please raise the concern with your reviewer. Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 171 insertions(+), 52 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_kms_crypto_key_version" "primary" {
external_protection_level_options {
ekm_connection_key_path = # value needed
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptions |
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Breaking Change(s) DetectedThe following breaking change(s) were detected within your pull request.
If you believe this detection to be incorrect please raise the concern with your reviewer. Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 172 insertions(+), 52 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_kms_crypto_key_version" "primary" {
external_protection_level_options {
ekm_connection_key_path = # value needed
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptions |
|
Note to reviewer: following internal discussions, this PR will need to be reworked a bit. I will let you know when it's ready for review. |
Reworked this PR, looking for |
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Breaking Change(s) DetectedThe following breaking change(s) were detected within your pull request.
If you believe this detection to be incorrect please raise the concern with your reviewer. Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 210 insertions(+), 27 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_kms_crypto_key_version" "primary" {
external_protection_level_options {
ekm_connection_key_path = # value needed
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptions |
|
Updated to undo remaining breaking changes, which will be done in a follow up PR. Looking for /gcbrun again |
@trodge mind /gcbrun -ing again? Thanks! |
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 190 insertions(+), 1 deletion(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_kms_crypto_key_version" "primary" {
external_protection_level_options {
ekm_connection_key_path = # value needed
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptions |
|
@trodge You can assign me to this if you want, it's similar to another PR that I reviewed. |
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: Click here to see the affected service packages
Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccKmsCryptoKeyVersion_externalProtectionLevelOptionsVpc |
|
* Add cryptoKeyBackend field to KMS CryptoKey. * Add top-level external_protection_level_options to CryptoKeyVersion. * Add custom pre_update code for KMS CryptoKeyVersion * Run EXTERNAL_VPC acceptance test only in nightly/GA builds
I just squashed all commits, now waiting for a successful VCR run before I add the tag to only run the VPC test in nightly/GA builds |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: Click here to see the affected service packages
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: Click here to see the affected service packages
|
Alright, looks like the test was skipped correctly! @c2thorn ready for the final review, I've updated the PR title and description but let me know if you'd like me to tweak something. Thanks! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, confirmed test logs stored on internal ticket for other EKM tests.
I'll check the nightly tomorrow to see how it goes with the permissions.
The
external_protection_level_options
field had been nested within the attestation field by accident. See hashicorp/terraform-provider-google#15004 for more information about this change..NOTE: this is the initial deprecation notice, and we are just adding a duplicate set of fields outside of
attestation
. When the old field is eventually removed, it should not break any CUJs because the current state of things does not allow for successful key creation (malformed requests would be rejected by the server). The old, deprecated field will be removed in the next release.Release Note Template for Downstream PRs (will be copied)