Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

#26797: disable_access_keys_authentication property for Redis Cache #26964

Closed

Conversation

gerrytan
Copy link
Contributor

@gerrytan gerrytan commented Aug 8, 2024

Community Note

  • Please vote on this PR by adding a 👍 reaction to the original PR to help the community and maintainers prioritize for review
  • Please do not leave comments along the lines of "+1", "me too" or "any updates", they generate extra noise for PR followers and do not help prioritize for review

Description

PR Checklist

  • I have followed the guidelines in our Contributing Documentation.
  • I have checked to ensure there aren't other open Pull Requests for the same update/change.
  • I have checked if my changes close any open issues. If so please include appropriate closing keywords below.
  • I have updated/added Documentation as required written in a helpful and kind way to assist users that may be unfamiliar with the resource / data source.
  • I have used a meaningful PR title to help maintainers and other users understand this change and help prevent duplicate work.
    For example: “resource_name_here - description of change e.g. adding property new_property_name_here

Changes to existing Resource / Data Source

  • I have added an explanation of what my changes do and why I'd like you to include them (This may be covered by linking to an issue above, but may benefit from additional explanation).
  • I have written new tests for my resource or datasource changes & updated any relevent documentation.
  • I have successfully run tests with my changes locally. If not, please provide details on testing challenges that prevented you running the tests.
  • (For changes that include a state migration only). I have manually tested the migration path between relevant versions of the provider.

Testing

  • My submission includes Test coverage as described in the Contribution Guide and the tests pass. (if this is not possible for any reason, please include details of why you did or could not add test coverage)

Change Log

Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.

  • azurerm_resource - support for the thing1 property [GH-00000]

This is a (please select all that apply):

  • Bug Fix
  • New Feature (ie adding a service, resource, or data source)
  • Enhancement
  • Breaking Change

Related Issue(s)

Fixes #0000

Note

If this PR changes meaningfully during the course of review please update the title and description as required.

@@ -553,6 +558,11 @@ func resourceRedisCacheCreate(d *pluginsdk.ResourceData, meta interface{}) error
parameters.Properties.SubnetId = utils.String(v.(string))
}

if v, ok := d.GetOk("access_keys_authentication_disabled"); ok {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The second return value of d.GetOK indicates the value of the given key has been set to a non-zero value (e.g. false for boolean). So this only tells if this value is true (ok), or false (!ok). In case it is false, shall we also set it and send it to the API, instead of leaving it null?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The GetOk doc says

// GetOk returns the data for the given key and whether or not the key
// has been set to a non-zero value at some point.
//
// The first result will not necessarilly be nil if the value doesn't exist.
// The second result should be checked to determine this information.

I believe if we get false value from configuration we'll get v = false and ok = true and the value will be sent to the API. I'll give this a test.

@@ -671,6 +681,13 @@ func resourceRedisCacheUpdate(d *pluginsdk.ResourceData, meta interface{}) error
parameters.Properties.RedisConfiguration = redisConfiguration
}

if v, ok := d.GetOk("access_keys_authentication_disabled"); ok {
Copy link
Collaborator

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can reference how public_network_access_enabled does for update. You don't need this d.GetOK(), instead, use d.Get() can get the value:

  • true if explicitly specified to be true
  • false if explicitly specified to be false, or absent

This is a SDKv2 behavior.

@github-actions github-actions bot added size/M and removed size/XS labels Aug 9, 2024
- Removed redundant checks
- Checks transition of both AD and access keys auth
@gerrytan
Copy link
Contributor Author

Closing this PR, replacing with a new one that complies with contribution guide: #27039

Copy link

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active contributions.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Sep 14, 2024
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants