-
Notifications
You must be signed in to change notification settings - Fork 1.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add confidential nodes support to node pools #8758
Add confidential nodes support to node pools #8758
Conversation
Oops! It looks like you're using an unknown release-note type in your changelog entries:
Please only use the types listed in https://github.com/GoogleCloudPlatform/magic-modules/blob/master/.ci/RELEASE_NOTES_GUIDE.md. |
Hello! I am a robot. It looks like you are a: @ScottSuarez, a repository maintainer, has been assigned to review your changes. If you have not received review feedback within 2 business days, please leave a comment on this PR asking them to take a look. You can help make sure that review is quick by doing a self-review and by running impacted tests locally. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 2 files changed, 44 insertions(+), 21 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_config {
confidential_nodes {
enabled = # value needed
}
}
node_pool {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
}
Resource: resource "google_container_node_pool" "primary" {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
|
Hi, I notice this PR is in draft, let me know when it's ready for review. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 2 files changed, 44 insertions(+), 21 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_config {
confidential_nodes {
enabled = # value needed
}
}
node_pool {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
}
|
Thanks Scott, will do! It should be ready for review this week or early next. |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 2 files changed, 44 insertions(+), 21 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_config {
confidential_nodes {
enabled = # value needed
}
}
node_pool {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
}
|
fd0ab23
to
4c0956f
Compare
4c0956f
to
ad456fa
Compare
@ScottSuarez this is ready for review now |
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 141 insertions(+), 21 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_config {
confidential_nodes {
enabled = # value needed
}
}
node_pool {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
}
|
Hi there, I'm the Modular magician. I've detected the following information about your changes: Diff reportYour PR generated some diffs in downstreams - here they are. Terraform GA: Diff ( 3 files changed, 141 insertions(+), 21 deletions(-)) Missing test reportYour PR includes resource fields which are not covered by any test. Resource: resource "google_container_cluster" "primary" {
node_pool {
node_config {
confidential_nodes {
enabled = # value needed
}
}
}
}
|
Unclear why this continues to show as lacking an acceptance test, but if I've missed something do let me know. |
Tests analyticsTotal tests: Action takenFound 4 affected test(s) by replaying old test recordings. Starting RECORDING based on the most recent commit. Click here to see the affected testsTestAccBigtableAppProfile_bigtableAppProfileSingleclusterExample|TestAccBigtableAppProfile_bigtableAppProfileAnyclusterExample|TestAccContainerNodePool_withConfidentialNodes|TestAccDataprocClusterIamPolicy |
Rerun these tests in REPLAYING mode to catch issues
|
@ScottSuarez Quick nudge on this. Although if there's something I've missed which is causing the Modular Magician to think there isn't an acceptance test, do let me know. I have presumed it's the tool, not me, but was wondering if I've missed something subtle. |
Ah thanks for the nudge ! This looks good at a glance. Let me see |
Oh ! one follow up change @rnicoll. We'll need to add this to the documentation for this resource |
Tag me on the change and I can review |
This adds support for the "confidential_nodes" configuration at the node pool level, where previously they were only available at cluster level.
As part of this, code required for the confidential nodes configuration is migrated from the cluster file to the node_config.go.erb file.
fixes {https://github.com/hashicorp/terraform-provider-google/issues/13127}
If this PR is for Terraform, I acknowledge that I have:
make test
andmake lint
in the generated providers to ensure it passes unit and linter tests.Release Note Template for Downstream PRs (will be copied)