-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add update support to serverTlsPolicy field in region_target_https_proxy #11184
Add update support to serverTlsPolicy field in region_target_https_proxy #11184
Conversation
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Hello! I am a robot. Tests will require approval from a repository maintainer to run. @NickElliot, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
cda4c91
to
bd9a48c
Compare
@NickElliot: I added the test first (before the update to
After making the necessary changes to
|
@trodge @slevenick hi 👋 any chance I can get you to review this PR? |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: 972 Click here to see the affected service packages
Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected tests
|
|
6024bb7
to
c49ef6c
Compare
@NickElliot This PR has been waiting for review for 3 weekdays. Please take a look! Use the label |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: 975 Click here to see the affected service packages
View the build log |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you add a third test step returning to the testAccComputeRegionTargetHttpsProxy_withForwardingRule_withoutServerTlsPolicy
config? Thanks!
@NickElliot sure, added. |
58c1cd4
to
c59289a
Compare
@NickElliot hrm, just re-ran tests locally and it didn't work:
I guess the issue here is that the third test is deleting the server TLS policy, which is tied to the HTTPS proxy, and Terraform may be destroying the resource before updating it? |
I ran the Terraform manually using the locally built provider and this is the plan when applying the third-test:
The change to the
I think this affects just about any resource destroy operation that is linked to from another resource as Terraform does a destroy before create. There's a 2 year old issue about this: hashicorp/terraform#31309 Any ideas on how to proceed here @NickElliot? |
@NickElliot: just a friendly nudge to see if I can get this PR re-reviewed. |
@NickElliot This PR has been waiting for review for 3 weekdays. Please take a look! Use the label |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: 977 Click here to see the affected service packages
Action takenFound 5 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected tests
|
|
@GoogleCloudPlatform/terraform-team @NickElliot This PR has been waiting for review for 1 week. Please take a look! Use the label |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: 1016 Click here to see the affected service packages
View the build log |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
a couple docs changes and this should be good!
mmv1/templates/terraform/examples/go/network_security_server_tls_policy_mtls.tf.tmpl
Outdated
Show resolved
Hide resolved
@NickElliot thanks for reviewing. Just pushed a commit with your feedback 🙏 |
@NickElliot: Hi, just a friendly nudge to see if we can get this merged. Thanks! |
@NickElliot This PR has been waiting for review for 3 weekdays. Please take a look! Use the label |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Adds support to update "server_tls_policy" field in "compute_region_target_https_proxy" via the PATCH endpoint, removing its ForceNew flag, as well as related tests.
Fixes: hashicorp/terraform-provider-google#18757
Release Note Template for Downstream PRs (will be copied)