-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
azurerm_nginx_deployment - support NGINX App Protect WAF #27454
base: main
Are you sure you want to change the base?
Conversation
NGINXaaS now supports NGINX App Protect WAF. This commit includes changes to enable/disable WAF while creation or updating an NGINXaaS deployment.
Looks like some vendor checks are failing? |
c4c0a47
to
4f6d8ec
Compare
I like the newly flattened structure (less nested) to invoke this new feature as well 👍 |
Hi @katbyte @stephybun, when you get time would you be able to take a look at this PR. Thanks in advance! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hi, we have a test failure needing fixing:
------- Stdout: -------
=== RUN TestAccNginxDeploymentDataSource_nginxappprotect
=== PAUSE TestAccNginxDeploymentDataSource_nginxappprotect
=== CONT TestAccNginxDeploymentDataSource_nginxappprotect
testcase.go:173: Step 1/1 error: Error running apply: exit status 1
Error: scaling is required for `sku` 'standardv2_Monthly', please provide `capacity` or `auto_scale_profiles`
with azurerm_nginx_deployment.test,
on terraform_plugin_test.tf line 75, in resource "azurerm_nginx_deployment" "test":
75: resource "azurerm_nginx_deployment" "test" {
scaling is required for `sku` 'standardv2_Monthly', please provide `capacity`
or `auto_scale_profiles`
--- FAIL: TestAccNginxDeploymentDataSource_nginxappprotect (92.49s)
FAIL
Hi @katbyte!! I see @arpith-f5 pushed a fix for the test. Can you please re-run the tests and see if the issue persists? |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the pr @arpith-f5 - i've given it a quick review and made some schema suggestions. let me know what you think
@@ -194,10 +196,74 @@ func (m DeploymentDataSource) Attributes() map[string]*pluginsdk.Schema { | |||
Computed: true, | |||
}, | |||
|
|||
"web_application_firewall_settings": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
settings is redundant, so we can remove it to also be more consistent with the rest of the provider
"web_application_firewall_settings": { | |
"web_application_firewall": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I think this should be fine but the swagger calls it WebApplicationFirewallSettings
and so that translates here fine in the client.
We can also check what we are doing for other client tools and keep the provider consistent with that as well to provide a uniform experience.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
@katbyte I have been following the approach of keeping the provider consistent with the swagger spec which is the reason for using web_application_firewall_settings
, activation_state
and having the activation_state
be an enum instead of a bool as per the swagger spec. I think deviating from the swagger spec will cause more confusion for users so would prefer to use the same naming. Do let me know if provider has a different set of naming convention that it needs to follow.
@@ -262,6 +285,24 @@ func (m DeploymentResource) Arguments() map[string]*pluginsdk.Schema { | |||
}, false), | |||
}, | |||
|
|||
"web_application_firewall_settings": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
settings is redundant, so we can remove it to also be more consistent with the rest of the provider
"web_application_firewall_settings": { | |
"web_application_firewall": { |
Optional: true, | ||
Elem: &pluginsdk.Resource{ | ||
Schema: map[string]*pluginsdk.Schema{ | ||
"activation_state": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if the block becomes web_application_firewall
this would be better as activated
or enabled
? which would make it more consistent with the rest of the provided
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
addtionally is this the only setting that will be here or will there be further items
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I am fine with either naming convention but would prefer what's already there as the WAF experience sounds fine to me. Will sync up with @arpith-f5 once to see if we want to change this.
@@ -351,6 +392,19 @@ func (m DeploymentResource) Attributes() map[string]*pluginsdk.Schema { | |||
Type: pluginsdk.TypeString, | |||
Computed: true, | |||
}, | |||
|
|||
"web_application_firewall_status": { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
if the above block becomes web_application_firewall this could go inside as web_application_firewall.status.x
?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
it could even be web_application_firewall.package_status.x and then web_application_firewall .component_versions
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I initially wanted to follow this approach of nesting the status inside the web_application_firewall block but the problem I encountered is that the status needs to be an attribute but settings is an argument. I didn't find a good way to have them both in the same block. Do you have any suggestions on how to do that?
Type: pluginsdk.TypeString, | ||
Required: true, | ||
ValidateFunc: validation.StringInSlice( | ||
[]string{ | ||
"Enabled", | ||
"Disabled", | ||
}, false), |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is a bool? so we should
Type: pluginsdk.TypeString, | |
Required: true, | |
ValidateFunc: validation.StringInSlice( | |
[]string{ | |
"Enabled", | |
"Disabled", | |
}, false), | |
Type: pluginsdk.TypeBool, | |
Required: true, |
and then in the provider code translate true/false to Enabled Disabled, unless there is going to be a 3rd state here?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The state is an enum.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks for the pr @arpith-f5 - i've given it a quick review and made some schema suggestions. let me know what you think
Community Note
Description
NGINXaaS now supports NGINX App Protect WAF. In order to use WAF, customers need to explicitly enable it while creating/update their NGINXaaS deployment. This commit includes changes to support a new block
nginx_app_protect
inazurerm_nginx_deployment
resource to enable/disable WAF while creation or updating an NGINXaaS deployment.PR Checklist
For example: “
resource_name_here
- description of change e.g. adding propertynew_property_name_here
”Changes to existing Resource / Data Source
Testing
Manually tested create and update of a NGINXaaS deployment with WAF enabled/disabled
Change Log
Below please provide what should go into the changelog (if anything) conforming to the Changelog Format documented here.
azurerm_nginx_deployment
- support NGINX App Protect WAFThis is a (please select all that apply):
Related Issue(s)
Note
If this PR changes meaningfully during the course of review please update the title and description as required.