-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Auto-Approval when adding Synapse Managed Private Endpoints #13525
base: main
Are you sure you want to change the base?
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
hey @owenfarrell
Thanks for this PR.
Taking a look though here whilst this looks good there's a couple of errors with the logging which'll mean these are output as the pointer rather than the string value - but if we can fix those up (and add an explicit interval) then this should otherwise be good to go 👍
Thanks!
internal/services/synapse/synapse_managed_private_endpoint_resource_test.go
Outdated
Show resolved
Hide resolved
internal/services/synapse/synapse_managed_private_endpoint_resource.go
Outdated
Show resolved
Hide resolved
internal/services/synapse/synapse_managed_private_endpoint_resource.go
Outdated
Show resolved
Hide resolved
internal/services/synapse/synapse_managed_private_endpoint_resource.go
Outdated
Show resolved
Hide resolved
internal/services/synapse/synapse_firewall_rule_resource_test.go
Outdated
Show resolved
Hide resolved
91390cf
to
54ac386
Compare
Thanks @tombuildsstuff! I always get the parsed/new IDs crossed up in logging statements. I've folded in all of your requested changes and rerun acceptance tests - everything still comes out clean on my end. Let me know if CI tells a different story. |
Hi @owenfarrell , thanks for this PR! But actually when the long running operation finishes, the provision state will become Here'are the request traces I captured before. |
@ms-henglu - Thanks for the trace. And big thanks for following up with the service team to confirm what's going on behind the scenes. It's a bummer that @tombuildsstuff - If I'm reading this right,
And maybe that's a good as we can get for now. |
also @ms-henglu - could we get the service team to fix the provisioning status so it doesn't change to |
Hi @katbyte , Yes, I'm working on that. However, there're some technique issues to fix it and it might not be done in near future. 😢 |
@katbyte - per my comment above, I recognize that this isn't a perfect solution... but I think this kind of implementation would still be in the right direction.
The net result - compared to the latest release - would still be an improvement. If/when the service team makes changes so that Thoughts? |
54ac386
to
1871951
Compare
7c2fddb
to
e9660a2
Compare
@katbyte - I've just pushed up a handful of commits. And I realize I've introduced a ton of scope creep as this now cuts across multiple services. But I at least wanted to illustrate the longer-term goal of resolving #13107. In the process of introducing auto-approval for Synapse Managed Private Endpoints, I hit all the following bumps in the road (summarized here to avoid the need for anyone to reread previous posts):
I'm happy to split this out for reviewing purposes if that helps. But for the time being I've updated the original post to reflect all of the related issues this PR addresses and a complete list of related acceptance tests. |
Hi! Could we have the same for Azure Data Factory? azurerm_data_factory_managed_private_endpoint has no option to automatically approve the creation of a private endpoint. |
@katbyte - related to the previous comment, there are two pieces that I really need some guidance on.
|
4b6cd2f
to
76fbc82
Compare
Thanks for the ping @tombuildsstuff. Can you help me set expectations on if/when this PR will get some focus? I know it's assigned to you, but not sure if that's still the plan. My struggle here is that:
Thoughts? |
One byproduct of #17625 is that this PR is now blocked by hashicorp/go-azure-sdk#79 |
c06f224
to
ce3c3ed
Compare
Waiting on #17753 |
ce3c3ed
to
d5fe53e
Compare
d5fe53e
to
22fe1df
Compare
Signed-off-by: Owen Farrell <[email protected]>
Signed-off-by: Owen Farrell <[email protected]>
…source Signed-off-by: Owen Farrell <[email protected]>
Signed-off-by: Owen Farrell <[email protected]>
Signed-off-by: Owen Farrell <[email protected]>
…esource Signed-off-by: Owen Farrell <[email protected]>
Co-authored-by: Tom Harvey <[email protected]> Signed-off-by: Owen Farrell <[email protected]>
22fe1df
to
194ef59
Compare
Signed-off-by: Owen Farrell <[email protected]>
194ef59
to
5d86054
Compare
@owenfarrell is this fix completed ? I tried your suggestion is_manual_connection = false its not working.. |
Community Note
Summary
This pull request adds support for automating the approval of private endpoints that that are created in a Synapse managed virtual network.
In order to support auto-approval, this pull request includes a number of enhancements for resources in other services, namely:
Fixes: #11975
Fixes: #13107
Fixes: #13510
Supersedes: #13511
Output from acceptance testing: