Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add policycontroller fields to fleet default configs for GKE Hub Feature resource #9426

Merged
merged 79 commits into from
Nov 15, 2023

Conversation

tonyzhc
Copy link
Contributor

@tonyzhc tonyzhc commented Nov 7, 2023

Add the policycontroller feature config for fleet default configs for the Feature resource. Fixes hashicorp/terraform-provider-google#16373.

Release Note Template for Downstream PRs (will be copied)

gkehub2: added `policycontroller` field to `fleet_default_member_config` under the `google_gke_hub_feature` resource. Users can now configure a default Policy Controller configuration for new memberships added to the fleet.

sahsagar-google and others added 30 commits July 19, 2023 19:04
@modular-magician
Copy link
Collaborator

Hi there, I'm the Modular magician. I've detected the following information about your changes:

Diff report

Your PR generated some diffs in downstreams - here they are.

Terraform GA: Diff ( 3 files changed, 1463 insertions(+))
Terraform Beta: Diff ( 3 files changed, 1469 insertions(+))
TF Conversion: Diff ( 1 file changed, 457 insertions(+))

Missing test report

Your PR includes resource fields which are not covered by any test.

Resource: google_gke_hub_feature (5 total tests)
Please add an acceptance test which includes these fields. The test should include the following:

resource "google_gke_hub_feature" "primary" {
  fleet_default_member_config {
    policycontroller {
      policy_controller_hub_config {
        audit_interval_seconds     = # value needed
        constraint_violation_limit = # value needed
        deployment_configs {
          component = # value needed
          container_resources {
            limits {
              cpu    = # value needed
              memory = # value needed
            }
            requests {
              cpu    = # value needed
              memory = # value needed
            }
          }
          pod_affinity = # value needed
          pod_toleration {
            effect   = # value needed
            key      = # value needed
            operator = # value needed
            value    = # value needed
          }
          replica_count = # value needed
        }
        exemptable_namespaces = # value needed
        install_spec          = # value needed
        log_denies_enabled    = # value needed
        monitoring {
          backends = # value needed
        }
        mutation_enabled = # value needed
        policy_content {
          bundles {
            bundle              = # value needed
            exempted_namespaces = # value needed
          }
          template_library {
            installation = # value needed
          }
        }
        referential_rules_enabled = # value needed
      }
      version = # value needed
    }
  }
}

@modular-magician
Copy link
Collaborator

Hi there, I'm the Modular magician. I've detected the following information about your changes:

Diff report

Your PR generated some diffs in downstreams - here they are.

Terraform GA: Diff ( 3 files changed, 1463 insertions(+))
Terraform Beta: Diff ( 3 files changed, 1463 insertions(+))
TF Conversion: Diff ( 1 file changed, 457 insertions(+))

Missing test report

Your PR includes resource fields which are not covered by any test.

Resource: google_gke_hub_feature (5 total tests)
Please add an acceptance test which includes these fields. The test should include the following:

resource "google_gke_hub_feature" "primary" {
  fleet_default_member_config {
    policycontroller {
      policy_controller_hub_config {
        audit_interval_seconds     = # value needed
        constraint_violation_limit = # value needed
        deployment_configs {
          component = # value needed
          container_resources {
            limits {
              cpu    = # value needed
              memory = # value needed
            }
            requests {
              cpu    = # value needed
              memory = # value needed
            }
          }
          pod_affinity = # value needed
          pod_toleration {
            effect   = # value needed
            key      = # value needed
            operator = # value needed
            value    = # value needed
          }
          replica_count = # value needed
        }
        exemptable_namespaces = # value needed
        install_spec          = # value needed
        log_denies_enabled    = # value needed
        monitoring {
          backends = # value needed
        }
        mutation_enabled = # value needed
        policy_content {
          bundles {
            bundle              = # value needed
            exempted_namespaces = # value needed
          }
          template_library {
            installation = # value needed
          }
        }
        referential_rules_enabled = # value needed
      }
      version = # value needed
    }
  }
}

@modular-magician
Copy link
Collaborator

Tests analytics

Total tests: 3227
Passed tests 2896
Skipped tests: 330
Affected tests: 1

Action taken

Found 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected tests
TestAccDataprocClusterIamPolicy

Get to know how VCR tests work

@modular-magician
Copy link
Collaborator

$\textcolor{green}{\textsf{Tests passed during RECORDING mode:}}$
TestAccDataprocClusterIamPolicy[Debug log]

Rerun these tests in REPLAYING mode to catch issues

$\textcolor{green}{\textsf{No issues found for passed tests after REPLAYING rerun.}}$


$\textcolor{green}{\textsf{All tests passed!}}$
View the build log or the debug log for each test

@c2thorn
Copy link
Member

c2thorn commented Nov 14, 2023

kicked off a non-VCR test run of TestAccGKEHubFeature_FleetDefaultMemberConfigPolicyController in our environment. Will give the results once completed.

c2thorn
c2thorn previously approved these changes Nov 14, 2023
Copy link
Member

@c2thorn c2thorn left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

test passed

@tonyzhc
Copy link
Contributor Author

tonyzhc commented Nov 14, 2023

Thank you! I would like to hold off on merging so that my TL can take a look at the PR as well.

@c2thorn c2thorn self-requested a review November 14, 2023 22:17
@c2thorn
Copy link
Member

c2thorn commented Nov 14, 2023

Thank you! I would like to hold off on merging so that my TL can take a look at the PR as well.

sounds good.

@c2thorn c2thorn requested review from a team and removed request for c2thorn November 15, 2023 13:17
@c2thorn c2thorn dismissed their stale review November 15, 2023 13:19

going on vacation

@c2thorn c2thorn requested review from a team and melinath and removed request for a team November 15, 2023 13:19
@c2thorn
Copy link
Member

c2thorn commented Nov 15, 2023

Will be OOO for a while, reassigning a random reviewer to carry this forward once ready.

Copy link

@ekitson ekitson left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@c2thorn c2thorn removed the request for review from melinath November 15, 2023 18:15
@c2thorn c2thorn merged commit 5c38dcb into GoogleCloudPlatform:main Nov 15, 2023
15 checks passed
davcen pushed a commit to davcen/gcp-magic-modules that referenced this pull request Nov 17, 2023
trodge pushed a commit to trodge/magic-modules that referenced this pull request Nov 27, 2023
BBBmau pushed a commit to BBBmau/magic-modules that referenced this pull request Nov 28, 2023
jialei-chen pushed a commit to jialei-chen/magic-modules that referenced this pull request Nov 29, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support Policy Controller configs for fleet_default_member_config in google_gke_hub_feature resource
5 participants