Skip to content

Commit

Permalink
Beyondcorp application (#12919) (#21199)
Browse files Browse the repository at this point in the history
[upstream:c0cff93bde60f8fc5d5b42a0282ef907ab3e50e3]

Signed-off-by: Modular Magician <[email protected]>
  • Loading branch information
modular-magician authored Feb 1, 2025
1 parent 9070376 commit dd8578f
Show file tree
Hide file tree
Showing 11 changed files with 2,131 additions and 3 deletions.
3 changes: 3 additions & 0 deletions .changelog/12919.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:note
Reapplied `google_beyondcorp_application`
```
11 changes: 8 additions & 3 deletions google/provider/provider_mmv1_resources.go
Original file line number Diff line number Diff line change
Expand Up @@ -361,6 +361,7 @@ var generatedIAMDatasources = map[string]*schema.Resource{
"google_access_context_manager_access_policy_iam_policy": tpgiamresource.DataSourceIamPolicy(accesscontextmanager.AccessContextManagerAccessPolicyIamSchema, accesscontextmanager.AccessContextManagerAccessPolicyIamUpdaterProducer),
"google_apigee_environment_iam_policy": tpgiamresource.DataSourceIamPolicy(apigee.ApigeeEnvironmentIamSchema, apigee.ApigeeEnvironmentIamUpdaterProducer),
"google_artifact_registry_repository_iam_policy": tpgiamresource.DataSourceIamPolicy(artifactregistry.ArtifactRegistryRepositoryIamSchema, artifactregistry.ArtifactRegistryRepositoryIamUpdaterProducer),
"google_beyondcorp_application_iam_policy": tpgiamresource.DataSourceIamPolicy(beyondcorp.BeyondcorpApplicationIamSchema, beyondcorp.BeyondcorpApplicationIamUpdaterProducer),
"google_beyondcorp_security_gateway_iam_policy": tpgiamresource.DataSourceIamPolicy(beyondcorp.BeyondcorpSecurityGatewayIamSchema, beyondcorp.BeyondcorpSecurityGatewayIamUpdaterProducer),
"google_bigquery_table_iam_policy": tpgiamresource.DataSourceIamPolicy(bigquery.BigQueryTableIamSchema, bigquery.BigQueryTableIamUpdaterProducer),
"google_bigquery_analytics_hub_data_exchange_iam_policy": tpgiamresource.DataSourceIamPolicy(bigqueryanalyticshub.BigqueryAnalyticsHubDataExchangeIamSchema, bigqueryanalyticshub.BigqueryAnalyticsHubDataExchangeIamUpdaterProducer),
Expand Down Expand Up @@ -472,9 +473,9 @@ var handwrittenIAMDatasources = map[string]*schema.Resource{
}

// Resources
// Generated resources: 515
// Generated IAM resources: 273
// Total generated resources: 788
// Generated resources: 516
// Generated IAM resources: 276
// Total generated resources: 792
var generatedResources = map[string]*schema.Resource{
"google_folder_access_approval_settings": accessapproval.ResourceAccessApprovalFolderSettings(),
"google_organization_access_approval_settings": accessapproval.ResourceAccessApprovalOrganizationSettings(),
Expand Down Expand Up @@ -546,6 +547,10 @@ var generatedResources = map[string]*schema.Resource{
"google_beyondcorp_app_connection": beyondcorp.ResourceBeyondcorpAppConnection(),
"google_beyondcorp_app_connector": beyondcorp.ResourceBeyondcorpAppConnector(),
"google_beyondcorp_app_gateway": beyondcorp.ResourceBeyondcorpAppGateway(),
"google_beyondcorp_application": beyondcorp.ResourceBeyondcorpApplication(),
"google_beyondcorp_application_iam_binding": tpgiamresource.ResourceIamBinding(beyondcorp.BeyondcorpApplicationIamSchema, beyondcorp.BeyondcorpApplicationIamUpdaterProducer, beyondcorp.BeyondcorpApplicationIdParseFunc),
"google_beyondcorp_application_iam_member": tpgiamresource.ResourceIamMember(beyondcorp.BeyondcorpApplicationIamSchema, beyondcorp.BeyondcorpApplicationIamUpdaterProducer, beyondcorp.BeyondcorpApplicationIdParseFunc),
"google_beyondcorp_application_iam_policy": tpgiamresource.ResourceIamPolicy(beyondcorp.BeyondcorpApplicationIamSchema, beyondcorp.BeyondcorpApplicationIamUpdaterProducer, beyondcorp.BeyondcorpApplicationIdParseFunc),
"google_beyondcorp_security_gateway": beyondcorp.ResourceBeyondcorpSecurityGateway(),
"google_beyondcorp_security_gateway_iam_binding": tpgiamresource.ResourceIamBinding(beyondcorp.BeyondcorpSecurityGatewayIamSchema, beyondcorp.BeyondcorpSecurityGatewayIamUpdaterProducer, beyondcorp.BeyondcorpSecurityGatewayIdParseFunc),
"google_beyondcorp_security_gateway_iam_member": tpgiamresource.ResourceIamMember(beyondcorp.BeyondcorpSecurityGatewayIamSchema, beyondcorp.BeyondcorpSecurityGatewayIamUpdaterProducer, beyondcorp.BeyondcorpSecurityGatewayIdParseFunc),
Expand Down
240 changes: 240 additions & 0 deletions google/services/beyondcorp/iam_beyondcorp_application.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,240 @@
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0

// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package beyondcorp

import (
"fmt"

"github.com/hashicorp/errwrap"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"google.golang.org/api/cloudresourcemanager/v1"

"github.com/hashicorp/terraform-provider-google/google/tpgiamresource"
"github.com/hashicorp/terraform-provider-google/google/tpgresource"
transport_tpg "github.com/hashicorp/terraform-provider-google/google/transport"
)

var BeyondcorpApplicationIamSchema = map[string]*schema.Schema{
"project": {
Type: schema.TypeString,
Computed: true,
Optional: true,
ForceNew: true,
},
"security_gateways_id": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"application_id": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
DiffSuppressFunc: tpgresource.CompareSelfLinkOrResourceName,
},
}

type BeyondcorpApplicationIamUpdater struct {
project string
securityGatewaysId string
applicationId string
d tpgresource.TerraformResourceData
Config *transport_tpg.Config
}

func BeyondcorpApplicationIamUpdaterProducer(d tpgresource.TerraformResourceData, config *transport_tpg.Config) (tpgiamresource.ResourceIamUpdater, error) {
values := make(map[string]string)

project, _ := tpgresource.GetProject(d, config)
if project != "" {
if err := d.Set("project", project); err != nil {
return nil, fmt.Errorf("Error setting project: %s", err)
}
}
values["project"] = project
if v, ok := d.GetOk("security_gateways_id"); ok {
values["security_gateways_id"] = v.(string)
}

if v, ok := d.GetOk("application_id"); ok {
values["application_id"] = v.(string)
}

// We may have gotten either a long or short name, so attempt to parse long name if possible
m, err := tpgresource.GetImportIdQualifiers([]string{"projects/(?P<project>[^/]+)/locations/global/securityGateways/(?P<security_gateways_id>[^/]+)/applications/(?P<application_id>[^/]+)", "(?P<project>[^/]+)/(?P<security_gateways_id>[^/]+)/(?P<application_id>[^/]+)", "(?P<security_gateways_id>[^/]+)/(?P<application_id>[^/]+)", "(?P<application_id>[^/]+)"}, d, config, d.Get("application_id").(string))
if err != nil {
return nil, err
}

for k, v := range m {
values[k] = v
}

u := &BeyondcorpApplicationIamUpdater{
project: values["project"],
securityGatewaysId: values["security_gateways_id"],
applicationId: values["application_id"],
d: d,
Config: config,
}

if err := d.Set("project", u.project); err != nil {
return nil, fmt.Errorf("Error setting project: %s", err)
}
if err := d.Set("security_gateways_id", u.securityGatewaysId); err != nil {
return nil, fmt.Errorf("Error setting security_gateways_id: %s", err)
}
if err := d.Set("application_id", u.GetResourceId()); err != nil {
return nil, fmt.Errorf("Error setting application_id: %s", err)
}

return u, nil
}

func BeyondcorpApplicationIdParseFunc(d *schema.ResourceData, config *transport_tpg.Config) error {
values := make(map[string]string)

project, _ := tpgresource.GetProject(d, config)
if project != "" {
values["project"] = project
}

m, err := tpgresource.GetImportIdQualifiers([]string{"projects/(?P<project>[^/]+)/locations/global/securityGateways/(?P<security_gateways_id>[^/]+)/applications/(?P<application_id>[^/]+)", "(?P<project>[^/]+)/(?P<security_gateways_id>[^/]+)/(?P<application_id>[^/]+)", "(?P<security_gateways_id>[^/]+)/(?P<application_id>[^/]+)", "(?P<application_id>[^/]+)"}, d, config, d.Id())
if err != nil {
return err
}

for k, v := range m {
values[k] = v
}

u := &BeyondcorpApplicationIamUpdater{
project: values["project"],
securityGatewaysId: values["security_gateways_id"],
applicationId: values["application_id"],
d: d,
Config: config,
}
if err := d.Set("application_id", u.GetResourceId()); err != nil {
return fmt.Errorf("Error setting application_id: %s", err)
}
d.SetId(u.GetResourceId())
return nil
}

func (u *BeyondcorpApplicationIamUpdater) GetResourceIamPolicy() (*cloudresourcemanager.Policy, error) {
url, err := u.qualifyApplicationUrl("getIamPolicy")
if err != nil {
return nil, err
}

project, err := tpgresource.GetProject(u.d, u.Config)
if err != nil {
return nil, err
}
var obj map[string]interface{}
url, err = transport_tpg.AddQueryParams(url, map[string]string{"options.requestedPolicyVersion": fmt.Sprintf("%d", tpgiamresource.IamPolicyVersion)})
if err != nil {
return nil, err
}

userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent)
if err != nil {
return nil, err
}

policy, err := transport_tpg.SendRequest(transport_tpg.SendRequestOptions{
Config: u.Config,
Method: "GET",
Project: project,
RawURL: url,
UserAgent: userAgent,
Body: obj,
})
if err != nil {
return nil, errwrap.Wrapf(fmt.Sprintf("Error retrieving IAM policy for %s: {{err}}", u.DescribeResource()), err)
}

out := &cloudresourcemanager.Policy{}
err = tpgresource.Convert(policy, out)
if err != nil {
return nil, errwrap.Wrapf("Cannot convert a policy to a resource manager policy: {{err}}", err)
}

return out, nil
}

func (u *BeyondcorpApplicationIamUpdater) SetResourceIamPolicy(policy *cloudresourcemanager.Policy) error {
json, err := tpgresource.ConvertToMap(policy)
if err != nil {
return err
}

obj := make(map[string]interface{})
obj["policy"] = json

url, err := u.qualifyApplicationUrl("setIamPolicy")
if err != nil {
return err
}
project, err := tpgresource.GetProject(u.d, u.Config)
if err != nil {
return err
}

userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent)
if err != nil {
return err
}

_, err = transport_tpg.SendRequest(transport_tpg.SendRequestOptions{
Config: u.Config,
Method: "POST",
Project: project,
RawURL: url,
UserAgent: userAgent,
Body: obj,
Timeout: u.d.Timeout(schema.TimeoutCreate),
})
if err != nil {
return errwrap.Wrapf(fmt.Sprintf("Error setting IAM policy for %s: {{err}}", u.DescribeResource()), err)
}

return nil
}

func (u *BeyondcorpApplicationIamUpdater) qualifyApplicationUrl(methodIdentifier string) (string, error) {
urlTemplate := fmt.Sprintf("{{BeyondcorpBasePath}}%s:%s", fmt.Sprintf("projects/%s/locations/global/securityGateways/%s/applications/%s", u.project, u.securityGatewaysId, u.applicationId), methodIdentifier)
url, err := tpgresource.ReplaceVars(u.d, u.Config, urlTemplate)
if err != nil {
return "", err
}
return url, nil
}

func (u *BeyondcorpApplicationIamUpdater) GetResourceId() string {
return fmt.Sprintf("projects/%s/locations/global/securityGateways/%s/applications/%s", u.project, u.securityGatewaysId, u.applicationId)
}

func (u *BeyondcorpApplicationIamUpdater) GetMutexKey() string {
return fmt.Sprintf("iam-beyondcorp-application-%s", u.GetResourceId())
}

func (u *BeyondcorpApplicationIamUpdater) DescribeResource() string {
return fmt.Sprintf("beyondcorp application %q", u.GetResourceId())
}
Loading

0 comments on commit dd8578f

Please sign in to comment.