Skip to content

Conversation

2ps
Copy link

@2ps 2ps commented May 10, 2022

Description

Added an ignore_uuid flag to the apply_state helper so that we would
be able to selectively ignore the uuid for certain objects, like
security group rules, where we don't yet support uuid as a parameter.

Motivation and Context

The uuid returned from an existing rule was causing all security
rules to show as if they had changes even when no changes to the rules
would be made.

This change addresses ISSUE-310

How Has This Been Tested?

Used the updated module to rerun existing playbooks with security group rules and confirmed that no changes were reported after running the playbooks.

  • [ X ] I have updated the documentation accordingly.
  • [ X ] I have read the CONTRIBUTING document.
  • [ X ] I have added tests to cover my changes if appropriate.
  • [ X ] All new and existing tests passed.

Problem?

The uuid returned from an existing rule was causing all security
rules to show as if they had changes even when no changes to the rules
would be made.

Solution!

Added an `ignore_uuid` flag to the `apply_state` helper so that we would
be able to selectively ignore the uuid for certain objects, like
security group rules, where we don't yet support uuid as a parameter.
@2ps
Copy link
Author

2ps commented May 16, 2022

@shinmog , @ivanbojer we would like to request review of this PR.

@2ps
Copy link
Author

2ps commented May 25, 2022

@shinmog , @ivanbojer : bump

@dgarros
Copy link

dgarros commented Jun 8, 2022

Looking forward to seeing this fix being merged, it's been annoying to have false positive because of the UUID

@shinmog
Copy link
Collaborator

shinmog commented Jul 27, 2022

Implemented this for all the policy rule modules, and will be included in the next release. Closing this out as it is now obsoleted.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

3 participants