First: if you're unsure or afraid of anything, just ask or submit the issue describing the problem you're aiming to solve.
Any bug fix and feature has to be considered in the context of many thousands providers and the wider Terraform ecosystem. This is great as your contribution can have a big positive impact, but we have to assess potential negative impact too (e.g. breaking existing providers which may not use a new feature).
Note: We use GitHub for tracking bugs and feature requests related to this project.
For questions, please use HashiCorp Discuss.
Please disclose security vulnerabilities responsibly by following the procedure described at https://www.hashicorp.com/security#vulnerability-reporting
We welcome issues of all kinds including feature requests, bug reports, or documentation contributions. Below are guidelines for well-formed issues of each type.
- Test against latest release: Make sure you test against the latest avaiable version of both Terraform and terraform-plugin-framework. It is possible we already fixed the bug you're experiencing.
- Search for duplicates: It is helpful to keep bug reports consolidated to one thread, so do a quick search on existing bug reports to check if anybody else has reported the same issue. You can scope searches by the label
bug
to help narrow things down. - Include steps to reproduce: Provide steps to reproduce the issue, along with code examples (both HCL and Go, where applicable) and/or real code, so we can try to reproduce it. Without this, it makes it much harder (sometimes impossible) to fix the issue.
- Consider adding an integration test case: A demo provider, terraform-provider-corner, is available as an easy test bed for reproducing bugs in provider code. Consider opening a PR to terraform-provider-corner demonstrating the bug. Please see Integration tests below for how to do this.
- Search for possible duplicate requests: It is helpful to keep requests consolidated to one thread, so do a quick search on existing requests to check if anybody else has reported the same issue. You can scope searches by the label
enhancement
to help narrow things down. - Include a use case description: In addition to describing the behavior of the feature you'd like to see added, it's helpful to also lay out the reason why the feature would be important and how it would benefit the wider Terraform ecosystem. Use case in context of 1 provider is good, wider context of more providers is better.
- Search for possible duplicate suggestions: It is helpful to keep suggestions consolidated to one thread, so do a quick search on existing issues to check if anybody else has suggested the same change. You can scope searches by the label
documentation
to help narrow things down. - Describe the questions you're hoping the documentation will answer: It is very helpful when writing documentation to have specific questions like "how do I implement a default value?" in mind. This helps us ensure the documentation is targeted, specific, and framed in a useful way.
- Contribute: This repository contains the markdown files that generate versioned documentation for developer.hashicorp.com/terraform/plugin/framework. Please open a pull request with documentation changes. Refer to the website README for more information.
Thank you for contributing!
- Early validation of idea and implementation plan: Most code changes in this project, unless trivial typo fixes or cosmetic, should be discussed and approved by maintainers in an issue before an implementation is created. This project is complicated enough that there are often several ways to implement something, each of which has different implications and tradeoffs. Working through an implementation plan with the maintainers before you dive into implementation will help ensure that your efforts may be approved and merged.
- Logging: Refer to the logging section for guidance on choosing the appropriate log level for messages.
- Unit and Integration Tests: It may go without saying, but every new patch should be covered by tests wherever possible (see Testing below).
- Go Modules: We use Go Modules to manage and version all our dependencies. Please make sure that you reflect dependency changes in your pull requests appropriately (e.g.
go get
,go mod tidy
or other commands). Refer to the dependency updates section for more information about how this project maintains existing dependencies. - Changelog: Refer to the changelog section for more information about how to create changelog entries.
- License Headers: All source code requires a license header at the top of the file, refer to License Headers for information on how to autogenerate these headers.
Dependency management is performed by dependabot. Where possible, dependency updates should occur through that system to ensure all Go module files are appropriately updated and to prevent duplicated effort of concurrent update submissions. Once available, updates are expected to be verified and merged to prevent latent technical debt.
HashiCorp’s projects have always maintained user-friendly, readable CHANGELOG
s that allow practitioners and developers to tell at a glance whether a release should have any effect on them, and to gauge the risk of an upgrade. This provider uses the Changie automation tool for changelog automation.
Creating a new entry for the CHANGELOG
:
- Install Changie, if not already done
- Run
changie new
from the root directory of this project - Choose the appropriate
kind
of change - When prompted, type the associated GitHub issue or pull request number
- Fill out the entry body using a
package: details
format - Repeat this process for any additional entries
The .yaml
files created in the .changes/unreleased
folder should be pushed the repository along with any code changes.
The CHANGELOG is intended to show developer-impacting changes to the codebase for a particular version. If every change or commit to the code resulted in an entry, the CHANGELOG would become less useful for developers. The lists below are general guidelines and examples for when a decision needs to be made to decide whether a change should have an entry.
- Documentation updates
- Testing updates
- Code refactoring
- Dependency updates: If the update contains relevant bug fixes or enhancements that affect developers, those should be called out.
- Major features
- Enhancements
- Bug fixes
- Deprecation notes
- Breaking changes
All source code files (excluding autogenerated files like go.mod
, prose, and files excluded in .copywrite.hcl) must have a license header at the top.
This can be autogenerated by running make generate
or running go generate ./...
in the /tools directory.
GitHub Actions workflow bug and style checking is performed via actionlint
.
To run the GitHub Actions linters locally, install the actionlint
tool, and run:
actionlint
Go code bug and style checking is performed via golangci-lint
.
To run the Go linters locally, install the golangci-lint
tool, and run:
golangci-lint run ./...
Code contributions that introduce new log messages should utilize the helper functions in the internal/logging
package. Here are some examples on when to use each helper:
FrameworkError
- Logs atERROR
level, can be used to provide additional detail alongside user-facing errors that are returned withdiag.Diagnostics
.FrameworkWarn
- Logs atWARN
level, can be used to signal unexpected scenarios that may not result in a user-facing error, but can be used to track down potential provider implementation bugs.FrameworkDebug
- Logs atDEBUG
level, can be used to describe internal logic behavior, such as semantic equality being triggered to preserve a prior value, or a nullComputed
attribute being marked as unknown.FrameworkTrace
- Logs atTRACE
level, can be used to describe internal logic execution, such as logging a message before and after a provider-defined method is called. As the name suggests, these messages are used to "trace" where a program is at during execution.
More general guidance about logging can be found in the Plugin Development documentation.
Code contributions should be supported by both unit and integration tests wherever possible.
GitHub Actions workflow testing is performed via act
.
To run the GitHub Actions testing locally (setting appropriate event):
act --artifact-server-path /tmp --env ACTIONS_RUNTIME_TOKEN=test -P ubuntu-latest=ghcr.io/catthehacker/ubuntu:act-latest pull_request
The command options can be added to a ~/.actrc
file:
--artifact-server-path /tmp
--env ACTIONS_RUNTIME_TOKEN=test
-P ubuntu-latest=ghcr.io/catthehacker/ubuntu:act-latest
So they do not need to be specified every invocation:
act pull_request
To test the ci-go/terraform-provider-corner
job, a valid GitHub Personal Access Token (PAT) with public read permissions is required. It can be passed in via the -s GITHUB_TOKEN=...
command option.
Go code unit testing is perfomed via Go's built-in testing functionality.
To run the Go unit testing locally:
go test ./...
This codebase follows Go conventions for unit testing. Some guidelines include:
- File Naming: Test files should be named
*_test.go
and usually reside in the same package as the code being tested. - Test Naming: Test functions must include the
Test
prefix and should be named after the function or method under test. AnExample()
function test should be namedTestExample
. AData
typeExample()
method test should be namedTestDataExample
. - Concurrency: Where possible, unit tests should be able to run concurrently and include a call to
t.Parallel()
. Usage of mutable shared data, such as environment variables or global variables that are used with reads and writes, is strongly discouraged. - Table Driven: Where possible, unit tests should be written using the table driven testing style.
- go-cmp: Where possible, comparison testing should be done via
go-cmp
. In particular, thecmp.Diff()
andcmp.Equal()
functions are helpful.
A common template for implementing unit tests is:
func TestExample(t *testing.T) {
t.Parallel()
testCases := map[string]struct{
// fields to store inputs and expectations
}{
"test-description": {
// fields from above
},
}
for name, testCase := range testCases {
// Do not omit this next line
name, testCase := name, testCase
t.Run(name, func(t *testing.T) {
t.Parallel()
// Implement test referencing testCase fields
})
}
}
We use a special "corner case" Terraform provider for integration testing of terraform-plugin-framework, called terraform-provider-corner.
Integration testing for terraform-plugin-framework involves compiling this provider against the version of the framework to be tested, and running the provider's acceptance tests. The "provider-corner integration test"
CI job does this automatically for each PR commit and each commit to main
. This ensures that changes to terraform-plugin-framework do not cause regressions.
The terraform-provider-corner repo contains several provider servers (which are combined in order to test terraform-plugin-mux) to test different versions of the Terraform Plugin SDK and Framework.
To add a test case for terraform-plugin-framework, add or modify resource code as appropriate in the frameworkprovider
. Then, create an acceptance test for the desired behaviour.
Creating a test case in terraform-provider-corner is a very helpful way to illustrate your bug report or feature request with easily reproducible provider code. We welcome PRs to terraform-provider-corner that demonstrate bugs and edge cases.
When fixing a bug or adding a new feature to the framework, it is helpful to create a test case in real provider code. Since the test will fail until your change is included in a terraform-plugin-framework release used by terraform-provider-corner, we recommend doing the following:
- Fork and clone the terraform-plugin-framework and terraform-provider-corner repositories to your local machine. Identify the bug you want to fix or the feature you want to add to terraform-plugin-framework.
- On your local fork of terraform-provider-corner, create a failing acceptance test demonstrating this behaviour. The test should be named
TestAccFramework*
. - Add a
replace
directive to thego.mod
file in your local terraform-provider-corner, pointing to your local fork of terraform-plugin-framework. - Make the desired code change on your local fork of terraform-plugin-framework. Don't forget unit tests as well!
- Verify that the acceptance test now passes.
- Make a PR to terraform-plugin-framework proposing the code change.
- Make a PR to terraform-provider-corner adding the new acceptance test and noting that it depends on the PR to terraform-plugin-framework.
Maintainers will ensure that the acceptance test is merged into terraform-provider-corner once the terraform-plugin-framework change is merged and released.
This section is dedicated to the maintainers of this project.
Run the release
GitHub Actions workflow.