-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix identity type comparison for service perimeters #12267
Conversation
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_access_context_manager_service_perimeter_dry_run_egress_policy" "primary" {
egress_from {
identity_type = # value needed
}
}
Resource: resource "google_access_context_manager_service_perimeter_dry_run_ingress_policy" "primary" {
ingress_from {
identity_type = # value needed
}
}
Resource: resource "google_access_context_manager_service_perimeter_egress_policy" "primary" {
egress_from {
identity_type = # value needed
}
}
Resource: resource "google_access_context_manager_service_perimeter_ingress_policy" "primary" {
ingress_from {
identity_type = # value needed
}
}
|
Tests analyticsTotal tests: 4 Click here to see the affected service packages
🟢 All tests passed! View the build log |
Hello! I am a robot. Tests will require approval from a repository maintainer to run. @slevenick, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is a good demonstration on why we shouldn't allow the _UNSPECIFIED
enum value to be specified in Terraform!
Fixes hashicorp/terraform-provider-google/issues/17023. The API does not return the
IDENTITY_TYPE_UNSPECIFIED
enum value when it is set so we can treat that as an empty value.Release Note Template for Downstream PRs (will be copied)
See Write release notes for guidance.