-
Notifications
You must be signed in to change notification settings - Fork 674
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support outbound-traffic-protection #5268
Support outbound-traffic-protection #5268
Conversation
Need to update bluemix-go after PR merged. |
ibm/service/kubernetes/resource_ibm_container_vpc_cluster_test.go
Outdated
Show resolved
Hide resolved
@@ -598,7 +601,7 @@ func resourceIBMContainerVpcClusterCreate(d *schema.ResourceData, meta interface | |||
workerpool.Labels = labels | |||
} | |||
|
|||
disableOutboundTrafficProtection := d.Get("disable_outbound_traffic_protection").(bool) | |||
disableOutboundTrafficProtection := d.Get(DisableOutboundTrafficProtectionFlag).(bool) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
can we add this property to datasource also ?
https://github.com/IBM-Cloud/terraform-provider-ibm/blob/master/ibm/service/kubernetes/data_source_ibm_container_vpc_cluster.go
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Unfortunately not, because this parameter is not a fetchable one. It can be given at cluster create time, or can be updated after with a seperate API call. If I'm right all the parameters in the resource_ibm_container_vpc_cluster.go
are fetchable ones.
Can you fix the conflicts in above files |
Did we test the current change with existing test cases for version less since we defined the argument as optional and default false ? |
I added a test which tests the existing flag with a non secure-by-default cluster (AKA before 1.30, so 1.29) |
A new API endpoint was introduced
/network/v2/outbound-traffic-protection
, so from now theoutbound-traffic-protection
can be modified after cluster creation as well. This PR is to support this scenario. Only works with Secure-by-default clusters (IKS 1.30+ & ROKS 4.15+)Community Note
Relates OR Closes #0000
Output from acceptance testing: