Skip to content

Conversation

tobio
Copy link
Member

@tobio tobio commented Jul 6, 2025

Fixes #1172

@tobio tobio requested review from a team, dimuon and wandergeek July 6, 2025 05:58
@tobio tobio self-assigned this Jul 6, 2025
@tobio tobio force-pushed the kb-role-description branch from 93c07ea to c7feb8e Compare July 7, 2025 04:30
@tobio tobio force-pushed the kb-role-description branch from c7feb8e to 0c6fff4 Compare July 7, 2025 04:32
wandergeek
wandergeek previously approved these changes Jul 8, 2025
roleName := sdkacctest.RandStringFromCharSet(10, sdkacctest.CharSetAlphaNum)
roleNameRemoteIndices := sdkacctest.RandStringFromCharSet(10, sdkacctest.CharSetAlphaNum)
minSupportedRemoteIndicesVersion := version.Must(version.NewSemver("8.10.0"))
minSupportedDescriptionVersion := version.Must(version.NewVersion("8.15.0"))
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I most likely don't have the context but I'm curious why these min versions have to be repeated everywhere?

@tobio tobio merged commit ec089b4 into main Jul 8, 2025
48 checks passed
@tobio tobio deleted the kb-role-description branch July 8, 2025 03:26
tobio added a commit to agunnerson-elastic/terraform-provider-elasticstack that referenced this pull request Jul 8, 2025
* origin/main:
  Add description to kibana role resource (elastic#1186)
snobear added a commit to snobear/terraform-provider-elasticstack that referenced this pull request Aug 7, 2025
…idation errors

The description field was being set unconditionally in resourceRoleRead,
which caused Terraform to reject the plan when the description was empty
because it was trying to set a non-computed attribute to an empty string.

This fix ensures that the description field is only set when it contains
actual content, preventing the 'Provider produced invalid plan' error
for elasticstack_kibana_security_role resources without descriptions.

Fixes: elastic#1186
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Add description in elasticstack_kibana_security_role resource

2 participants