Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adding ServiceConnectionPolicies resource in NetworkConnectivity. #15381

Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
3 changes: 3 additions & 0 deletions .changelog/8273.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,3 @@
```release-note:new-resource
google_network_connectivity_service_connection_policy
```
1 change: 1 addition & 0 deletions google/config_test_utils.go
Original file line number Diff line number Diff line change
Expand Up @@ -90,6 +90,7 @@ func configureTestBasePaths(c *transport_tpg.Config, url string) {
c.MemcacheBasePath = url
c.MLEngineBasePath = url
c.MonitoringBasePath = url
c.NetworkConnectivityBasePath = url
c.NetworkManagementBasePath = url
c.NetworkSecurityBasePath = url
c.NetworkServicesBasePath = url
Expand Down
2 changes: 1 addition & 1 deletion google/fwmodels/provider_model.go
Original file line number Diff line number Diff line change
Expand Up @@ -91,6 +91,7 @@ type ProviderModel struct {
MemcacheCustomEndpoint types.String `tfsdk:"memcache_custom_endpoint"`
MLEngineCustomEndpoint types.String `tfsdk:"ml_engine_custom_endpoint"`
MonitoringCustomEndpoint types.String `tfsdk:"monitoring_custom_endpoint"`
NetworkConnectivityCustomEndpoint types.String `tfsdk:"network_connectivity_custom_endpoint"`
NetworkManagementCustomEndpoint types.String `tfsdk:"network_management_custom_endpoint"`
NetworkSecurityCustomEndpoint types.String `tfsdk:"network_security_custom_endpoint"`
NetworkServicesCustomEndpoint types.String `tfsdk:"network_services_custom_endpoint"`
Expand Down Expand Up @@ -141,7 +142,6 @@ type ProviderModel struct {
CloudResourceManagerCustomEndpoint types.String `tfsdk:"cloud_resource_manager_custom_endpoint"`
EventarcCustomEndpoint types.String `tfsdk:"eventarc_custom_endpoint"`
FirebaserulesCustomEndpoint types.String `tfsdk:"firebaserules_custom_endpoint"`
NetworkConnectivityCustomEndpoint types.String `tfsdk:"network_connectivity_custom_endpoint"`
OrgPolicyCustomEndpoint types.String `tfsdk:"org_policy_custom_endpoint"`
RecaptchaEnterpriseCustomEndpoint types.String `tfsdk:"recaptcha_enterprise_custom_endpoint"`
}
Expand Down
6 changes: 6 additions & 0 deletions google/fwprovider/framework_provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -515,6 +515,12 @@ func (p *FrameworkProvider) Schema(_ context.Context, _ provider.SchemaRequest,
transport_tpg.CustomEndpointValidator(),
},
},
"network_connectivity_custom_endpoint": &schema.StringAttribute{
Optional: true,
Validators: []validator.String{
transport_tpg.CustomEndpointValidator(),
},
},
"network_management_custom_endpoint": &schema.StringAttribute{
Optional: true,
Validators: []validator.String{
Expand Down
10 changes: 10 additions & 0 deletions google/fwtransport/framework_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -115,6 +115,7 @@ type FrameworkProviderConfig struct {
MemcacheBasePath string
MLEngineBasePath string
MonitoringBasePath string
NetworkConnectivityBasePath string
NetworkManagementBasePath string
NetworkSecurityBasePath string
NetworkServicesBasePath string
Expand Down Expand Up @@ -251,6 +252,7 @@ func (p *FrameworkProviderConfig) LoadAndValidateFramework(ctx context.Context,
p.MemcacheBasePath = data.MemcacheCustomEndpoint.ValueString()
p.MLEngineBasePath = data.MLEngineCustomEndpoint.ValueString()
p.MonitoringBasePath = data.MonitoringCustomEndpoint.ValueString()
p.NetworkConnectivityBasePath = data.NetworkConnectivityCustomEndpoint.ValueString()
p.NetworkManagementBasePath = data.NetworkManagementCustomEndpoint.ValueString()
p.NetworkSecurityBasePath = data.NetworkSecurityCustomEndpoint.ValueString()
p.NetworkServicesBasePath = data.NetworkServicesCustomEndpoint.ValueString()
Expand Down Expand Up @@ -935,6 +937,14 @@ func (p *FrameworkProviderConfig) HandleDefaults(ctx context.Context, data *fwmo
data.MonitoringCustomEndpoint = types.StringValue(customEndpoint.(string))
}
}
if data.NetworkConnectivityCustomEndpoint.IsNull() {
customEndpoint := transport_tpg.MultiEnvDefault([]string{
"GOOGLE_NETWORK_CONNECTIVITY_CUSTOM_ENDPOINT",
}, transport_tpg.DefaultBasePaths[transport_tpg.NetworkConnectivityBasePathKey])
if customEndpoint != nil {
data.NetworkConnectivityCustomEndpoint = types.StringValue(customEndpoint.(string))
}
}
if data.NetworkManagementCustomEndpoint.IsNull() {
customEndpoint := transport_tpg.MultiEnvDefault([]string{
"GOOGLE_NETWORK_MANAGEMENT_CUSTOM_ENDPOINT",
Expand Down
1 change: 1 addition & 0 deletions google/gcp_sweeper_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,7 @@ import (
_ "github.com/hashicorp/terraform-provider-google/google/services/memcache"
_ "github.com/hashicorp/terraform-provider-google/google/services/mlengine"
_ "github.com/hashicorp/terraform-provider-google/google/services/monitoring"
_ "github.com/hashicorp/terraform-provider-google/google/services/networkconnectivity"
_ "github.com/hashicorp/terraform-provider-google/google/services/networkmanagement"
_ "github.com/hashicorp/terraform-provider-google/google/services/networksecurity"
_ "github.com/hashicorp/terraform-provider-google/google/services/networkservices"
Expand Down
12 changes: 10 additions & 2 deletions google/provider/provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -79,6 +79,7 @@ import (
"github.com/hashicorp/terraform-provider-google/google/services/memcache"
"github.com/hashicorp/terraform-provider-google/google/services/mlengine"
"github.com/hashicorp/terraform-provider-google/google/services/monitoring"
"github.com/hashicorp/terraform-provider-google/google/services/networkconnectivity"
"github.com/hashicorp/terraform-provider-google/google/services/networkmanagement"
"github.com/hashicorp/terraform-provider-google/google/services/networksecurity"
"github.com/hashicorp/terraform-provider-google/google/services/networkservices"
Expand Down Expand Up @@ -554,6 +555,11 @@ func Provider() *schema.Provider {
Optional: true,
ValidateFunc: transport_tpg.ValidateCustomEndpoint,
},
"network_connectivity_custom_endpoint": {
Type: schema.TypeString,
Optional: true,
ValidateFunc: transport_tpg.ValidateCustomEndpoint,
},
"network_management_custom_endpoint": {
Type: schema.TypeString,
Optional: true,
Expand Down Expand Up @@ -953,9 +959,9 @@ func DatasourceMapWithErrors() (map[string]*schema.Resource, error) {
})
}

// Generated resources: 305
// Generated resources: 306
// Generated IAM resources: 204
// Total generated resources: 509
// Total generated resources: 510
func ResourceMap() map[string]*schema.Resource {
resourceMap, _ := ResourceMapWithErrors()
return resourceMap
Expand Down Expand Up @@ -1363,6 +1369,7 @@ func ResourceMapWithErrors() (map[string]*schema.Resource, error) {
"google_monitoring_custom_service": monitoring.ResourceMonitoringService(),
"google_monitoring_slo": monitoring.ResourceMonitoringSlo(),
"google_monitoring_uptime_check_config": monitoring.ResourceMonitoringUptimeCheckConfig(),
"google_network_connectivity_service_connection_policy": networkconnectivity.ResourceNetworkConnectivityServiceConnectionPolicy(),
"google_network_management_connectivity_test": networkmanagement.ResourceNetworkManagementConnectivityTest(),
"google_network_security_address_group": networksecurity.ResourceNetworkSecurityAddressGroup(),
"google_network_security_gateway_security_policy": networksecurity.ResourceNetworkSecurityGatewaySecurityPolicy(),
Expand Down Expand Up @@ -1764,6 +1771,7 @@ func providerConfigure(ctx context.Context, d *schema.ResourceData, p *schema.Pr
config.MemcacheBasePath = d.Get("memcache_custom_endpoint").(string)
config.MLEngineBasePath = d.Get("ml_engine_custom_endpoint").(string)
config.MonitoringBasePath = d.Get("monitoring_custom_endpoint").(string)
config.NetworkConnectivityBasePath = d.Get("network_connectivity_custom_endpoint").(string)
config.NetworkManagementBasePath = d.Get("network_management_custom_endpoint").(string)
config.NetworkSecurityBasePath = d.Get("network_security_custom_endpoint").(string)
config.NetworkServicesBasePath = d.Get("network_services_custom_endpoint").(string)
Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,111 @@
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0
package google

import (
"fmt"
"testing"

"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-provider-google/google/acctest"
)

func TestAccNetworkConnectivityServiceConnectionPolicy_update(t *testing.T) {
t.Parallel()

context := map[string]interface{}{
"networkProducerName": fmt.Sprintf("tf-test-network-%s", RandString(t, 10)),
"subnetworkProducerName1": fmt.Sprintf("tf-test-subnet-producer-%s", RandString(t, 10)),
"subnetworkProducerName2": fmt.Sprintf("tf-test-subnet-producer-%s", RandString(t, 10)),
"serviceConnectionPolicyName": fmt.Sprintf("tf-test-service-connection-policy-%s", RandString(t, 10)),
}

VcrTest(t, resource.TestCase{
PreCheck: func() { acctest.AccTestPreCheck(t) },
ProtoV5ProviderFactories: ProtoV5ProviderFactories(t),
CheckDestroy: testAccCheckNetworkConnectivityServiceConnectionPolicyDestroyProducer(t),
Steps: []resource.TestStep{
{
Config: testAccNetworkConnectivityServiceConnectionPolicy_basic(context),
},
{
ResourceName: "google_network_connectivity_service_connection_policy.default",
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccNetworkConnectivityServiceConnectionPolicy_update(context),
},
{
ResourceName: "google_network_connectivity_service_connection_policy.default",
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccNetworkConnectivityServiceConnectionPolicy_basic(context),
},
{
ResourceName: "google_network_connectivity_service_connection_policy.default",
ImportState: true,
ImportStateVerify: true,
},
},
})
}

func testAccNetworkConnectivityServiceConnectionPolicy_basic(context map[string]interface{}) string {
return acctest.Nprintf(`
resource "google_compute_network" "producer_net" {
name = "%{networkProducerName}"
auto_create_subnetworks = false
}

resource "google_compute_subnetwork" "producer_subnet" {
name = "%{subnetworkProducerName1}"
ip_cidr_range = "10.0.0.0/16"
region = "us-central1"
network = google_compute_network.producer_net.id
}

resource "google_network_connectivity_service_connection_policy" "default" {
name = "%{serviceConnectionPolicyName}"
location = "us-central1"
service_class = "gcp-memorystore-redis"
network = google_compute_network.producer_net.id
psc_config {
subnetworks = [google_compute_subnetwork.producer_subnet.id]
limit = 2
}
}
`, context)
}

func testAccNetworkConnectivityServiceConnectionPolicy_update(context map[string]interface{}) string {
return acctest.Nprintf(`
resource "google_compute_network" "producer_net" {
name = "%{networkProducerName}"
auto_create_subnetworks = false
}

resource "google_compute_subnetwork" "producer_subnet1" {
name = "%{subnetworkProducerName2}"
ip_cidr_range = "10.1.0.0/16"
region = "us-central1"
network = google_compute_network.producer_net.id
}

resource "google_network_connectivity_service_connection_policy" "default" {
name = "%{serviceConnectionPolicyName}"
location = "us-central1"
service_class = "gcp-memorystore-redis"
network = google_compute_network.producer_net.id
psc_config {
subnetworks = [google_compute_subnetwork.producer_subnet1.id]
limit = 4
}
labels = {
foo = "bar"
}
}
`, context)
}
Original file line number Diff line number Diff line change
@@ -0,0 +1,124 @@
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0

// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package google

import (
"fmt"
"strings"
"testing"

"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"

"github.com/hashicorp/terraform-provider-google/google/acctest"
"github.com/hashicorp/terraform-provider-google/google/tpgresource"
transport_tpg "github.com/hashicorp/terraform-provider-google/google/transport"
)

func TestAccNetworkConnectivityServiceConnectionPolicy_networkConnectivityPolicyBasicExample(t *testing.T) {
t.Parallel()

context := map[string]interface{}{
"service_class_name": "gcp-memorystore-redis",
"random_suffix": acctest.RandString(t, 10),
}

acctest.VcrTest(t, resource.TestCase{
PreCheck: func() { acctest.AccTestPreCheck(t) },
ProtoV5ProviderFactories: acctest.ProtoV5ProviderFactories(t),
CheckDestroy: testAccCheckNetworkConnectivityServiceConnectionPolicyDestroyProducer(t),
Steps: []resource.TestStep{
{
Config: testAccNetworkConnectivityServiceConnectionPolicy_networkConnectivityPolicyBasicExample(context),
},
{
ResourceName: "google_network_connectivity_service_connection_policy.default",
ImportState: true,
ImportStateVerify: true,
ImportStateVerifyIgnore: []string{"name", "location"},
},
},
})
}

func testAccNetworkConnectivityServiceConnectionPolicy_networkConnectivityPolicyBasicExample(context map[string]interface{}) string {
return acctest.Nprintf(`
resource "google_compute_network" "producer_net" {
name = "tf-test-producer-net%{random_suffix}"
auto_create_subnetworks = false
}

resource "google_compute_subnetwork" "producer_subnet" {
name = "tf-test-producer-subnet%{random_suffix}"
ip_cidr_range = "10.0.0.0/16"
region = "us-central1"
network = google_compute_network.producer_net.id
}

resource "google_network_connectivity_service_connection_policy" "default" {
name = "tf-test-my-network-connectivity-policy%{random_suffix}"
location = "us-central1"
service_class = "%{service_class_name}"
description = "my basic service connection policy"
network = google_compute_network.producer_net.id
psc_config {
subnetworks = [google_compute_subnetwork.producer_subnet.id]
limit = 2
}
}
`, context)
}

func testAccCheckNetworkConnectivityServiceConnectionPolicyDestroyProducer(t *testing.T) func(s *terraform.State) error {
return func(s *terraform.State) error {
for name, rs := range s.RootModule().Resources {
if rs.Type != "google_network_connectivity_service_connection_policy" {
continue
}
if strings.HasPrefix(name, "data.") {
continue
}

config := acctest.GoogleProviderConfig(t)

url, err := tpgresource.ReplaceVarsForTest(config, rs, "{{NetworkConnectivityBasePath}}projects/{{project}}/locations/{{location}}/serviceConnectionPolicies/{{name}}")
if err != nil {
return err
}

billingProject := ""

if config.BillingProject != "" {
billingProject = config.BillingProject
}

_, err = transport_tpg.SendRequest(transport_tpg.SendRequestOptions{
Config: config,
Method: "GET",
Project: billingProject,
RawURL: url,
UserAgent: config.UserAgent,
})
if err == nil {
return fmt.Errorf("NetworkConnectivityServiceConnectionPolicy still exists at %s", url)
}
}

return nil
}
}
Loading