-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CRUD operations of kafka_acl uses the APIKey in the credentials block instead of provider block #329
Comments
Thanks for creating this issue @jaylevin! I wonder what's the use case for having credentials in both |
@linouk23 That is my understanding of the documentation as well and I'm not sure why it's been done this way. The credentials referred to by the When using Option 1, you specify a cloud API secret ID and Key. However, the code currently checks if the Since the I've opened a PR to fix this here. Looking forward to your review. |
Hi @linouk23, just a friendly ping here to see if you are still following this issue or if you had a chance to take a look at my open PR. |
Hi @shaafekhan @linouk23, I am still waiting on an update from the maintainers as well |
Hi, I am having an issue with the "confluent_kafka_acl" resource as well. I would expect that rather than the resource require that I set the "rest endpoint" as either an ENV or in the Provider that it would use the rest endpoint in the resource itself. This allows me to manage multiple clusters with different rest endpoints, using the same API Key and Secret? Which if you have a dedicated set of API credentials per environment, will be a problem as you can have different clusters with different endpoints within the same environment. |
Current behavior:
With the following API Key based provider authentication:
All CRUD operations on a
kafka_acl
results in the ACL's referenced credentials being used for authentication with Confluent instead of thecloud_api_key
andcloud_api_secret
defined in the provider's configuration block.Expected behavior:
I would expect the creation, reading, deletion, or update of a
kafka_acl
to use the provider's configured APIKey/secret defined in theprovider "confluent" { .. }
block.Observed behavior:
Because
isKafkaMetadataSet
checks for a cluster-specifickafka_rest_endpoint
to be set in the provider's authentication block, the api key/secret defined in the provider's authentication block are ignored, and instead the credentials referenced in the actual ACL definition are used for the API operations to Confluent. This makes it impossible to implement this provider's use-case #1: "managing multiple confluent clusters in the same terraform workspace".kafka_acl
'scredentials
block (not the static credentials defined in the provider block) when configuring the provider with the documented static credentials option #1:I am wondering if there is a specific reason why the confluent provider is using the ACL's referenced credentials for authentication versus the credentials defined in the
provider
block? If there is no special reason for this, I think #328 would be a good solution for this problem.The text was updated successfully, but these errors were encountered: