{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":128805309,"defaultBranch":"master","name":"terraform-provider-nsxt","ownerLogin":"vmware","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2018-04-09T16:54:13.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/473334?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1717458767.0","currentOid":""},"activityList":{"items":[{"before":"ca4f98cc05af604dca71b70d4e3f8985cca77b6c","after":"f76d6fb8c7fa6d9cdfeae1056ac180698e3fb1a4","ref":"refs/heads/branch_362","pushedAt":"2024-06-06T18:50:10.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Fix read in separate security policy rule resource\n\nBefore the fix, the code did not respect empty lists for certain\nattributes, which resulted in non-empty plan.\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Fix read in separate security policy rule resource"}},{"before":"b9a7d1fce407c19ae5c30d697dd1d25f40a2e98b","after":"316cd64e6de3bcab042c14916de81be2e8d64032","ref":"refs/heads/master","pushedAt":"2024-06-06T16:32:15.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Merge pull request #1225 from vmware/fix-sp-read\n\nFix read in separate security policy rule resource","shortMessageHtmlLink":"Merge pull request #1225 from vmware/fix-sp-read"}},{"before":"673b1dce2079af337ec54b4eb82660477ed3cc6a","after":"b9a7d1fce407c19ae5c30d697dd1d25f40a2e98b","ref":"refs/heads/master","pushedAt":"2024-06-06T10:59:36.000Z","pushType":"pr_merge","commitsCount":4,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1191 from ksamoray/upgrade_groups\n\nAdd custom groups support to upgrade run resource","shortMessageHtmlLink":"Merge pull request #1191 from ksamoray/upgrade_groups"}},{"before":"7a02a181868ac573703633b55f699e9f8bb7e9f9","after":"fd8496b757c3fcace021b61233b36c19fd4330e5","ref":"refs/heads/policy-path-parser","pushedAt":"2024-06-05T17:55:21.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nIn addition, add helper to get or generate ID with parent path\nThese helpers will be used in generated resources\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":"a5473d2c050018e294838edd88a5aad771e8219f","after":"7a02a181868ac573703633b55f699e9f8bb7e9f9","ref":"refs/heads/policy-path-parser","pushedAt":"2024-06-04T21:54:49.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nIn addition, add helper to get or generate ID with parent path\nThese helpers will be used in generated resources\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":"09cd1f294edc4d431100a120deaf13099525cf15","after":"673b1dce2079af337ec54b4eb82660477ed3cc6a","ref":"refs/heads/master","pushedAt":"2024-06-04T00:14:56.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Merge pull request #1212 from vmware/ignore-tag-scope\n\nAdd ignore_tags feature for segments","shortMessageHtmlLink":"Merge pull request #1212 from vmware/ignore-tag-scope"}},{"before":"09cd1f294edc4d431100a120deaf13099525cf15","after":"924fa890e1d9533fca6f7bc532d46e5837b278d3","ref":"refs/heads/fix-sp-read","pushedAt":"2024-06-03T23:56:03.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Fix read in separate security policy rule resource\n\nBefore the fix, the code did not respect empty lists for certain\nattributes, which resulted in non-empty plan.\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Fix read in separate security policy rule resource"}},{"before":null,"after":"09cd1f294edc4d431100a120deaf13099525cf15","ref":"refs/heads/fix-sp-read","pushedAt":"2024-06-03T23:52:47.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Improve error reporting and error handling in reflect lib\n\nThis change improves error checking and reporting in the reflect lib.\nNow an error will be returned on both convert directions if either:\n- The name of a field is not found in the passed in struct\n- reflect called panic for whatever operation failed\n\nSigned-off-by: Shawn Wang ","shortMessageHtmlLink":"Improve error reporting and error handling in reflect lib"}},{"before":"8241f78b36036bc6638a71ee7d57642ea73ff374","after":"03d3e238bc50f91143a890536e860c8db248468e","ref":"refs/heads/ignore-tag-scope","pushedAt":"2024-06-01T00:52:39.000Z","pushType":"push","commitsCount":30,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Merge branch 'master' into ignore-tag-scope","shortMessageHtmlLink":"Merge branch 'master' into ignore-tag-scope"}},{"before":"66e3ed136546b374d73e0d37c2acbb2da8df5367","after":"a5473d2c050018e294838edd88a5aad771e8219f","ref":"refs/heads/policy-path-parser","pushedAt":"2024-05-31T02:01:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nThis utility will be used in generated resources\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":"798934791be7fb53bf6fa5237bc771cdb88d5006","after":"09cd1f294edc4d431100a120deaf13099525cf15","ref":"refs/heads/master","pushedAt":"2024-05-31T00:04:11.000Z","pushType":"pr_merge","commitsCount":14,"pusher":{"login":"wsquan171","name":"Shawn Wang","path":"/wsquan171","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/11639923?s=80&v=4"},"commit":{"message":"Improve error reporting and error handling in reflect lib\n\nThis change improves error checking and reporting in the reflect lib.\nNow an error will be returned on both convert directions if either:\n- The name of a field is not found in the passed in struct\n- reflect called panic for whatever operation failed\n\nSigned-off-by: Shawn Wang ","shortMessageHtmlLink":"Improve error reporting and error handling in reflect lib"}},{"before":"f860e88bf49a954a3ff1ae7248c3d4ae9a2d40ad","after":"ca4f98cc05af604dca71b70d4e3f8985cca77b6c","ref":"refs/heads/branch_362","pushedAt":"2024-05-29T17:15:23.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Escape password when requesting for session token\n\nWhen NSX password contains certain special characters(such as &),\nthose need to be encoded when sent to session/create API\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Escape password when requesting for session token"}},{"before":"ef687b6a98b82f9156110b1a8b3acabf76979d16","after":"798934791be7fb53bf6fa5237bc771cdb88d5006","ref":"refs/heads/master","pushedAt":"2024-05-29T06:37:45.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1219 from ksamoray/fix_makefile\n\nFix makefile error","shortMessageHtmlLink":"Merge pull request #1219 from ksamoray/fix_makefile"}},{"before":"258c25600436f179558ffbac4d4a6edb1163557d","after":"8241f78b36036bc6638a71ee7d57642ea73ff374","ref":"refs/heads/ignore-tag-scope","pushedAt":"2024-05-29T03:36:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add ignore_tags feature for segments\n\nOther tools (like VCD) may add tags to certain NSX objects managed\nby terraform, and expects those tags to be persisted.\nHowever, terraform provider assumes itself to be the only source of\ntruth, and in case described above it detect drift in tags, and delete\nthem with apply.\nThis PR allows user to specify a list of tag scopes that should be\nignored by the provider, more specifically:\n1. diff should not be detected when such tags are present on NSX but\nnot in terraform config\n2. when provider applies tags from its own config, tags from the\n`ignore` list should not be deleted.\n\nImplementation suggested here changes the Read function to sort tags\ninto two buckets: regular tags and ignored tags. Regular tags are\nmanaged as before, whilw ignored tags (computed attribute) are appended\nto regular tag list on each apply.\n\nFuture enhancements:\n1. Add regexp to compare scopes\n2. Add this feature to more resources if needed\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add ignore_tags feature for segments"}},{"before":"b626744c406cf60a0b76f7ecd34aac78a3344219","after":"66e3ed136546b374d73e0d37c2acbb2da8df5367","ref":"refs/heads/policy-path-parser","pushedAt":"2024-05-28T22:58:56.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nThis utility will be used in generated resources\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":null,"after":"b626744c406cf60a0b76f7ecd34aac78a3344219","ref":"refs/heads/policy-path-parser","pushedAt":"2024-05-28T03:32:37.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nThis utility will be used in generated resources\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":null,"after":"025cf1f35d63f242d2aa54cb258c4bc021019683","ref":"refs/heads/path-parser","pushedAt":"2024-05-28T03:24:55.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add utility to parse standard policy path\n\nThis utility will be used in autogenerated resources\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add utility to parse standard policy path"}},{"before":"5308952eec743e29724df45827ca488f78e95886","after":"ef687b6a98b82f9156110b1a8b3acabf76979d16","ref":"refs/heads/master","pushedAt":"2024-05-28T02:57:33.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Merge pull request #1216 from vmware/encode-session-create\n\nEscape password when requesting for session token","shortMessageHtmlLink":"Merge pull request #1216 from vmware/encode-session-create"}},{"before":"f54f315f659b4f1e70ba7dc8372c67e3952d66b9","after":"5308952eec743e29724df45827ca488f78e95886","ref":"refs/heads/master","pushedAt":"2024-05-26T09:47:18.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1207 from ksamoray/ds-vpc\n\nAdd VPC data source","shortMessageHtmlLink":"Merge pull request #1207 from ksamoray/ds-vpc"}},{"before":"5162981944aa87d3f6bf6d774bbbfe9eaa1882a9","after":"f54f315f659b4f1e70ba7dc8372c67e3952d66b9","ref":"refs/heads/master","pushedAt":"2024-05-26T09:47:03.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1215 from ksamoray/build-coverage\n\nAdd a make target for build with code coverage","shortMessageHtmlLink":"Merge pull request #1215 from ksamoray/build-coverage"}},{"before":"6386a79835e005bc6206a0055f92a67c4d4504d1","after":"e408ceddf0fb047bf7770a63dd6140a2d587ec4f","ref":"refs/heads/encode-session-create","pushedAt":"2024-05-24T01:45:19.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Escape password when requesting for session token\n\nWhen NSX password contains certain special characters(such as &),\nthose need to be encoded when sent to session/create API\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Escape password when requesting for session token"}},{"before":null,"after":"6386a79835e005bc6206a0055f92a67c4d4504d1","ref":"refs/heads/encode-session-create","pushedAt":"2024-05-24T01:02:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Escape password when requesting for session token\n\nWhen NSX password contains certain special characters(such as &),\nthose need to be encoded when sent to session/create API\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Escape password when requesting for session token"}},{"before":"e43e952f3b3b1fb1af68fa87815b49e80165950a","after":"5162981944aa87d3f6bf6d774bbbfe9eaa1882a9","ref":"refs/heads/master","pushedAt":"2024-05-23T08:18:16.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1214 from ksamoray/upgrade_acknowledge_dependency\n\nAdd dependency between prepare and acknowledge resources","shortMessageHtmlLink":"Merge pull request #1214 from ksamoray/upgrade_acknowledge_dependency"}},{"before":"3c71a10a7d9a0a8486e336094533f74c89d6cc22","after":"e43e952f3b3b1fb1af68fa87815b49e80165950a","ref":"refs/heads/master","pushedAt":"2024-05-17T19:09:32.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1211 from ksamoray/nsxt_policy_gateway_route_map_out_filter\n\nUpdate out_filter in nsxt_policy_gateway_route_map","shortMessageHtmlLink":"Merge pull request #1211 from ksamoray/nsxt_policy_gateway_route_map_…"}},{"before":"aba60aec9d6ab1a94a755183dc040080a9bdef9c","after":"3c71a10a7d9a0a8486e336094533f74c89d6cc22","ref":"refs/heads/master","pushedAt":"2024-05-17T19:09:19.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1209 from ksamoray/ssl_cipher_fix\n\nFix SSL client cipher in test","shortMessageHtmlLink":"Merge pull request #1209 from ksamoray/ssl_cipher_fix"}},{"before":null,"after":"258c25600436f179558ffbac4d4a6edb1163557d","ref":"refs/heads/ignore-tag-scope","pushedAt":"2024-05-17T00:49:00.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Add ignore_tags feature for segments\n\nOther tools (like VCD) may add tags to certain NSX objects managed\nby terraform, and expects those tags to be persisted.\nHowever, terraform provider assumes itself to be the only source of\ntruth, and in case described above it detect drift in tags, and delete\nthem with apply.\nThis PR allows user to specify a list of tag scopes that should be\nignored by the provider, more specifically:\n1. diff should not be detected when such tags are present on NSX but\nnot in terraform config\n2. when provider applies tags from its own config, tags from the\n`ignore` list should not be deleted.\n\nImplementation suggested here changes the Read function to sort tags\ninto two buckets: regular tags and ignored tags. Regular tags are\nmanaged as before, whilw ignored tags (computed attribute) are appended\nto regular tag list on each apply.\n\nFuture enhancements:\n1. Add regexp to compare scopes\n2. Add this feature to more resources if needed\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Add ignore_tags feature for segments"}},{"before":"d1123dc932fe05960e0c3226b807bb7ab057ab85","after":"f860e88bf49a954a3ff1ae7248c3d4ae9a2d40ad","ref":"refs/heads/branch_362","pushedAt":"2024-05-15T17:33:55.000Z","pushType":"push","commitsCount":2,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Update syslog config spec in edge TN resource\n\nPort should follow the API spec and be defined as string rather than\nint. Spec allows port range, however NSX rejects multiple port config,\nso we'll leave the single port validation for now, while allowing to\nchange it later without deprecating the attribute.\nIn addition, this change removes name attribute for syslog since NSX\nseems to ignore it.\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Update syslog config spec in edge TN resource"}},{"before":"b9fbc07a92f19f5766266db2c02040107a86344a","after":"aba60aec9d6ab1a94a755183dc040080a9bdef9c","ref":"refs/heads/master","pushedAt":"2024-05-15T11:47:35.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"ksamoray","name":"Kobi Samoray","path":"/ksamoray","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/9676139?s=80&v=4"},"commit":{"message":"Merge pull request #1208 from ksamoray/ssl_cipher\n\nUpdate LB SSL tests for NSX v4.2.0","shortMessageHtmlLink":"Merge pull request #1208 from ksamoray/ssl_cipher"}},{"before":"a8cdeaece3f387396975e282b3bb0ce71f231d1e","after":"b9fbc07a92f19f5766266db2c02040107a86344a","ref":"refs/heads/master","pushedAt":"2024-05-13T16:54:52.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Merge pull request #1206 from vmware/fix-edge-syslog\n\nUpdate syslog config spec in edge TN resource","shortMessageHtmlLink":"Merge pull request #1206 from vmware/fix-edge-syslog"}},{"before":null,"after":"2a5115dd30c17573058dd1752f763bd064593ea1","ref":"refs/heads/fix-edge-syslog","pushedAt":"2024-05-10T22:18:19.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"annakhm","name":null,"path":"/annakhm","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/32882380?s=80&v=4"},"commit":{"message":"Update syslog config spec in edge TN resource\n\nPort should follow the API spec and be defined as string rather than\nint. Spec allows port range, however NSX rejects multiple port config,\nso we'll leave the single port validation for now, while allowing to\nchange it later without deprecating the attribute.\nIn addition, this change removes name attribute for syslog since NSX\nseems to ignore it.\n\nSigned-off-by: Anna Khmelnitsky ","shortMessageHtmlLink":"Update syslog config spec in edge TN resource"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEXoWhygA","startCursor":null,"endCursor":null}},"title":"Activity · vmware/terraform-provider-nsxt"}