Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Access Context Manager - make ingress and egress rules immutable #17596

Conversation

modular-magician
Copy link
Collaborator

Make Service Perimeter Ingress and Egress policy resources immutable so that updates will be applied by replacing the resources.

Fixes:
14895 - b/287060819

accesscontextmanager: fixed an issue with `access_context_manager_service_perimeter_ingress_policy` and `access_context_manager_service_perimeter_egress_policy` where updates could not be applied after initial creation. Any updates applied to these resources will now involve their recreation. To ensure that new policies are added before old ones are removed, add a `lifecycle` block with `create_before_destroy = true` to your resource configuration alongside other updates.

Derived from GoogleCloudPlatform/magic-modules#10147

…hicorp#10147)

* Access Context Manager - make ingress and egress rules immutable

* Move immutable state to top level resource

---------

Co-authored-by: Charles Leon <charlesleon@google.com>

[upstream:7f8a73595635f1ddd917fd6b33ce9a6d1bcf2c97]

Signed-off-by: Modular Magician <magic-modules@google.com>
@modular-magician modular-magician merged commit 75c5c55 into hashicorp:main Mar 14, 2024
2 checks passed
Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Apr 14, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

1 participant