-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_servicebus_namespace
- support for the premium_messaging_partitions
property
#24676
azurerm_servicebus_namespace
- support for the premium_messaging_partitions
property
#24676
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @xiaxyi - There's some comments to take a look at below, as it appears there is some confusion about allowed values? Can you take a look?
@@ -51,6 +51,8 @@ The following arguments are supported: | |||
|
|||
* `capacity` - (Optional) Specifies the capacity. When `sku` is `Premium`, capacity can be `1`, `2`, `4`, `8` or `16`. When `sku` is `Basic` or `Standard`, capacity can be `0` only. | |||
|
|||
* `premium_messaging_partitions` - (Optional) Specifies the messaging partitions. When `sku` is `Premium`, messaging partitions can be `1`, `2`, `4`. When `sku` is `Basic` or `Standard`, messaging partitions can be `0` only. Changing this forces a new resource to be created. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
* `premium_messaging_partitions` - (Optional) Specifies the messaging partitions. When `sku` is `Premium`, messaging partitions can be `1`, `2`, `4`. When `sku` is `Basic` or `Standard`, messaging partitions can be `0` only. Changing this forces a new resource to be created. | |
* `premium_messaging_partitions` - (Optional) Specifies the number of Premium Messaging Partitions. Only valid when `sku` is `Premium`. Possible values include `0`, `1`, `2`, and `4`. Defaults to `0`. Changing this forces a new resource to be created. |
resource_group_name = azurerm_resource_group.test.name | ||
sku = "Premium" | ||
capacity = 2 | ||
premium_messaging_partitions = 0 |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This defaults to 0
so should be omitted here?
premium_messaging_partitions = 0 |
data.ResourceTest(t, r, []acceptance.TestStep{ | ||
{ | ||
Config: r.premiumMessagingPartition(data), | ||
ExpectError: regexp.MustCompile("Service Bus SKU \"Premium\" only supports `premium_messaging_partitions` of 1, 2, 4"), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This doesn't match the schema validation above?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The validation error is for the premium namespaces
if strings.EqualFold(sku, string(namespaces.SkuNamePremium)) && premiumMessagingUnit.(int) == 0 { | ||
return fmt.Errorf("Service Bus SKU %q only supports `premium_messaging_partitions` of 1, 2, 4", sku) | ||
} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This doesn't match the schema validation above? The property defaults to 0
also.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This is for the premium namespace, 0 is not a valid value for premium namespace.
Thanks @jackofallops for reviewing this pr! The feature is only available in service bus premium namespace but we still need to set it to 0 for the standard/ basic namespace For premium namespace, the default value is 1, despite of the 0 value we put in the request body, like |
azurerm_servicebus_namespace
- add premium_messaging_partitions
for premium servicebus namespaceazurerm_servicebus_namespace
- support for the premium_messaging_partitions
property
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
We have some test fialures
------- Stdout: -------
=== RUN TestAccAzureRMServiceBusNamespacePairing_basic
=== PAUSE TestAccAzureRMServiceBusNamespacePairing_basic
=== CONT TestAccAzureRMServiceBusNamespacePairing_basic
testcase.go:113: Step 1/2 error: Error running apply: exit status 1
Error: Service Bus SKU "Premium" only supports `premium_messaging_partitions` of 1, 2, 4
with azurerm_servicebus_namespace.primary_namespace_test,
on terraform_plugin_test.tf line 31, in resource "azurerm_servicebus_namespace" "primary_namespace_test":
31: resource "azurerm_servicebus_namespace" "primary_namespace_test" {
Error: Service Bus SKU "Premium" only supports `premium_messaging_partitions` of 1, 2, 4
with azurerm_servicebus_namespace.secondary_namespace_test,
on terraform_plugin_test.tf line 39, in resource "azurerm_servicebus_namespace" "secondary_namespace_test":
39: resource "azurerm_servicebus_namespace" "secondary_namespace_test" {
--- FAIL: TestAccAzureRMServiceBusNamespacePairing_basic (48.64s)
FAIL
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can you please fix all failed test cases:
=== RUN TestAccAzureRMServiceBusNamespace_networkRuleSet
=== PAUSE TestAccAzureRMServiceBusNamespace_networkRuleSet
=== CONT TestAccAzureRMServiceBusNamespace_networkRuleSet
testcase.go:113: Step 1/6 error: Error running apply: exit status 1
Error: Service Bus SKU "Premium" only supports `premium_messaging_partitions` of 1, 2, 4
with azurerm_servicebus_namespace.test,
on terraform_plugin_test.tf line 43, in resource "azurerm_servicebus_namespace" "test":
43: resource "azurerm_servicebus_namespace" "test" {
--- FAIL: TestAccAzureRMServiceBusNamespace_networkRuleSet (118.34s)
FAIL
------- Stdout: -------
=== RUN TestAccServiceBusQueueAuthorizationRule_withAliasConnectionString
=== PAUSE TestAccServiceBusQueueAuthorizationRule_withAliasConnectionString
=== CONT TestAccServiceBusQueueAuthorizationRule_withAliasConnectionString
testcase.go:113: Step 1/3 error: Error running apply: exit status 1
Error: Service Bus SKU "Premium" only supports `premium_messaging_partitions` of 1, 2, 4
with azurerm_servicebus_namespace.primary_namespace_test,
on terraform_plugin_test.tf line 31, in resource "azurerm_servicebus_namespace" "primary_namespace_test":
31: resource "azurerm_servicebus_namespace" "primary_namespace_test" {
Error: Service Bus SKU "Premium" only supports `premium_messaging_partitions` of 1, 2, 4
with azurerm_servicebus_namespace.secondary_namespace_test,
on terraform_plugin_test.tf line 44, in resource "azurerm_servicebus_namespace" "secondary_namespace_test":
44: resource "azurerm_servicebus_namespace" "secondary_namespace_test" {
--- FAIL: TestAccServiceBusQueueAuthorizationRule_withAliasConnectionString (98.40s)
FAIL
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM ⛈️
…artitions` property (hashicorp#24676) * add premium messaging partition property * â�fix test case * change property value in test cases * change docs and test cases based on reviewer * update docs and test cases * terrafmt * update test case * update test case for premium namespace * update * format test cases
<Actions> <action id="f410411e63aff4bb73a81c2aec1d373cf8a903e63b30dee2006b0030d8a94cc8"> <h3>Bump Terraform `azurerm` provider version</h3> <details id="1d9343c012f5434ac9fe8a98135bae3667b399259be16d9b14302ea3bd424a24"> <summary>Update Terraform lock file</summary> <p>changes detected:
	"hashicorp/azurerm" updated from "3.92.0" to "3.93.0" in file ".terraform.lock.hcl"</p> <details> <summary>3.93.0</summary> <pre>Changelog retrieved from:
	https://github.com/hashicorp/terraform-provider-azurerm/releases/tag/v3.93.0
* **New Data Source**: `azurerm_express_route_circuit_peering` ([#24971](hashicorp/terraform-provider-azurerm#24971 **New Data Source**: `azurerm_storage_table_entities` ([#24973](hashicorp/terraform-provider-azurerm#24973 **New Resource**: `azurerm_dev_center_catalog` ([#24833](hashicorp/terraform-provider-azurerm#24833 **New Resource**: `azurerm_system_center_virtual_machine_manager_server` ([#24278](https://github.com/hashicorp/terraform-provider-azurerm/issues/24278))

BUG FIXES:

* `azurerm_key_vault` - conditionally polling the Data Plane endpoint when `public_network_access_enabled` is set to false ([#23823](hashicorp/terraform-provider-azurerm#23823 `azurerm_storage_account` - allow the `identity.type` property to be `SystemAssigned, UserAssigned` when using a Customer Managed Key ([#24923](hashicorp/terraform-provider-azurerm#24923 `azurerm_automation_account` - prevent the `identity.identity_ids` User Assigned identity being set when not specified in config ([#24977](https://github.com/hashicorp/terraform-provider-azurerm/issues/24977))

ENHANCEMENTS:

* dependencies: updating to `v0.20240221.1170458` of `hashicorp/go-azure-sdk` ([#24967](hashicorp/terraform-provider-azurerm#24967 dependencies: refactor `azurerm_spring_cloud_configuration_service` to use `go-azure-sdk` ([#24918](hashicorp/terraform-provider-azurerm#24918 provider: support or the feature flag `virtual_machine_scale_set.reimage_on_manual_upgrade` ([#22975](hashicorp/terraform-provider-azurerm#22975 `sentinel`: updating to use the transport layer from `hashicorp/go-azure-sdk` rather than `Azure/go-autorest` ([#24962](hashicorp/terraform-provider-azurerm#24962 `sqlvirtualmachines`: updating to use the transport layer from `hashicorp/go-azure-sdk` rather than `Azure/go-autorest` ([#24912](hashicorp/terraform-provider-azurerm#24912 `nginx` : updating to use `2024-01-01-preview` ([#24868](hashicorp/terraform-provider-azurerm#24868 `azurerm_cosmosdb_account` - support for the `backup.tier` property ([#24595](hashicorp/terraform-provider-azurerm#24595 `azurerm_linux_virtual_machine` - the `virtual_machine_scale_set_id` proeprty can now be changed without creating a new resource ([#24768](hashicorp/terraform-provider-azurerm#24768 `azurerm_machine_learning_workspace` - support for the `managed_network.isolation_mode` property ([#24951](hashicorp/terraform-provider-azurerm#24951 `azurerm_private_dns_resolver_inbound_endpoint` - support the `static` value for the `private_ip_allocation_method` property ([#24952](hashicorp/terraform-provider-azurerm#24952 `azurerm_postgresql_flexible_server` - expose the `storage_tier` field ([#24892](hashicorp/terraform-provider-azurerm#24892 `azurerm_redis_cache` - support for the `preferred_data_persistence_auth_method` property ([#24370](hashicorp/terraform-provider-azurerm#24370 `azurerm_servicebus_namespace` - support for the `premium_messaging_partitions` property ([#24676](hashicorp/terraform-provider-azurerm#24676 `azurerm_windows_virtual_machine` - the `virtual_machine_scale_set_id` proeprty can now be changed without creating a new resource ([#24768](https://github.com/hashicorp/terraform-provider-azurerm/issues/24768))

BUG FIXES:

* `azurerm_cognitive_deployment` - the `version_upgrade_option` property can not be updated without creating a new resource ([#24922](hashicorp/terraform-provider-azurerm#24922 `azurerm_data_protection_backup_vault` - support or the `soft_delete` and `retention_duration_in_days` properties ([#24775](hashicorp/terraform-provider-azurerm#24775 `azurerm_data_factory_pipeline` - correctly handle incorrect header values ([#24921](hashicorp/terraform-provider-azurerm#24921 `azurerm_kusto_cluster` - `optimized_auto_scale` is now updated after `sku` has been updated ([#24906](hashicorp/terraform-provider-azurerm#24906 `azurerm_key_vault_certificate` - will now only update the `lifetime_action` of the certificate block unless otherwise required ([#24755](hashicorp/terraform-provider-azurerm#24755 `azurerm_linux_virtual_machine_scale_set` - correctly include `public_ip_prefix_id` during updates ([#24939](hashicorp/terraform-provider-azurerm#24939 `azurerm_postgresql_flexible_server` - the `customer_managed_key.key_vault_key_id` property is now required ([#24981](hashicorp/terraform-provider-azurerm#24981 `azurerm_nginx_deployment` - changing the `sku` property now creates a new resource ([#24905](hashicorp/terraform-provider-azurerm#24905 `azurerm_orchestrated_virtual_machine_scale_set` - the `disk_size_gb` and `lun` parameters of `data_disks` are optional now ([#24944](hashicorp/terraform-provider-azurerm#24944 `azurerm_storage_account` - change order of API calls to be GET-then-PUT ratehr then PATCHES ([#23935](hashicorp/terraform-provider-azurerm#23935 `azurerm_storage_account` - improve the validation around the `immutability_policy` being used with `blob_properties` ([#24938](hashicorp/terraform-provider-azurerm#24938 `azurerm_security_center_setting` - prevent a bug when name is `SENTINEL` ([#24497](hashicorp/terraform-provider-azurerm#24497 `azurerm_windows_virtual_machine_scale_set` - correctly include `public_ip_prefix_id` during updates ([#24939](https://github.com/hashicorp/terraform-provider-azurerm/issues/24939))




</pre> </details> </details> <a href="https://infra.ci.jenkins.io/job/updatecli/job/azure/job/main/19/">Jenkins pipeline link</a> </action> </Actions> --- <table> <tr> <td width="77"> <img src="https://www.updatecli.io/images/updatecli.png" alt="Updatecli logo" width="50" height="50"> </td> <td> <p> Created automatically by <a href="https://www.updatecli.io/">Updatecli</a> </p> <details><summary>Options:</summary> <br /> <p>Most of Updatecli configuration is done via <a href="https://www.updatecli.io/docs/prologue/quick-start/">its manifest(s)</a>.</p> <ul> <li>If you close this pull request, Updatecli will automatically reopen it, the next time it runs.</li> <li>If you close this pull request and delete the base branch, Updatecli will automatically recreate it, erasing all previous commits made.</li> </ul> <p> Feel free to report any issues at <a href="https://github.com/updatecli/updatecli/issues">github.com/updatecli/updatecli</a>.<br /> If you find this tool useful, do not hesitate to star <a href="https://github.com/updatecli/updatecli/stargazers">our GitHub repository</a> as a sign of appreciation, and/or to tell us directly on our <a href="https://matrix.to/#/#Updatecli_community:gitter.im">chat</a>! </p> </details> </td> </tr> </table> Co-authored-by: Jenkins Infra Bot (updatecli) <60776566+jenkins-infra-bot@users.noreply.github.com>
…artitions` property (hashicorp#24676) * add premium messaging partition property * â�fix test case * change property value in test cases * change docs and test cases based on reviewer * update docs and test cases * terrafmt * update test case * update test case for premium namespace * update * format test cases
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
part of the MS vanguard, the premium namespace is now support messaging partitions, add the feature to terraform as well.
acc tests:
fix #24597
For the accepted value and the validation part, in theory, we shouldn't add 0 into the acceptable list because the feature only applies to servicebus premium namespace, not to the standard/ basic namespace, however, api will add 0 value for the standard/basic namespaces, as a result, we'll see diff like 0->null during the second apply.
For the default value, 0 is for the standard/basic namespace while 1 is for the premium namespace. we need to add the validation to check if users are trying to set 0 for the premium namespace, if they do, we throw error before the api does. Things are the same for the standard/ basic namespace, but we check the >0 value.
Product information: https://learn.microsoft.com/en-us/azure/service-bus-messaging/enable-partitions-premium