-
Notifications
You must be signed in to change notification settings - Fork 264
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Add IAM policy to SecurityGateway.yaml (#12782)
[upstream:a64fc0727be1931d3b9d83a1b802452efa0b6907] Signed-off-by: Modular Magician <[email protected]>
- Loading branch information
1 parent
65db8c7
commit fdc2369
Showing
6 changed files
with
1,160 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
```release-note:new-resource | ||
`google_beyondcorp_security_gateway_iam_binding` | ||
``` | ||
```release-note:new-resource | ||
`google_beyondcorp_security_gateway_iam_member` | ||
``` | ||
```release-note:new-resource | ||
`google_beyondcorp_security_gateway_iam_policy` | ||
``` |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
249 changes: 249 additions & 0 deletions
249
google-beta/services/beyondcorp/iam_beyondcorp_security_gateway.go
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,249 @@ | ||
// Copyright (c) HashiCorp, Inc. | ||
// SPDX-License-Identifier: MPL-2.0 | ||
|
||
// ---------------------------------------------------------------------------- | ||
// | ||
// *** AUTO GENERATED CODE *** Type: MMv1 *** | ||
// | ||
// ---------------------------------------------------------------------------- | ||
// | ||
// This file is automatically generated by Magic Modules and manual | ||
// changes will be clobbered when the file is regenerated. | ||
// | ||
// Please read more about how to change this file in | ||
// .github/CONTRIBUTING.md. | ||
// | ||
// ---------------------------------------------------------------------------- | ||
|
||
package beyondcorp | ||
|
||
import ( | ||
"fmt" | ||
|
||
"github.com/hashicorp/errwrap" | ||
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" | ||
"google.golang.org/api/cloudresourcemanager/v1" | ||
|
||
"github.com/hashicorp/terraform-provider-google-beta/google-beta/tpgiamresource" | ||
"github.com/hashicorp/terraform-provider-google-beta/google-beta/tpgresource" | ||
transport_tpg "github.com/hashicorp/terraform-provider-google-beta/google-beta/transport" | ||
) | ||
|
||
var BeyondcorpSecurityGatewayIamSchema = map[string]*schema.Schema{ | ||
"project": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
Optional: true, | ||
ForceNew: true, | ||
}, | ||
"location": { | ||
Type: schema.TypeString, | ||
Computed: true, | ||
Optional: true, | ||
ForceNew: true, | ||
}, | ||
"security_gateway_id": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ForceNew: true, | ||
DiffSuppressFunc: tpgresource.CompareSelfLinkOrResourceName, | ||
}, | ||
} | ||
|
||
type BeyondcorpSecurityGatewayIamUpdater struct { | ||
project string | ||
location string | ||
securityGatewayId string | ||
d tpgresource.TerraformResourceData | ||
Config *transport_tpg.Config | ||
} | ||
|
||
func BeyondcorpSecurityGatewayIamUpdaterProducer(d tpgresource.TerraformResourceData, config *transport_tpg.Config) (tpgiamresource.ResourceIamUpdater, error) { | ||
values := make(map[string]string) | ||
|
||
project, _ := tpgresource.GetProject(d, config) | ||
if project != "" { | ||
if err := d.Set("project", project); err != nil { | ||
return nil, fmt.Errorf("Error setting project: %s", err) | ||
} | ||
} | ||
values["project"] = project | ||
location, _ := tpgresource.GetLocation(d, config) | ||
if location != "" { | ||
if err := d.Set("location", location); err != nil { | ||
return nil, fmt.Errorf("Error setting location: %s", err) | ||
} | ||
} | ||
values["location"] = location | ||
if v, ok := d.GetOk("security_gateway_id"); ok { | ||
values["security_gateway_id"] = v.(string) | ||
} | ||
|
||
// We may have gotten either a long or short name, so attempt to parse long name if possible | ||
m, err := tpgresource.GetImportIdQualifiers([]string{"projects/(?P<project>[^/]+)/locations/(?P<location>[^/]+)/securityGateways/(?P<security_gateway_id>[^/]+)", "(?P<project>[^/]+)/(?P<location>[^/]+)/(?P<security_gateway_id>[^/]+)", "(?P<location>[^/]+)/(?P<security_gateway_id>[^/]+)", "(?P<security_gateway_id>[^/]+)"}, d, config, d.Get("security_gateway_id").(string)) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
for k, v := range m { | ||
values[k] = v | ||
} | ||
|
||
u := &BeyondcorpSecurityGatewayIamUpdater{ | ||
project: values["project"], | ||
location: values["location"], | ||
securityGatewayId: values["security_gateway_id"], | ||
d: d, | ||
Config: config, | ||
} | ||
|
||
if err := d.Set("project", u.project); err != nil { | ||
return nil, fmt.Errorf("Error setting project: %s", err) | ||
} | ||
if err := d.Set("location", u.location); err != nil { | ||
return nil, fmt.Errorf("Error setting location: %s", err) | ||
} | ||
if err := d.Set("security_gateway_id", u.GetResourceId()); err != nil { | ||
return nil, fmt.Errorf("Error setting security_gateway_id: %s", err) | ||
} | ||
|
||
return u, nil | ||
} | ||
|
||
func BeyondcorpSecurityGatewayIdParseFunc(d *schema.ResourceData, config *transport_tpg.Config) error { | ||
values := make(map[string]string) | ||
|
||
project, _ := tpgresource.GetProject(d, config) | ||
if project != "" { | ||
values["project"] = project | ||
} | ||
|
||
location, _ := tpgresource.GetLocation(d, config) | ||
if location != "" { | ||
values["location"] = location | ||
} | ||
|
||
m, err := tpgresource.GetImportIdQualifiers([]string{"projects/(?P<project>[^/]+)/locations/(?P<location>[^/]+)/securityGateways/(?P<security_gateway_id>[^/]+)", "(?P<project>[^/]+)/(?P<location>[^/]+)/(?P<security_gateway_id>[^/]+)", "(?P<location>[^/]+)/(?P<security_gateway_id>[^/]+)", "(?P<security_gateway_id>[^/]+)"}, d, config, d.Id()) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
for k, v := range m { | ||
values[k] = v | ||
} | ||
|
||
u := &BeyondcorpSecurityGatewayIamUpdater{ | ||
project: values["project"], | ||
location: values["location"], | ||
securityGatewayId: values["security_gateway_id"], | ||
d: d, | ||
Config: config, | ||
} | ||
if err := d.Set("security_gateway_id", u.GetResourceId()); err != nil { | ||
return fmt.Errorf("Error setting security_gateway_id: %s", err) | ||
} | ||
d.SetId(u.GetResourceId()) | ||
return nil | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) GetResourceIamPolicy() (*cloudresourcemanager.Policy, error) { | ||
url, err := u.qualifySecurityGatewayUrl("getIamPolicy") | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
project, err := tpgresource.GetProject(u.d, u.Config) | ||
if err != nil { | ||
return nil, err | ||
} | ||
var obj map[string]interface{} | ||
url, err = transport_tpg.AddQueryParams(url, map[string]string{"options.requestedPolicyVersion": fmt.Sprintf("%d", tpgiamresource.IamPolicyVersion)}) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent) | ||
if err != nil { | ||
return nil, err | ||
} | ||
|
||
policy, err := transport_tpg.SendRequest(transport_tpg.SendRequestOptions{ | ||
Config: u.Config, | ||
Method: "GET", | ||
Project: project, | ||
RawURL: url, | ||
UserAgent: userAgent, | ||
Body: obj, | ||
}) | ||
if err != nil { | ||
return nil, errwrap.Wrapf(fmt.Sprintf("Error retrieving IAM policy for %s: {{err}}", u.DescribeResource()), err) | ||
} | ||
|
||
out := &cloudresourcemanager.Policy{} | ||
err = tpgresource.Convert(policy, out) | ||
if err != nil { | ||
return nil, errwrap.Wrapf("Cannot convert a policy to a resource manager policy: {{err}}", err) | ||
} | ||
|
||
return out, nil | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) SetResourceIamPolicy(policy *cloudresourcemanager.Policy) error { | ||
json, err := tpgresource.ConvertToMap(policy) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
obj := make(map[string]interface{}) | ||
obj["policy"] = json | ||
|
||
url, err := u.qualifySecurityGatewayUrl("setIamPolicy") | ||
if err != nil { | ||
return err | ||
} | ||
project, err := tpgresource.GetProject(u.d, u.Config) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent) | ||
if err != nil { | ||
return err | ||
} | ||
|
||
_, err = transport_tpg.SendRequest(transport_tpg.SendRequestOptions{ | ||
Config: u.Config, | ||
Method: "POST", | ||
Project: project, | ||
RawURL: url, | ||
UserAgent: userAgent, | ||
Body: obj, | ||
Timeout: u.d.Timeout(schema.TimeoutCreate), | ||
}) | ||
if err != nil { | ||
return errwrap.Wrapf(fmt.Sprintf("Error setting IAM policy for %s: {{err}}", u.DescribeResource()), err) | ||
} | ||
|
||
return nil | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) qualifySecurityGatewayUrl(methodIdentifier string) (string, error) { | ||
urlTemplate := fmt.Sprintf("{{BeyondcorpBasePath}}%s:%s", fmt.Sprintf("projects/%s/locations/%s/securityGateways/%s", u.project, u.location, u.securityGatewayId), methodIdentifier) | ||
url, err := tpgresource.ReplaceVars(u.d, u.Config, urlTemplate) | ||
if err != nil { | ||
return "", err | ||
} | ||
return url, nil | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) GetResourceId() string { | ||
return fmt.Sprintf("projects/%s/locations/%s/securityGateways/%s", u.project, u.location, u.securityGatewayId) | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) GetMutexKey() string { | ||
return fmt.Sprintf("iam-beyondcorp-securitygateway-%s", u.GetResourceId()) | ||
} | ||
|
||
func (u *BeyondcorpSecurityGatewayIamUpdater) DescribeResource() string { | ||
return fmt.Sprintf("beyondcorp securitygateway %q", u.GetResourceId()) | ||
} |
Oops, something went wrong.