-
Notifications
You must be signed in to change notification settings - Fork 1.8k
Create network edge security services and region security policy #7979
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Create network edge security services and region security policy #7979
Conversation
…icy_ddos_protection_config
…-security-services-and-policies
…-security-services-and-policies
…sts for network_edge_security_service
…-security-services-and-policies
…-security-services-and-policies
Hello! I am a robot who works on Magic Modules PRs. I've detected that you're a community contributor. @shuyama1, a repository maintainer, has been assigned to assist you and help review your changes. ❓ First time contributing? Click here for more detailsYour assigned reviewer will help review your code by:
You can help make sure that review is quick by running local tests and ensuring they're passing in between each push you make to your PR's branch. Also, try to leave a comment with each push you make, as pushes generally don't generate emails. If your reviewer doesn't get back to you within a week after your most recent change, please feel free to leave a comment on the issue asking them to take a look! In the absence of a dedicated review dashboard most maintainers manage their pending reviews through email, and those will sometimes get lost in their inbox. |
@shuyama1 The tests are likely to fail because the project requires "Cloud Armor Managed Protection Plus" tier activated. The message is probably something like this: "Error: Error creating NetworkEdgeSecurityService: googleapi: Error 400: Network Security Policies require Cloud Armor Managed Protection Plus tier and above to use., badRequest" Could you please verify how to activate it in the build project? https://cloud.google.com/armor/docs/managed-protection-overview Thanks |
@felipegc Thanks for the info. Taking a look now. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 4 files changed, 293 insertions(+)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: Please add acceptance tests which include these fields. |
Tests analyticsTotal tests: Action takenFound 12 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccComputeRegionSecurityPolicy_regionSecurityPolicyBasicUpdateExample|TestAccComputeRegionSecurityPolicy_regionSecurityPolicyWithDdosProtectionConfigExample|TestAccComputeRegionSecurityPolicy_regionSecurityPolicyBasicExample|TestAccComputeNetworkEdgeSecurityService_update|TestAccComputeNetworkEdgeSecurityService_computeNetworkEdgeSecurityServiceBasicExample|TestAccComputeFirewallPolicyRule_multipleRules|TestAccAlloydbBackup_missingLocation|TestAccApigeeKeystoresAliasesKeyCertFile_apigeeKeystoresAliasesKeyCertFileTestExample|TestAccApigeeKeystoresAliasesPkcs12_ApigeeKeystoresAliasesPkcs12Example|TestAccAlloydbCluster_missingLocation|TestAccDataSourceAlloydbLocations_basic|TestAccDataSourceGoogleFirebaseAndroidAppConfig |
Tests passed during RECORDING mode: Tests failed during RECORDING mode: Please fix these to complete your PR |
Working with internal teams to get our projects switch to |
Hi @shuyama1 do you have any news about bumping the projects to "Cloud Armor Managed Protection Plus"? |
Hi @felipegc. Sorry, I haven't heard back from the internal team but I'll try to check in with them today. |
…-security-services-and-policies
@shuyama1 I think I have addressed all issues right? Could you continue the review please? Thanks |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 4 files changed, 293 insertions(+)) |
Tests analyticsTotal tests: Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccComputeFirewallPolicyRule_multipleRules|TestAccComputeNetworkEndpoints_networkEndpointsBasic |
Tests passed during RECORDING mode: Tests failed during RECORDING mode: Please fix these to complete your PR |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Overall LGTM! only some small comments
mmv1/third_party/terraform/tests/resource_compute_network_edge_security_service_test.go.erb
Outdated
Show resolved
Hide resolved
…-security-services-and-policies
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 4 files changed, 293 insertions(+)) |
Tests analyticsTotal tests: Action takenFound 4 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccComputeNetworkEdgeSecurityService_update|TestAccComputeNetworkEdgeSecurityService_computeNetworkEdgeSecurityServiceBasicExample|TestAccComputeNetworkEndpoints_networkEndpointsBasic|TestAccComputeFirewallPolicyRule_multipleRules |
Tests passed during RECORDING mode: Tests failed during RECORDING mode: Please fix these to complete your PR |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thank you!
…gleCloudPlatform#7979) Co-authored-by: diogoEsteves <[email protected]>
…gleCloudPlatform#7979) Co-authored-by: diogoEsteves <[email protected]>
…gleCloudPlatform#7979) Co-authored-by: diogoEsteves <[email protected]>
fixes hashicorp/terraform-provider-google#14520
fixes hashicorp/terraform-provider-google#13978
related to GoogleCloudPlatform/terraform-google-cloud-armor#24
Adding the necessary resources to make it possible to activate the new policy type "CLOUD_ARMOR_NETWORK" and "ddos_protection_config"
If this PR is for Terraform, I acknowledge that I have:
make test
andmake lint
in the generated providers to ensure it passes unit and linter tests.Release Note Template for Downstream PRs (will be copied)