joda
joda
Yes it is reproducible. A bucc up doesn't help because it detects no change and will not act. bucc up --recreate will recreate the vm and everything works fine again.
Our use case is that we think about exposing a subset of commands of the capi (for managing apps and services) to less secure origins by using an api management...
@wing328 no. In my case all obj passed to this class are instance of dict so this code is anyway noop. It does work if you omit the "not" meaning...
And as you can see ``` _obj = cls.model_validate({ "name": obj.get("name"), "address": Address.from_dict(obj.get("address")) if obj.get("address") is not None else None, }) ``` filters out all entries from a dict that...
Hi @mogul, the reason for this is that binding an asg to a space requires space developer privileges. But due to the fact that space role assignments to users is...
Actually I found a way which might not look so nice at first but I think it makes sense to actually add the user used by tf as developer or...
@mogul Yes, got your point. The identity terraform uses (lets call it tf-id) should have full authorization of all object tf manages. Ok. I have changed my implementation. Would be...
There is one disputable aspect of the current implementation: The terraform user (tf-id) is added at create time. If (and only if) you add the same tf-id as part of...
@loafoe I have corrected the spelling error.
Hi @loafoe, not sure if you have seen my comment on the pull request. So I repeat it here: Regarding the permadiff : Default behaviour of the space_users resource is...