Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

set auditconfigs in state for iam policy resources #2313

Merged
merged 2 commits into from
Sep 13, 2019

Conversation

danawillow
Copy link
Contributor

Fixes hashicorp/terraform-provider-google#4438. Tested in the folder resource, since we don't test IAM policy for organizations. Also converted the test over to import-style while I was here.

Release Note for Downstream PRs (will be copied)

iam: set auditconfigs in state for google_*_iam_policy resources

@modular-magician
Copy link
Collaborator

Hi! I'm the modular magician, I work on Magic Modules.
This PR seems not to have generated downstream PRs before, as of 68afc0a.

Pull request statuses

No diff detected in terraform-google-conversion.
No diff detected in Ansible.
No diff detected in Inspec.

New Pull Requests

I built this PR into one or more new PRs on other repositories, and when those are closed, this PR will also be merged and closed.
depends: hashicorp/terraform-provider-google-beta#1134
depends: hashicorp/terraform-provider-google#4447

danawillow and others added 2 commits September 13, 2019 17:25
Tracked submodules are build/terraform-beta build/terraform-mapper build/terraform build/ansible build/inspec.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Running terraform plan/apply on google_iam_policy.org_iam_policy.audit_config doesn't read current state first
4 participants