-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Dry run difficulties with service perimeters and dynamic projects #10642
Comments
Hi @DanHyland or anyone else interested in this issue. As far as I can tell adding the spec to the lifecycle ignore block does prevent conflicts between resources managed outside the perimeter for dry-run. Currently |
@edwardmedia Can we close this out. Should be addressed by GoogleCloudPlatform/magic-modules#10145 |
@rileykarson @melinath Can we close this out? |
closing as addressed by GoogleCloudPlatform/magic-modules#10145 - thanks! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
modular-magician
user, it is either in the process of being autogenerated, or is planned to be autogenerated soon. If an issue is assigned to a user, that user is claiming responsibility for the issue. If an issue is assigned tohashibot
, a community member has claimed the issue already.Terraform Version
Terraform version 0.12.31
Google provider version 3.90.1
Affected Resource(s)
google_access_context_manager_service_perimeter
google_access_context_manager_service_perimeter_resource (indirectly)
Terraform Configuration Files
Expected Behavior
Spec block (Dry run) should act similar to the status block in that we should be able to ignore resources (projects) as they can be managed outside of access_context_manager_service_perimeter resources with access_context_manager_service_perimeter_resource as noted in official documentation:
Given the above, we should be able to ignore_changes = [status[0].resources, spec[0].resources]
Actual Behavior
If a project is created outside google_access_context_manager_service_perimeter.perimeter and not added in this spec block, it will bomb out the apply and you will be unable to apply a dry run configuration. For example, we have hundreds of projects managed dynamically with google_access_context_manager_service_perimeter_resource per project.
Steps to Reproduce
References
https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/access_context_manager_service_perimeter_resource
https://registry.terraform.io/providers/hashicorp/google/latest/docs/resources/access_context_manager_service_perimeter
b/301066068
The text was updated successfully, but these errors were encountered: