-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add Network Firewall Policy Policy Packet Mirroring Rule resource #12855
Add Network Firewall Policy Policy Packet Mirroring Rule resource #12855
Conversation
dbdce51
to
850c9c5
Compare
Hello! I am a robot. Tests will require approval from a repository maintainer to run. @roaks3, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
First pass looks good, just some minor comments, and will run tests
insert_minutes: 20 | ||
update_minutes: 20 | ||
delete_minutes: 20 | ||
async: |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Would you mind rebasing and then removing the fields that are no longer under async
supported here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
primary_resource_id: 'primary' | ||
vars: | ||
fw_policy: 'fw-policy' | ||
network_name: 'network' |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This should be something with a hyphen, like "fw-network" (we have special handling that relies on the hyphen being present)
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done
security_profile_group = "//networksecurity.googleapis.com/${google_network_security_security_profile_group.security_profile_group_1.id}" | ||
|
||
target_secure_tags { | ||
name = "tagValues/${google_tags_tag_value.secure_tag_value_1.name}" |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Nit: spacing, especially since this will show up on the docs page
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed
project = "%{project_name}" | ||
} | ||
|
||
resource "google_compute_network_firewall_policy_packet_mirroring_rule" "primary" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Could you omit the optional fields from either the _basic
or _update
config, to confirm they can be properly omitted?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
done - I removed description, rule_name, disabled which are optional
f852817
to
2f6ab4a
Compare
@roaks3 This PR has been waiting for review for 3 weekdays. Please take a look! Use the label |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_compute_network_firewall_policy_packet_mirroring_rule" "primary" {
match {
dest_ip_ranges = # value needed
layer4_configs {
ports = # value needed
}
}
tls_inspect = # value needed
}
|
Tests analyticsTotal tests: 1099 Click here to see the affected service packages
Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected tests
|
🟢 Tests passed during RECORDING mode: 🟢 No issues found for passed tests after REPLAYING rerun. 🟢 All tests passed! |
bc0b2a9
As part of the work to launch Network Security Integrations (NSI) (b/352252592) we introduce a new resource to allow users to configure Network Firewall Policy Packet Mirroring rules.
In this PR we add Terraform support for the new resource type.