-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_firewall_policy_rule_collection_group - support description,destination_addresses,destination_urls,terminate_tls,web_categories #13190
Conversation
…ll Premium features
azurerm_firewall_policy_rule_collection_group
to support Azure Firewall Premium features
@manicminer Unfortunately, the |
@katbyte Should one of the other issues also be drawn into this PR or shall they be addressed in another PR. Setting the protocol to optional should not be a problem, if this would be general... About the other 2 not yet considered issues, I think it'd be probably better to address them separately, right? |
@gro1m - as long as the PR is only a couple 100 lines and the changes are small i'm not to concerned with resolving more issues in a single PR |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
have some test failures @gro1m
------- Stdout: -------
=== RUN TestAccFirewallPolicyRuleCollectionGroup_complete
=== PAUSE TestAccFirewallPolicyRuleCollectionGroup_complete
=== CONT TestAccFirewallPolicyRuleCollectionGroup_complete
testcase.go:88: Step 1/2 error: Error running apply: exit status 1
Error: creating Firewall Policy Rule Collection Group "acctest-fwpolicy-RCG-210831222724613425" (Resource Group "acctestRG-fwpolicy-RCG-210831222724613425" / Policy: "acctest-fwpolicy-RCG-210831222724613425"): network.FirewallPolicyRuleCollectionGroupsClient#CreateOrUpdate: Failure sending request: StatusCode=0 -- Original Error: Code="Failed" Message="The async operation failed." AdditionalInfo=[{"Message":"The request is invalid.","ModelState":{"resource":["{\"Status\":\"Failed\",\"Error\":{\"Code\":\"FirewallPolicyApplicationRuleInvalidWebCategory\",\"Message\":\"Firewall Policy Application Rule app_rule_collection1_rule3 web category 'Liability' is invalid\",\"Target\":null}}"]}}]
with azurerm_firewall_policy_rule_collection_group.test,
on terraform_plugin_test.tf line 35, in resource "azurerm_firewall_policy_rule_collection_group" "test":
35: resource "azurerm_firewall_policy_rule_collection_group" "test" {
--- FAIL: TestAccFirewallPolicyRuleCollectionGroup_complete (145.57s)
FAIL
@katbyte Tests should be passing :)
|
Thanks @gro1m - update test still needs a fix it seems:
|
Tests are fixed:
|
@katbyte Everything should be fixed now, see tests above. I also removed lifecycle ignore_changes blocks that I needed to do the testing. |
Thanks for your review, @katbyte. And now everything should be o.k. - now also the Premium tests should be implemented and the TEST SUMMARY looks as follows:
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks @gro1m - LGTM 🚀
azurerm_firewall_policy_rule_collection_group
to support Azure Firewall Premium features
This functionality has been released in v2.76.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions. |
Fixes #11438
Fixes #12944
Fixes #12086