-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_cdn_frontdoor_firewall_policy - custom rules to accept JSChallenge #28717
azurerm_cdn_frontdoor_firewall_policy - custom rules to accept JSChallenge #28717
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi @EValge-IT, Thanks for opening this PR, it mostly LGTM and I have left a minor comment in the code that needs to be addressed. There needs to be test cases added for this change to the Custom rules. I understand due to corporate policies you are not allowed to run tests in your environment, but if you can create some test cases for JSChallenge being set on Custom rules I can run those for you on our test server. Thanks again for the PR, looking forward to those updates! 🚀
Additional:
- I have gotten a response from the service team and
JSChallenge
IS supported forcustom
rules but ONLY forPremium_AzureFrontDoor
SKUs .
Note: You can fix your lint error by running the below command in a command prompt that is opened to the root provider directory: terrafmt fmt ./internal/services/containerapps/container_app_resource_test.go -f -v -c Additional: I worked with HashiCorp engineers and got that test formatting issue fixed in |
@EValge-IT, I was actually assigned another work item late Friday night which also addresses a related issue to this PR. I will go ahead and merge this PR and correct the documentation in the PR I currently have in |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@EValge-IT, thanks for opening this PR, I have given it a look and it LGTM! 🚀
* CHANGELOG.md for v4.19.0 * Update CHANGELOG.md #28523 * Update CHANGELOG.md #28691 * Updated to include #28717 * Update for #26680 * Update CHANGELOG.md #28633 * Update CHANGELOG.md for #28703 * Update CHANGELOG.md for #28391 * Update CHANGELOG.md #28725 * Update #28733 * Update CHANGELOG.md #28659 * Update for #28741 * Update CHANGELOG.md #28712 * Update CHANGELOG.md #28441 * Update CHANGELOG.md #28441 * Update CHANGELOG.md #28441 * Update CHANGELOG.md for #28602 * Update for #27424 * Update CHANGELOG.md for #28524 * Update CHANGELOG.md #28726 * Update for #28767 * Update for #28195 * prep for release v4.19.0 --------- Co-authored-by: sreallymatt <[email protected]> Co-authored-by: Wodans Son <[email protected]> Co-authored-by: stephybun <[email protected]> Co-authored-by: Wyatt Fry <[email protected]> Co-authored-by: Matthew Frahry <[email protected]> Co-authored-by: jackofallops <[email protected]>
* azurerm_cdn_frontdoor_firewall_policy - custom rules to accept JSChallenge * Docs
* CHANGELOG.md for v4.19.0 * Update CHANGELOG.md hashicorp#28523 * Update CHANGELOG.md hashicorp#28691 * Updated to include hashicorp#28717 * Update for hashicorp#26680 * Update CHANGELOG.md hashicorp#28633 * Update CHANGELOG.md for hashicorp#28703 * Update CHANGELOG.md for hashicorp#28391 * Update CHANGELOG.md hashicorp#28725 * Update hashicorp#28733 * Update CHANGELOG.md hashicorp#28659 * Update for hashicorp#28741 * Update CHANGELOG.md hashicorp#28712 * Update CHANGELOG.md hashicorp#28441 * Update CHANGELOG.md hashicorp#28441 * Update CHANGELOG.md hashicorp#28441 * Update CHANGELOG.md for hashicorp#28602 * Update for hashicorp#27424 * Update CHANGELOG.md for hashicorp#28524 * Update CHANGELOG.md hashicorp#28726 * Update for hashicorp#28767 * Update for hashicorp#28195 * prep for release v4.19.0 --------- Co-authored-by: sreallymatt <[email protected]> Co-authored-by: Wodans Son <[email protected]> Co-authored-by: stephybun <[email protected]> Co-authored-by: Wyatt Fry <[email protected]> Co-authored-by: Matthew Frahry <[email protected]> Co-authored-by: jackofallops <[email protected]>
Community Note
Description
azurerm_cdn_frontdoor_firewall_policy
Allow the creation of custom_rules with JSChallenge as the action.PR Checklist
For example: “
resource_name_here
- description of change e.g. adding propertynew_property_name_here
”Changes to existing Resource / Data Source
Testing
I am unable to run tests that provision new resources due to organisation restrictions. However, I built the provider locally and ran terraform against a current workspace. Behaviour was as expected.
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azurerm_cdn_frontdoor_firewall_policy
- added support for theJSChallenge
action for custom_ruleThis is a (please select all that apply):
Related Issue(s)
Fixes #28713
Note
If this PR changes meaningfully during the course of review please update the title and description as required.