-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Patching firewall rules #216
base: main
Are you sure you want to change the base?
Conversation
With resource data schema, check if rules have any changes that require API backend request. Otherwise just update state file.
Do we need to add the new resource
|
Basically just that I tried out difference between single/multi rules when doing the patching.
With this in place then have something to discuss around. Did also do some test runs when using |
Had another thought, do we need Going further, could we instead of adding these two new resources, extend the existing |
Yes possible to use But your idea about add it to |
Get changes between old vs. new configuration with d.GetChanges("rules"). Then determine which rules should be removed or updated based on the difference between the two configurations.
3d69307
to
ec7654e
Compare
Tried out when settings multiple patched firewall rules resources. If their request are executed at the same time, only one will be applied. Randomize sleep, to slightly shift them in order to trigger retry request on latest action.
This one seems to have gone stale. Whats the status on this ? |
It is held up but sorting out issues in the backend, that we haven't been able to prioritise. |
WHY are these changes introduced?
Original firewall resource replaced all firewall rules during create/update. Meaning all rules used in the resource always overwrite the current rule set. Enable utilization of the PACTH endpoint in API backend, to change the behaviour for the resource with new argument
patch
. This will instead append or update the rules present in the resource and leave all other firewall rules intact.WHAT is this pull request doing?
patch
argument tocloudamqp_security_firewall
. When set to true, use PATCH API endpoint and only affect rules in the resource.Require:
HOW can this pull request be tested?
Test scenarios used with managed VPC and instance.
Multiple patched firewall rules requests being executed. Will trigger after post.bootstrap finished, in the end firewall rule set contains both.
Enabled PrivateLink and multiple patched firewall rules resources requests being executed. Will trigger after post.bootstrap finished. PrivateLink gets enabled, automatic PrivateLink rule set activated and both firewall resource rule sets gets activated.