Rename (unreleased) google_appengine_firewall_rule to google_app_engine_firewall_rule (#2849)

<!-- This change is generated by MagicModules. -->
/cc @rileykarson
This commit is contained in:
The Magician 2019-01-09 16:02:11 -08:00 committed by Riley Karson
parent d38b58be10
commit 766a71aaf6
4 changed files with 18 additions and 15 deletions

View File

@ -17,5 +17,5 @@ package google
import "github.com/hashicorp/terraform/helper/schema" import "github.com/hashicorp/terraform/helper/schema"
var GeneratedAppEngineResourcesMap = map[string]*schema.Resource{ var GeneratedAppEngineResourcesMap = map[string]*schema.Resource{
"google_appengine_firewall_rule": resourceAppEngineFirewallRule(), "google_app_engine_firewall_rule": resourceAppEngineFirewallRule(),
} }

View File

@ -24,7 +24,7 @@ import (
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccAppEngineFirewallRule_appengineFirewallRuleBasicExample(t *testing.T) { func TestAccAppEngineFirewallRule_appEngineFirewallRuleBasicExample(t *testing.T) {
t.Parallel() t.Parallel()
context := map[string]interface{}{ context := map[string]interface{}{
@ -38,10 +38,10 @@ func TestAccAppEngineFirewallRule_appengineFirewallRuleBasicExample(t *testing.T
CheckDestroy: testAccCheckAppEngineFirewallRuleDestroy, CheckDestroy: testAccCheckAppEngineFirewallRuleDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
{ {
Config: testAccAppEngineFirewallRule_appengineFirewallRuleBasicExample(context), Config: testAccAppEngineFirewallRule_appEngineFirewallRuleBasicExample(context),
}, },
{ {
ResourceName: "google_appengine_firewall_rule.rule", ResourceName: "google_app_engine_firewall_rule.rule",
ImportState: true, ImportState: true,
ImportStateVerify: true, ImportStateVerify: true,
}, },
@ -49,7 +49,7 @@ func TestAccAppEngineFirewallRule_appengineFirewallRuleBasicExample(t *testing.T
}) })
} }
func testAccAppEngineFirewallRule_appengineFirewallRuleBasicExample(context map[string]interface{}) string { func testAccAppEngineFirewallRule_appEngineFirewallRuleBasicExample(context map[string]interface{}) string {
return Nprintf(` return Nprintf(`
resource "google_project" "my_project" { resource "google_project" "my_project" {
name = "tf-test-project" name = "tf-test-project"
@ -62,7 +62,7 @@ resource "google_app_engine_application" "app" {
location_id = "us-central" location_id = "us-central"
} }
resource "google_appengine_firewall_rule" "rule" { resource "google_app_engine_firewall_rule" "rule" {
project = "${google_app_engine_application.app.project}" project = "${google_app_engine_application.app.project}"
priority = 1000 priority = 1000
action = "ALLOW" action = "ALLOW"
@ -73,7 +73,7 @@ resource "google_appengine_firewall_rule" "rule" {
func testAccCheckAppEngineFirewallRuleDestroy(s *terraform.State) error { func testAccCheckAppEngineFirewallRuleDestroy(s *terraform.State) error {
for name, rs := range s.RootModule().Resources { for name, rs := range s.RootModule().Resources {
if rs.Type != "google_appengine_firewall_rule" { if rs.Type != "google_app_engine_firewall_rule" {
continue continue
} }
if strings.HasPrefix(name, "data.") { if strings.HasPrefix(name, "data.") {

View File

@ -13,14 +13,14 @@
# #
# ---------------------------------------------------------------------------- # ----------------------------------------------------------------------------
layout: "google" layout: "google"
page_title: "Google: google_appengine_firewall_rule" page_title: "Google: google_app_engine_firewall_rule"
sidebar_current: "docs-google-appengine-firewall-rule" sidebar_current: "docs-google-app-engine-firewall-rule"
description: |- description: |-
A single firewall rule that is evaluated against incoming traffic A single firewall rule that is evaluated against incoming traffic
and provides an action to take on matched requests. and provides an action to take on matched requests.
--- ---
# google\_appengine\_firewall\_rule # google\_app\_engine\_firewall\_rule
A single firewall rule that is evaluated against incoming traffic A single firewall rule that is evaluated against incoming traffic
and provides an action to take on matched requests. and provides an action to take on matched requests.
@ -33,11 +33,11 @@ To get more information about FirewallRule, see:
* [Official Documentation](https://cloud.google.com/appengine/docs/standard/python/creating-firewalls#creating_firewall_rules) * [Official Documentation](https://cloud.google.com/appengine/docs/standard/python/creating-firewalls#creating_firewall_rules)
<div class = "oics-button" style="float: right; margin: 0 0 -15px"> <div class = "oics-button" style="float: right; margin: 0 0 -15px">
<a href="https://console.cloud.google.com/cloudshell/open?cloudshell_git_repo=https%3A%2F%2Fgithub.com%2Fterraform-google-modules%2Fdocs-examples.git&cloudshell_working_dir=appengine_firewall_rule_basic&cloudshell_image=gcr.io%2Fgraphite-cloud-shell-images%2Fterraform%3Alatest&open_in_editor=main.tf&cloudshell_print=.%2Fmotd&cloudshell_tutorial=.%2Ftutorial.md" target="_blank"> <a href="https://console.cloud.google.com/cloudshell/open?cloudshell_git_repo=https%3A%2F%2Fgithub.com%2Fterraform-google-modules%2Fdocs-examples.git&cloudshell_working_dir=app_engine_firewall_rule_basic&cloudshell_image=gcr.io%2Fgraphite-cloud-shell-images%2Fterraform%3Alatest&open_in_editor=main.tf&cloudshell_print=.%2Fmotd&cloudshell_tutorial=.%2Ftutorial.md" target="_blank">
<img alt="Open in Cloud Shell" src="//gstatic.com/cloudssh/images/open-btn.svg" style="max-height: 44px; margin: 32px auto; max-width: 100%;"> <img alt="Open in Cloud Shell" src="//gstatic.com/cloudssh/images/open-btn.svg" style="max-height: 44px; margin: 32px auto; max-width: 100%;">
</a> </a>
</div> </div>
## Example Usage - Appengine Firewall Rule Basic ## Example Usage - App Engine Firewall Rule Basic
```hcl ```hcl
@ -52,7 +52,7 @@ resource "google_app_engine_application" "app" {
location_id = "us-central" location_id = "us-central"
} }
resource "google_appengine_firewall_rule" "rule" { resource "google_app_engine_firewall_rule" "rule" {
project = "${google_app_engine_application.app.project}" project = "${google_app_engine_application.app.project}"
priority = 1000 priority = 1000
action = "ALLOW" action = "ALLOW"
@ -107,8 +107,8 @@ This resource provides the following
FirewallRule can be imported using any of these accepted formats: FirewallRule can be imported using any of these accepted formats:
``` ```
$ terraform import google_appengine_firewall_rule.default {{project}}/{{priority}} $ terraform import google_app_engine_firewall_rule.default {{project}}/{{priority}}
$ terraform import google_appengine_firewall_rule.default {{priority}} $ terraform import google_app_engine_firewall_rule.default {{priority}}
``` ```
-> If you're importing a resource with beta features, make sure to include `-provider=google-beta` -> If you're importing a resource with beta features, make sure to include `-provider=google-beta`

View File

@ -153,6 +153,9 @@
<li<%= sidebar_current("docs-google-app-engine-application") %>> <li<%= sidebar_current("docs-google-app-engine-application") %>>
<a href="/docs/providers/google/r/app_engine_application.html">google_app_engine_application</a> <a href="/docs/providers/google/r/app_engine_application.html">google_app_engine_application</a>
</li> </li>
<li<%= sidebar_current("docs-google-app-engine-firewall-rule") %>>
<a href="/docs/providers/google/r/appengine_firewall_rule.html">google_app_engine_firewall_rule</a>
</li>
</ul> </ul>
</li> </li>