-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add allow_net_admin field to google_container_cluster resource #8323
Conversation
Hello! I am a robot who works on Magic Modules PRs. I've detected that you're a community contributor. @NickElliot, a repository maintainer, has been assigned to assist you and help review your changes. ❓ First time contributing? Click here for more detailsYour assigned reviewer will help review your code by:
You can help make sure that review is quick by running local tests and ensuring they're passing in between each push you make to your PR's branch. Also, try to leave a comment with each push you make, as pushes generally don't generate emails. If your reviewer doesn't get back to you within a week after your most recent change, please feel free to leave a comment on the issue asking them to take a look! In the absence of a dedicated review dashboard most maintainers manage their pending reviews through email, and those will sometimes get lost in their inbox. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 2 files changed, 80 insertions(+), 4 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 3 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccContainerAwsNodePool_BetaBasicHandWritten|TestAccContainerCluster_autopilot_net_admin|TestAccComputeFirewallPolicyRule_multipleRules |
Rerun these tests in REPLAYING mode to catch issues
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
At initial pass looks good. Could you also update the documentation to include the new field?
While that update is made I'm going to verify that the one-way required_with doesn't produce undesired forced recreations as it appears to be an unprecedented configuration. It may end up being better to remove that terraform side validation just to be sure, because as the allow_net_admin field is part of the Autopilot block, I assume that the API will reject a request that supplies only allow_net_admin, or it will simply do nothing if included on its own.
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 83 insertions(+), 4 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 3 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccContainerAwsNodePool_BetaBasicHandWritten|TestAccComputeInstance_minCpuPlatform|TestAccComputeFirewallPolicyRule_multipleRules |
Rerun these tests in REPLAYING mode to catch issues
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM! to @hao-nan-li for final approval
@@ -2750,6 +2769,29 @@ func resourceContainerClusterUpdate(d *schema.ResourceData, meta interface{}) er | |||
log.Printf("[INFO] GKE cluster %s's cluster-wide autoscaling has been updated", d.Id()) | |||
} | |||
|
|||
if d.HasChange("allow_net_admin") { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Is this field updatable? If so can you add an update test?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yes the field is updatable. I added update steps to the test to toggle the feature off and on again.
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 97 insertions(+), 4 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 3 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccContainerCluster_autopilot_net_admin|TestAccComputeFirewallPolicyRule_multipleRules|TestAccContainerAwsNodePool_BetaBasicHandWritten |
Rerun these tests in REPLAYING mode to catch issues
|
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 97 insertions(+), 4 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccComputeFirewallPolicyRule_multipleRules|TestAccContainerAwsNodePool_BetaBasicHandWritten |
|
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 97 insertions(+), 4 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccContainerAwsNodePool_BetaBasicHandWritten|TestAccComputeFirewallPolicyRule_multipleRules |
Rerun these tests in REPLAYING mode to catch issues
|
…eCloudPlatform#8323) * add net_admin field to container cluster for autopilot clusters * add allow_net_admin tests * tweak param name * fix net_admin test format string * fix syntax bug * fix api field typo * version safety and ImportStateVerifyIgnore for min_master_version in test * comment change * Add documentation and remove provider-side validation * add update test
…eCloudPlatform#8323) * add net_admin field to container cluster for autopilot clusters * add allow_net_admin tests * tweak param name * fix net_admin test format string * fix syntax bug * fix api field typo * version safety and ImportStateVerifyIgnore for min_master_version in test * comment change * Add documentation and remove provider-side validation * add update test
…eCloudPlatform#8323) * add net_admin field to container cluster for autopilot clusters * add allow_net_admin tests * tweak param name * fix net_admin test format string * fix syntax bug * fix api field typo * version safety and ImportStateVerifyIgnore for min_master_version in test * comment change * Add documentation and remove provider-side validation * add update test
…eCloudPlatform#8323) * add net_admin field to container cluster for autopilot clusters * add allow_net_admin tests * tweak param name * fix net_admin test format string * fix syntax bug * fix api field typo * version safety and ImportStateVerifyIgnore for min_master_version in test * comment change * Add documentation and remove provider-side validation * add update test
Fixes issue hashicorp/terraform-provider-google#15136
If this PR is for Terraform, I acknowledge that I have:
make test
andmake lint
in the generated providers to ensure it passes unit and linter tests.Release Note Template for Downstream PRs (will be copied)