-
Notifications
You must be signed in to change notification settings - Fork 88
Support NetworkFirewallPolicyRule resource #645
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This provider repo does not have enough maintainers to address every issue. Since there has been no activity in the last 90 days it is now marked as |
/fresh We are also interested in this resource, so we are going to add it to the provider |
@turkenf I'm following the "Adding a new resource" documentation apiVersion: compute.gcp.upbound.io/v1beta1
kind: NetworkFirewallPolicyRule
metadata:
annotations:
meta.upbound.io/example-id: compute/v1beta1/networkfirewallpolicyrule
labels:
testing.upbound.io/example-name: primary
name: primary
spec:
forProvider:
action: allow
description: This is a simple rule description
direction: INGRESS
disabled: false
enableLogging: true
firewallPolicySelector:
matchLabels:
testing.upbound.io/example-name: basic_network_firewall_policy
match:
- layer4Configs:
- ipProtocol: all
srcAddressGroups:
- ${google_network_security_address_group.basic_global_networksecurity_address_group.id}
srcFqdns:
- google.com
srcIpRanges:
- 10.100.0.1/32
srcRegionCodes:
- US
srcSecureTags:
- name: tagValues/${google_tags_tag_value.basic_value.name}
srcThreatIntelligences:
- iplist-known-malicious-ips
ruleName: test-rule
targetServiceAccounts:
- my@service-account.com As this dependency comes from an optional field (forProvider.match[].srcAddressGroups) what should I do with it? Thank you in advance |
Hi @brais-real-edo, Thank you for your effort and interest. In such cases, you can continue with two ways:
|
What problem are you facing?
While attempting to use the the NetworkFirewallPolicy and NetworkFirewallPolicyAssociation resources, I found that the provider doesn't have support for
NetworkFirewallPolicyRule
s.the associate terraform resource is
google_compute_network_firewall_policy_rule
.What could help solve your problem?
Add support for
NetworkFirewallPolicyRule
resources in the providerThe text was updated successfully, but these errors were encountered: