Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix GKE not being able to disable Cilium Policies #19736

Conversation

modular-magician
Copy link
Collaborator

Fixes: #19360

The issue was caused due to the 'omitempty' flag on the 'DesiredEnableCiliumClusterwideNetworkPolicy' attribute on the struct that builds the request on the library end. So I am forcing it to be sent whenever there is a change.

Other fields suffer of the same issue, but I believe this is something that this issues should be treated on a case basis.

Release Note Template for Downstream PRs (will be copied)

container: fixed issue which caused to not being able to disable `enable_cilium_clusterwide_network_policy` field on `google_container_cluster`.

Derived from GoogleCloudPlatform/magic-modules#11810

[upstream:dfbaea010475975440b815dfa12a3ec5b42e0114]

Signed-off-by: Modular Magician <magic-modules@google.com>
@modular-magician modular-magician merged commit 4ba6367 into hashicorp:main Oct 3, 2024
2 checks passed
Copy link

github-actions bot commented Nov 8, 2024

I'm going to lock this pull request because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems related to this change, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.

@github-actions github-actions bot locked as resolved and limited conversation to collaborators Nov 8, 2024
@modular-magician modular-magician deleted the downstream-pr-dfbaea010475975440b815dfa12a3ec5b42e0114 branch November 17, 2024 01:45
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Changing enable_cilium_clusterwide_network_policy from true to false does not work via terraform
1 participant