Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Can not gennerate usable AuthorizationPolicy for istio 1.9.0 #29

Closed
lth82 opened this issue Mar 9, 2021 · 1 comment · Fixed by #143
Closed

Can not gennerate usable AuthorizationPolicy for istio 1.9.0 #29

lth82 opened this issue Mar 9, 2021 · 1 comment · Fixed by #143
Assignees
Labels
kind/bug Some behavior is incorrect or out of spec resolution/fixed This issue was fixed

Comments

@lth82
Copy link

lth82 commented Mar 9, 2021

Generating typed crds for istio 1.9.0 in .NET results in a unusable AuthorizationPolicy class

Expected behavior

crd2pulumi generates a correct AuthorizationPolicy and AuthorizationPolicySpecArgs class

Current behavior

AuthorizationPolicy.cs is created where the Spec property type is "object" and not a AuthorizationPolicySpecArgs. No class for Spec is created

Steps to reproduce

  1. Download the istio 1.9.0 crds and run crd2pulumi on them
@lth82 lth82 added the kind/bug Some behavior is incorrect or out of spec label Mar 9, 2021
@leezen leezen added kind/bug Some behavior is incorrect or out of spec and removed kind/bug Some behavior is incorrect or out of spec labels Mar 9, 2021
@cleverguy25
Copy link

Added to epic https://github.com/pulumi/home/issues/3431

@rquitales rquitales linked a pull request Sep 13, 2024 that will close this issue
@rquitales rquitales self-assigned this Sep 13, 2024
@rquitales rquitales added the resolution/fixed This issue was fixed label Sep 13, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
kind/bug Some behavior is incorrect or out of spec resolution/fixed This issue was fixed
Projects
None yet
Development

Successfully merging a pull request may close this issue.

4 participants