-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
terraform Support for Managing Entitlements. #10334
Conversation
varsharmavs
commented
Apr 1, 2024
•
edited by NickElliot
Loading
edited by NickElliot
Hello! I am a robot. Tests will require approval from a repository maintainer to run. @NickElliot, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
…ty/components/inputs/services_beta.kt'
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Creation and Deletion of PAM Entitlement works. Updation is still in progress.
/gcbrun |
@varsharmavs Sorry, there's an issue in our CI. Would you mind rebasing your PR to catch the latest fix? Thank you! |
…pproval workflow set as ForceNew
It's 'pre_update' file which is added and not 'pre_delete'. sorry for the typo (commit: 97ef2a3) |
/gcbrun |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_privileged_access_manager_entitlement" "primary" {
additional_notification_targets {
admin_email_recipients = # value needed
requester_email_recipients = # value needed
}
approval_workflow {
manual_approvals {
require_approver_justification = # value needed
steps {
approvals_needed = # value needed
approver_email_recipients = # value needed
approvers {
principals = # value needed
}
}
}
}
}
|
1 similar comment
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_privileged_access_manager_entitlement" "primary" {
additional_notification_targets {
admin_email_recipients = # value needed
requester_email_recipients = # value needed
}
approval_workflow {
manual_approvals {
require_approver_justification = # value needed
steps {
approvals_needed = # value needed
approver_email_recipients = # value needed
approvers {
principals = # value needed
}
}
}
}
}
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementBasicExample |
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementBasicExample |
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementProjectExample_update |
|
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementProjectExample_update |
1 similar comment
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 1 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementProjectExample_update |
|
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_privileged_access_manager_entitlement" "primary" {
additional_notification_targets {
admin_email_recipients = # value needed
requester_email_recipients = # value needed
}
approval_workflow {
manual_approvals {
require_approver_justification = # value needed
steps {
approvals_needed = # value needed
approver_email_recipients = # value needed
approvers {
principals = # value needed
}
}
}
}
eligible_users {
principals = # value needed
}
entitlement_id = # value needed
location = # value needed
max_request_duration = # value needed
parent = # value needed
privileged_access {
gcp_iam_access {
resource = # value needed
resource_type = # value needed
role_bindings {
condition_expression = # value needed
role = # value needed
}
}
}
}
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are.
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementBasicExample|TestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementProjectExample_update |
|
Tests analyticsTotal tests: Click here to see the affected service packagesall service packages are affected Action takenFound 2 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementBasicExample|TestAccPrivilegedAccessManagerEntitlement_privilegedAccessManagerEntitlementProjectExample_update |
|
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>
Co-authored-by: Nick Elliot <[email protected]>