Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added support for workload-vulnerability-scanning and workload-config-audit #7310

Merged
merged 4 commits into from
Feb 27, 2023

Conversation

avinash84
Copy link
Contributor

@avinash84 avinash84 commented Feb 16, 2023

Added support for workload-vulnerability-scanning and workload-config-audit
Fixes hashicorp/terraform-provider-google#12778

If this PR is for Terraform, I acknowledge that I have:

  • Searched through the issue tracker for an open issue that this either resolves or contributes to, commented on it to claim it, and written "fixes {url}" or "part of {url}" in this PR description. If there were no relevant open issues, I opened one and commented that I would like to work on it (not necessary for very small changes).
  • Ensured that all new fields I added that can be set by a user appear in at least one example (for generated resources) or third_party test (for handwritten resources or update tests).
  • Generated Terraform providers, and ran make test and make lint in the generated providers to ensure it passes unit and linter tests.
  • Ran relevant acceptance tests using my own Google Cloud project and credentials (If the acceptance tests do not yet pass or you are unable to run them, please let your reviewer know).
  • Read the Release Notes Guide before writing my release note below.

Release Note Template for Downstream PRs (will be copied)

container: added field `protect_config` to `google_container_cluster` (beta)

@avinash84 avinash84 requested a review from a team as a code owner February 16, 2023 02:08
@avinash84 avinash84 requested review from melinath and removed request for a team February 16, 2023 02:08
@avinash84
Copy link
Contributor Author

/gcbrun

@shuyama1 shuyama1 requested review from shuyama1 and removed request for melinath February 16, 2023 02:46
@shuyama1
Copy link
Member

/gcbrun

@modular-magician
Copy link
Collaborator

Hi there, I'm the Modular magician. I've detected the following information about your changes:

Diff report

Your PR generated some diffs in downstreams - here they are.

Terraform GA: Diff ( 1 file changed, 22 insertions(+))
Terraform Beta: Diff ( 3 files changed, 189 insertions(+))
TF Validator: Diff ( 2 files changed, 3 insertions(+), 3 deletions(-))

@modular-magician
Copy link
Collaborator

Tests analytics

Total tests: 2465
Passed tests 2206
Skipped tests: 256
Failed tests: 3

Action taken

Triggering VCR tests in RECORDING mode for the tests that failed during VCR. Click here to see the failed tests
TestAccFirebaserulesRelease_BasicRelease|TestAccContainerCluster_withProtectConfig|TestAccApigeeAddonsConfig_apigeeAddonsTestExample

@modular-magician
Copy link
Collaborator

Tests passed during RECORDING mode:
TestAccFirebaserulesRelease_BasicRelease[Debug log]
TestAccContainerCluster_withProtectConfig[Debug log]
TestAccApigeeAddonsConfig_apigeeAddonsTestExample[Debug log]

All tests passed
View the build log or the debug log for each test

Copy link
Member

@shuyama1 shuyama1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

only a couple small comments

Comment on lines 1037 to 1056
"workload_config": {
Type: schema.TypeList,
Optional: true,
MaxItems: 1,
Description: `WorkloadConfig defines the flags to enable or disable the workload configurations for the cluster.`,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"audit_mode": {
Type: schema.TypeString,
Optional: true,
Description: `Mode defines how to audit the workload configs. Accepted values are MODE_UNSPECIFIED, DISABLED, BASIC.`,
},
},
},
},
"workload_vulnerability_mode": {
Type: schema.TypeString,
Optional: true,
Description: `WorkloadVulnerabilityMode defines mode to perform vulnerability scanning. Accepted values are WORKLOAD_VULNERABILITY_MODE_UNSPECIFIED, DISABLED, BASIC.`,
},
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Can we make one of the subfields required (or have AtLeastOneOf added to them) to prevent users from sending empty blocks.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

made workload_config and audit_mode required to ensure that empty objects are never passed as input. Also added computed:true to workload_vulnerability_mode as default value is added to the field by server if no value is specified.

Comment on lines 1156 to 1164

```hcl
protect_config {
workload_config {
audit_mode = "BASIC"
}
workload_vulnerability_mode = "BASIC"
}
```
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We don't necessarily need to provide use example usage for every feature. I think we can remove it for this case or we can move it to the top in the same format as other examples.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

removed this example.

@avinash84
Copy link
Contributor Author

/gcbrun

@shuyama1
Copy link
Member

/gcbrun

Copy link
Member

@shuyama1 shuyama1 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM! Will merge the PR after tests passed. Thanks!

@modular-magician
Copy link
Collaborator

Hi there, I'm the Modular magician. I've detected the following information about your changes:

Diff report

Your PR generated some diffs in downstreams - here they are.

Terraform GA: Diff ( 1 file changed, 13 insertions(+))
Terraform Beta: Diff ( 3 files changed, 190 insertions(+))
TF Validator: Diff ( 2 files changed, 3 insertions(+), 3 deletions(-))

@modular-magician
Copy link
Collaborator

Tests analytics

Total tests: 2474
Passed tests 2216
Skipped tests: 255
Failed tests: 3

Action taken

Triggering VCR tests in RECORDING mode for the tests that failed during VCR. Click here to see the failed tests
TestAccFirebaserulesRelease_BasicRelease|TestAccApigeeAddonsConfig_apigeeAddonsTestExample|TestAccWorkstationsWorkstationConfig_workstationConfigEncryptionKeyExample

@modular-magician
Copy link
Collaborator

Tests passed during RECORDING mode:
TestAccFirebaserulesRelease_BasicRelease[Debug log]
TestAccApigeeAddonsConfig_apigeeAddonsTestExample[Debug log]

Tests failed during RECORDING mode:
TestAccWorkstationsWorkstationConfig_workstationConfigEncryptionKeyExample[Error message] [Debug log]

Please fix these to complete your PR
View the build log or the debug log for each test

@shuyama1
Copy link
Member

Test failure seems unrelated to this PR.

@shuyama1 shuyama1 merged commit 974faae into GoogleCloudPlatform:main Feb 27, 2023
mdtro pushed a commit to mdtro/magic-modules that referenced this pull request Mar 2, 2023
…-audit (GoogleCloudPlatform#7310)

* Added support for workload-vulnerability-scanning and workload-config-audit

Fixes hashicorp/terraform-provider-google#12778

* Made google_container_cluster protect_config field optional

* made container_cluster protect_config.workload_config.audit_mode required

* Made fields inside protect_config as atleastOneOf in container_cluster resource.

---------

Co-authored-by: Avinash Kumar <avikuma@google.com>
anuhyapolisetti pushed a commit to anuhyapolisetti/magic-modules that referenced this pull request Mar 16, 2023
* main: (41 commits)
  update the test cases to resolve resourcename not found error
  Adds `grpc` field to `liveness_probe` and `startup_probe` to `google_cloud_run_v2_service` resource (GoogleCloudPlatform#6987)
  Upgrade DCL to v1.34 (GoogleCloudPlatform#7276)
  Add max_distance field to group placement policy (GoogleCloudPlatform#7354)
  Add stateful_ips to region_per_instance_config and per_instance_config (GoogleCloudPlatform#7316)
  Added support for workload-vulnerability-scanning and workload-config-audit (GoogleCloudPlatform#7310)
  datacatalog - bump Taxonomy and PolicyTag to ga (GoogleCloudPlatform#6989)
  Added best practices documentation for ForceNew fields (GoogleCloudPlatform#7127)
  Split resources in "B" products (GoogleCloudPlatform#7350)
  force recreate on master_config.num_instances (GoogleCloudPlatform#7349)
  Fix DataFusion instance versions used in tests (GoogleCloudPlatform#7343)
  remove duplicate word in Cluster.yaml (GoogleCloudPlatform#7347)
  Move more billing tests that require permissions beyond Billing User to master billing account (GoogleCloudPlatform#7344)
  Remove artifact repository beta URL, fixup handwritten tests (GoogleCloudPlatform#7345)
  Cloud Workstations - Workstation Config (GoogleCloudPlatform#7017)
  Add missing `type` argument to data source docs (GoogleCloudPlatform#7341)
  Fix caps in spanner resource schema accesses (GoogleCloudPlatform#7346)
  Downgrade Go to 1.18, modify comments (GoogleCloudPlatform#7339)
  feat: Add support for deletion_policy on shared vpc service project (GoogleCloudPlatform#7283)
  fixed virtual field update issues (GoogleCloudPlatform#7318)
  ...
ericayyliu pushed a commit to ericayyliu/magic-modules that referenced this pull request Jul 26, 2023
…-audit (GoogleCloudPlatform#7310)

* Added support for workload-vulnerability-scanning and workload-config-audit

Fixes hashicorp/terraform-provider-google#12778

* Made google_container_cluster protect_config field optional

* made container_cluster protect_config.workload_config.audit_mode required

* Made fields inside protect_config as atleastOneOf in container_cluster resource.

---------

Co-authored-by: Avinash Kumar <avikuma@google.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

google_container_cluster: support for workload-vulnerability-scanning and workload-config-audit
3 participants