// ---------------------------------------------------------------------------- // // *** AUTO GENERATED CODE *** AUTO GENERATED CODE *** // // ---------------------------------------------------------------------------- // // This file is automatically generated by Magic Modules and manual // changes will be clobbered when the file is regenerated. // // Please read more about how to change this file in // .github/CONTRIBUTING.md. // // ---------------------------------------------------------------------------- package google import ( "bytes" "fmt" "log" "reflect" "strconv" "time" "github.com/hashicorp/errwrap" "github.com/hashicorp/terraform/helper/hashcode" "github.com/hashicorp/terraform/helper/schema" "github.com/hashicorp/terraform/helper/validation" "google.golang.org/api/compute/v1" ) func resourceGoogleComputeBackendServiceBackendHash(v interface{}) int { if v == nil { return 0 } var buf bytes.Buffer m := v.(map[string]interface{}) log.Printf("[DEBUG] hashing %v", m) if group, err := getRelativePath(m["group"].(string)); err != nil { log.Printf("[WARN] Error on retrieving relative path of instance group: %s", err) buf.WriteString(fmt.Sprintf("%s-", m["group"].(string))) } else { buf.WriteString(fmt.Sprintf("%s-", group)) } if v, ok := m["balancing_mode"]; ok { if v == nil { v = "" } buf.WriteString(fmt.Sprintf("%v-", v)) } if v, ok := m["capacity_scaler"]; ok { if v == nil { v = 0.0 } // floats can't be added to the hash with %v as the other values are because // %v and %f are not equivalent strings so this must remain as a float so that // the hash function doesn't return something else. buf.WriteString(fmt.Sprintf("%f-", v.(float64))) } if v, ok := m["description"]; ok { if v == nil { v = "" } log.Printf("[DEBUG] writing description %s", v) buf.WriteString(fmt.Sprintf("%v-", v)) } if v, ok := m["max_rate"]; ok { if v == nil { v = 0 } buf.WriteString(fmt.Sprintf("%v-", v)) } if v, ok := m["max_rate_per_instance"]; ok { if v == nil { v = 0.0 } // floats can't be added to the hash with %v as the other values are because // %v and %f are not equivalent strings so this must remain as a float so that // the hash function doesn't return something else. buf.WriteString(fmt.Sprintf("%f-", v.(float64))) } if v, ok := m["max_connections"]; ok { if v == nil { v = 0 } buf.WriteString(fmt.Sprintf("%v-", v)) } if v, ok := m["max_connections_per_instance"]; ok { if v == nil { v = 0 } buf.WriteString(fmt.Sprintf("%v-", v)) } if v, ok := m["max_rate_per_instance"]; ok { if v == nil { v = 0.0 } // floats can't be added to the hash with %v as the other values are because // %v and %f are not equivalent strings so this must remain as a float so that // the hash function doesn't return something else. buf.WriteString(fmt.Sprintf("%f-", v.(float64))) } log.Printf("[DEBUG] computed hash value of %v from %v", hashcode.String(buf.String()), buf.String()) return hashcode.String(buf.String()) } func resourceComputeBackendService() *schema.Resource { return &schema.Resource{ Create: resourceComputeBackendServiceCreate, Read: resourceComputeBackendServiceRead, Update: resourceComputeBackendServiceUpdate, Delete: resourceComputeBackendServiceDelete, Importer: &schema.ResourceImporter{ State: resourceComputeBackendServiceImport, }, Timeouts: &schema.ResourceTimeout{ Create: schema.DefaultTimeout(240 * time.Second), Update: schema.DefaultTimeout(240 * time.Second), Delete: schema.DefaultTimeout(240 * time.Second), }, SchemaVersion: 1, Schema: map[string]*schema.Schema{ "health_checks": { Type: schema.TypeSet, Required: true, MinItems: 1, MaxItems: 1, Elem: &schema.Schema{ Type: schema.TypeString, }, Set: selfLinkRelativePathHash, }, "name": { Type: schema.TypeString, Required: true, ForceNew: true, }, "affinity_cookie_ttl_sec": { Type: schema.TypeInt, Optional: true, }, "backend": { Type: schema.TypeSet, Optional: true, Elem: computeBackendServiceBackendSchema(), Set: resourceGoogleComputeBackendServiceBackendHash, }, "cdn_policy": { Type: schema.TypeList, Computed: true, Optional: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "cache_key_policy": { Type: schema.TypeList, Optional: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "include_host": { Type: schema.TypeBool, Optional: true, }, "include_protocol": { Type: schema.TypeBool, Optional: true, }, "include_query_string": { Type: schema.TypeBool, Optional: true, }, "query_string_blacklist": { Type: schema.TypeSet, Optional: true, Elem: &schema.Schema{ Type: schema.TypeString, }, Set: schema.HashString, }, "query_string_whitelist": { Type: schema.TypeSet, Optional: true, Elem: &schema.Schema{ Type: schema.TypeString, }, Set: schema.HashString, }, }, }, }, "signed_url_cache_max_age_sec": { Type: schema.TypeInt, Optional: true, Default: 3600, }, }, }, }, "connection_draining_timeout_sec": { Type: schema.TypeInt, Optional: true, Default: 300, }, "description": { Type: schema.TypeString, Optional: true, }, "enable_cdn": { Type: schema.TypeBool, Optional: true, }, "iap": { Type: schema.TypeList, Optional: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "oauth2_client_id": { Type: schema.TypeString, Required: true, }, "oauth2_client_secret": { Type: schema.TypeString, Required: true, Sensitive: true, }, "oauth2_client_secret_sha256": { Type: schema.TypeString, Computed: true, Sensitive: true, }, }, }, }, "load_balancing_scheme": { Type: schema.TypeString, Optional: true, ForceNew: true, ValidateFunc: validation.StringInSlice([]string{"EXTERNAL", ""}, false), Default: "EXTERNAL", }, "port_name": { Type: schema.TypeString, Computed: true, Optional: true, }, "protocol": { Type: schema.TypeString, Computed: true, Optional: true, ValidateFunc: validation.StringInSlice([]string{"HTTP", "HTTPS", "HTTP2", "TCP", "SSL", ""}, false), }, "security_policy": { Type: schema.TypeString, Optional: true, DiffSuppressFunc: compareSelfLinkOrResourceName, }, "session_affinity": { Type: schema.TypeString, Computed: true, Optional: true, ValidateFunc: validation.StringInSlice([]string{"NONE", "CLIENT_IP", "GENERATED_COOKIE", ""}, false), }, "timeout_sec": { Type: schema.TypeInt, Computed: true, Optional: true, }, "creation_timestamp": { Type: schema.TypeString, Computed: true, }, "fingerprint": { Type: schema.TypeString, Computed: true, }, "project": { Type: schema.TypeString, Optional: true, Computed: true, ForceNew: true, }, "self_link": { Type: schema.TypeString, Computed: true, }, }, } } func computeBackendServiceBackendSchema() *schema.Resource { return &schema.Resource{ Schema: map[string]*schema.Schema{ "balancing_mode": { Type: schema.TypeString, Optional: true, ValidateFunc: validation.StringInSlice([]string{"UTILIZATION", "RATE", "CONNECTION", ""}, false), Default: "UTILIZATION", }, "capacity_scaler": { Type: schema.TypeFloat, Optional: true, Default: 1.0, }, "description": { Type: schema.TypeString, Optional: true, }, "group": { Type: schema.TypeString, Optional: true, DiffSuppressFunc: compareSelfLinkRelativePaths, }, "max_connections": { Type: schema.TypeInt, Optional: true, }, "max_connections_per_instance": { Type: schema.TypeInt, Optional: true, }, "max_rate": { Type: schema.TypeInt, Optional: true, }, "max_rate_per_instance": { Type: schema.TypeFloat, Optional: true, }, "max_utilization": { Type: schema.TypeFloat, Optional: true, Default: 0.8, }, }, } } func resourceComputeBackendServiceCreate(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) obj := make(map[string]interface{}) affinityCookieTtlSecProp, err := expandComputeBackendServiceAffinityCookieTtlSec(d.Get("affinity_cookie_ttl_sec"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("affinity_cookie_ttl_sec"); !isEmptyValue(reflect.ValueOf(affinityCookieTtlSecProp)) && (ok || !reflect.DeepEqual(v, affinityCookieTtlSecProp)) { obj["affinityCookieTtlSec"] = affinityCookieTtlSecProp } backendsProp, err := expandComputeBackendServiceBackend(d.Get("backend"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("backend"); !isEmptyValue(reflect.ValueOf(backendsProp)) && (ok || !reflect.DeepEqual(v, backendsProp)) { obj["backends"] = backendsProp } cdnPolicyProp, err := expandComputeBackendServiceCdnPolicy(d.Get("cdn_policy"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("cdn_policy"); !isEmptyValue(reflect.ValueOf(cdnPolicyProp)) && (ok || !reflect.DeepEqual(v, cdnPolicyProp)) { obj["cdnPolicy"] = cdnPolicyProp } connectionDrainingProp, err := expandComputeBackendServiceConnectionDraining(d, config) if err != nil { return err } else if !isEmptyValue(reflect.ValueOf(connectionDrainingProp)) { obj["connectionDraining"] = connectionDrainingProp } fingerprintProp, err := expandComputeBackendServiceFingerprint(d.Get("fingerprint"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("fingerprint"); !isEmptyValue(reflect.ValueOf(fingerprintProp)) && (ok || !reflect.DeepEqual(v, fingerprintProp)) { obj["fingerprint"] = fingerprintProp } descriptionProp, err := expandComputeBackendServiceDescription(d.Get("description"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("description"); !isEmptyValue(reflect.ValueOf(descriptionProp)) && (ok || !reflect.DeepEqual(v, descriptionProp)) { obj["description"] = descriptionProp } enableCDNProp, err := expandComputeBackendServiceEnableCDN(d.Get("enable_cdn"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("enable_cdn"); !isEmptyValue(reflect.ValueOf(enableCDNProp)) && (ok || !reflect.DeepEqual(v, enableCDNProp)) { obj["enableCDN"] = enableCDNProp } healthChecksProp, err := expandComputeBackendServiceHealthChecks(d.Get("health_checks"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("health_checks"); !isEmptyValue(reflect.ValueOf(healthChecksProp)) && (ok || !reflect.DeepEqual(v, healthChecksProp)) { obj["healthChecks"] = healthChecksProp } iapProp, err := expandComputeBackendServiceIap(d.Get("iap"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("iap"); ok || !reflect.DeepEqual(v, iapProp) { obj["iap"] = iapProp } loadBalancingSchemeProp, err := expandComputeBackendServiceLoadBalancingScheme(d.Get("load_balancing_scheme"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("load_balancing_scheme"); !isEmptyValue(reflect.ValueOf(loadBalancingSchemeProp)) && (ok || !reflect.DeepEqual(v, loadBalancingSchemeProp)) { obj["loadBalancingScheme"] = loadBalancingSchemeProp } nameProp, err := expandComputeBackendServiceName(d.Get("name"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("name"); !isEmptyValue(reflect.ValueOf(nameProp)) && (ok || !reflect.DeepEqual(v, nameProp)) { obj["name"] = nameProp } portNameProp, err := expandComputeBackendServicePortName(d.Get("port_name"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("port_name"); !isEmptyValue(reflect.ValueOf(portNameProp)) && (ok || !reflect.DeepEqual(v, portNameProp)) { obj["portName"] = portNameProp } protocolProp, err := expandComputeBackendServiceProtocol(d.Get("protocol"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("protocol"); !isEmptyValue(reflect.ValueOf(protocolProp)) && (ok || !reflect.DeepEqual(v, protocolProp)) { obj["protocol"] = protocolProp } securityPolicyProp, err := expandComputeBackendServiceSecurityPolicy(d.Get("security_policy"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("security_policy"); !isEmptyValue(reflect.ValueOf(securityPolicyProp)) && (ok || !reflect.DeepEqual(v, securityPolicyProp)) { obj["securityPolicy"] = securityPolicyProp } sessionAffinityProp, err := expandComputeBackendServiceSessionAffinity(d.Get("session_affinity"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("session_affinity"); !isEmptyValue(reflect.ValueOf(sessionAffinityProp)) && (ok || !reflect.DeepEqual(v, sessionAffinityProp)) { obj["sessionAffinity"] = sessionAffinityProp } timeoutSecProp, err := expandComputeBackendServiceTimeoutSec(d.Get("timeout_sec"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("timeout_sec"); !isEmptyValue(reflect.ValueOf(timeoutSecProp)) && (ok || !reflect.DeepEqual(v, timeoutSecProp)) { obj["timeoutSec"] = timeoutSecProp } obj, err = resourceComputeBackendServiceEncoder(d, meta, obj) if err != nil { return err } url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/global/backendServices") if err != nil { return err } log.Printf("[DEBUG] Creating new BackendService: %#v", obj) res, err := sendRequestWithTimeout(config, "POST", url, obj, d.Timeout(schema.TimeoutCreate)) if err != nil { return fmt.Errorf("Error creating BackendService: %s", err) } // Store the ID now id, err := replaceVars(d, config, "{{name}}") if err != nil { return fmt.Errorf("Error constructing id: %s", err) } d.SetId(id) project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } waitErr := computeOperationWaitTime( config.clientCompute, op, project, "Creating BackendService", int(d.Timeout(schema.TimeoutCreate).Minutes())) if waitErr != nil { // The resource didn't actually create d.SetId("") return fmt.Errorf("Error waiting to create BackendService: %s", waitErr) } log.Printf("[DEBUG] Finished creating BackendService %q: %#v", d.Id(), res) // security_policy isn't set by Create / Update if v, ok := d.GetOk("security_policy"); ok { pol, err := ParseSecurityPolicyFieldValue(v.(string), d, config) if err != nil { return errwrap.Wrapf("Error parsing Backend Service security policy: {{err}}", err) } op, err := config.clientCompute.BackendServices.SetSecurityPolicy( project, obj["name"].(string), &compute.SecurityPolicyReference{ SecurityPolicy: pol.RelativeLink(), }).Do() if err != nil { return errwrap.Wrapf("Error setting Backend Service security policy: {{err}}", err) } waitErr := computeSharedOperationWait(config.clientCompute, op, project, "Setting Backend Service Security Policy") if waitErr != nil { return waitErr } } return resourceComputeBackendServiceRead(d, meta) } func resourceComputeBackendServiceRead(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/global/backendServices/{{name}}") if err != nil { return err } res, err := sendRequest(config, "GET", url, nil) if err != nil { return handleNotFoundError(err, d, fmt.Sprintf("ComputeBackendService %q", d.Id())) } res, err = resourceComputeBackendServiceDecoder(d, meta, res) if err != nil { return err } project, err := getProject(d, config) if err != nil { return err } if err := d.Set("project", project); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("affinity_cookie_ttl_sec", flattenComputeBackendServiceAffinityCookieTtlSec(res["affinityCookieTtlSec"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("backend", flattenComputeBackendServiceBackend(res["backends"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("cdn_policy", flattenComputeBackendServiceCdnPolicy(res["cdnPolicy"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if v, ok := res["connectionDraining"].(map[string]interface{}); res["connectionDraining"] != nil && ok { if err := d.Set("connection_draining_timeout_sec", flattenComputeBackendServiceConnectionDrainingConnection_draining_timeout_sec(v["drainingTimeoutSec"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } } else { d.Set("connection_draining_timeout_sec", nil) } if err := d.Set("creation_timestamp", flattenComputeBackendServiceCreationTimestamp(res["creationTimestamp"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("fingerprint", flattenComputeBackendServiceFingerprint(res["fingerprint"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("description", flattenComputeBackendServiceDescription(res["description"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("enable_cdn", flattenComputeBackendServiceEnableCDN(res["enableCDN"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("health_checks", flattenComputeBackendServiceHealthChecks(res["healthChecks"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("iap", flattenComputeBackendServiceIap(res["iap"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("load_balancing_scheme", flattenComputeBackendServiceLoadBalancingScheme(res["loadBalancingScheme"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("name", flattenComputeBackendServiceName(res["name"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("port_name", flattenComputeBackendServicePortName(res["portName"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("protocol", flattenComputeBackendServiceProtocol(res["protocol"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("security_policy", flattenComputeBackendServiceSecurityPolicy(res["securityPolicy"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("session_affinity", flattenComputeBackendServiceSessionAffinity(res["sessionAffinity"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("timeout_sec", flattenComputeBackendServiceTimeoutSec(res["timeoutSec"], d)); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } if err := d.Set("self_link", ConvertSelfLinkToV1(res["selfLink"].(string))); err != nil { return fmt.Errorf("Error reading BackendService: %s", err) } return nil } func resourceComputeBackendServiceUpdate(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) obj := make(map[string]interface{}) affinityCookieTtlSecProp, err := expandComputeBackendServiceAffinityCookieTtlSec(d.Get("affinity_cookie_ttl_sec"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("affinity_cookie_ttl_sec"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, affinityCookieTtlSecProp)) { obj["affinityCookieTtlSec"] = affinityCookieTtlSecProp } backendsProp, err := expandComputeBackendServiceBackend(d.Get("backend"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("backend"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, backendsProp)) { obj["backends"] = backendsProp } cdnPolicyProp, err := expandComputeBackendServiceCdnPolicy(d.Get("cdn_policy"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("cdn_policy"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, cdnPolicyProp)) { obj["cdnPolicy"] = cdnPolicyProp } connectionDrainingProp, err := expandComputeBackendServiceConnectionDraining(d, config) if err != nil { return err } else if !isEmptyValue(reflect.ValueOf(connectionDrainingProp)) { obj["connectionDraining"] = connectionDrainingProp } fingerprintProp, err := expandComputeBackendServiceFingerprint(d.Get("fingerprint"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("fingerprint"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, fingerprintProp)) { obj["fingerprint"] = fingerprintProp } descriptionProp, err := expandComputeBackendServiceDescription(d.Get("description"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("description"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, descriptionProp)) { obj["description"] = descriptionProp } enableCDNProp, err := expandComputeBackendServiceEnableCDN(d.Get("enable_cdn"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("enable_cdn"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, enableCDNProp)) { obj["enableCDN"] = enableCDNProp } healthChecksProp, err := expandComputeBackendServiceHealthChecks(d.Get("health_checks"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("health_checks"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, healthChecksProp)) { obj["healthChecks"] = healthChecksProp } iapProp, err := expandComputeBackendServiceIap(d.Get("iap"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("iap"); ok || !reflect.DeepEqual(v, iapProp) { obj["iap"] = iapProp } loadBalancingSchemeProp, err := expandComputeBackendServiceLoadBalancingScheme(d.Get("load_balancing_scheme"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("load_balancing_scheme"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, loadBalancingSchemeProp)) { obj["loadBalancingScheme"] = loadBalancingSchemeProp } nameProp, err := expandComputeBackendServiceName(d.Get("name"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("name"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, nameProp)) { obj["name"] = nameProp } portNameProp, err := expandComputeBackendServicePortName(d.Get("port_name"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("port_name"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, portNameProp)) { obj["portName"] = portNameProp } protocolProp, err := expandComputeBackendServiceProtocol(d.Get("protocol"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("protocol"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, protocolProp)) { obj["protocol"] = protocolProp } securityPolicyProp, err := expandComputeBackendServiceSecurityPolicy(d.Get("security_policy"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("security_policy"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, securityPolicyProp)) { obj["securityPolicy"] = securityPolicyProp } sessionAffinityProp, err := expandComputeBackendServiceSessionAffinity(d.Get("session_affinity"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("session_affinity"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, sessionAffinityProp)) { obj["sessionAffinity"] = sessionAffinityProp } timeoutSecProp, err := expandComputeBackendServiceTimeoutSec(d.Get("timeout_sec"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("timeout_sec"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, timeoutSecProp)) { obj["timeoutSec"] = timeoutSecProp } obj, err = resourceComputeBackendServiceEncoder(d, meta, obj) if err != nil { return err } url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/global/backendServices/{{name}}") if err != nil { return err } log.Printf("[DEBUG] Updating BackendService %q: %#v", d.Id(), obj) res, err := sendRequestWithTimeout(config, "PUT", url, obj, d.Timeout(schema.TimeoutUpdate)) if err != nil { return fmt.Errorf("Error updating BackendService %q: %s", d.Id(), err) } project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } err = computeOperationWaitTime( config.clientCompute, op, project, "Updating BackendService", int(d.Timeout(schema.TimeoutUpdate).Minutes())) if err != nil { return err } // security_policy isn't set by Create / Update if v, ok := d.GetOk("security_policy"); ok { pol, err := ParseSecurityPolicyFieldValue(v.(string), d, config) if err != nil { return errwrap.Wrapf("Error parsing Backend Service security policy: {{err}}", err) } op, err := config.clientCompute.BackendServices.SetSecurityPolicy( project, obj["name"].(string), &compute.SecurityPolicyReference{ SecurityPolicy: pol.RelativeLink(), }).Do() if err != nil { return errwrap.Wrapf("Error setting Backend Service security policy: {{err}}", err) } waitErr := computeSharedOperationWait(config.clientCompute, op, project, "Setting Backend Service Security Policy") if waitErr != nil { return waitErr } } return resourceComputeBackendServiceRead(d, meta) } func resourceComputeBackendServiceDelete(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/global/backendServices/{{name}}") if err != nil { return err } var obj map[string]interface{} log.Printf("[DEBUG] Deleting BackendService %q", d.Id()) res, err := sendRequestWithTimeout(config, "DELETE", url, obj, d.Timeout(schema.TimeoutDelete)) if err != nil { return handleNotFoundError(err, d, "BackendService") } project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } err = computeOperationWaitTime( config.clientCompute, op, project, "Deleting BackendService", int(d.Timeout(schema.TimeoutDelete).Minutes())) if err != nil { return err } log.Printf("[DEBUG] Finished deleting BackendService %q: %#v", d.Id(), res) return nil } func resourceComputeBackendServiceImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) { config := meta.(*Config) if err := parseImportId([]string{"projects/(?P[^/]+)/global/backendServices/(?P[^/]+)", "(?P[^/]+)/(?P[^/]+)", "(?P[^/]+)"}, d, config); err != nil { return nil, err } // Replace import id for the resource id id, err := replaceVars(d, config, "{{name}}") if err != nil { return nil, fmt.Errorf("Error constructing id: %s", err) } d.SetId(id) return []*schema.ResourceData{d}, nil } func flattenComputeBackendServiceAffinityCookieTtlSec(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceBackend(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } l := v.([]interface{}) transformed := schema.NewSet(resourceGoogleComputeBackendServiceBackendHash, []interface{}{}) for _, raw := range l { original := raw.(map[string]interface{}) if len(original) < 1 { // Do not include empty json objects coming back from the api continue } transformed.Add(map[string]interface{}{ "balancing_mode": flattenComputeBackendServiceBackendBalancingMode(original["balancingMode"], d), "capacity_scaler": flattenComputeBackendServiceBackendCapacityScaler(original["capacityScaler"], d), "description": flattenComputeBackendServiceBackendDescription(original["description"], d), "group": flattenComputeBackendServiceBackendGroup(original["group"], d), "max_connections": flattenComputeBackendServiceBackendMaxConnections(original["maxConnections"], d), "max_connections_per_instance": flattenComputeBackendServiceBackendMaxConnectionsPerInstance(original["maxConnectionsPerInstance"], d), "max_rate": flattenComputeBackendServiceBackendMaxRate(original["maxRate"], d), "max_rate_per_instance": flattenComputeBackendServiceBackendMaxRatePerInstance(original["maxRatePerInstance"], d), "max_utilization": flattenComputeBackendServiceBackendMaxUtilization(original["maxUtilization"], d), }) } return transformed } func flattenComputeBackendServiceBackendBalancingMode(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceBackendCapacityScaler(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceBackendDescription(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceBackendGroup(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return ConvertSelfLinkToV1(v.(string)) } func flattenComputeBackendServiceBackendMaxConnections(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceBackendMaxConnectionsPerInstance(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceBackendMaxRate(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceBackendMaxRatePerInstance(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceBackendMaxUtilization(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceCdnPolicy(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["cache_key_policy"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicy(original["cacheKeyPolicy"], d) transformed["signed_url_cache_max_age_sec"] = flattenComputeBackendServiceCdnPolicySignedUrlCacheMaxAgeSec(original["signedUrlCacheMaxAgeSec"], d) return []interface{}{transformed} } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicy(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["include_host"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeHost(original["includeHost"], d) transformed["include_protocol"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeProtocol(original["includeProtocol"], d) transformed["include_query_string"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeQueryString(original["includeQueryString"], d) transformed["query_string_blacklist"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringBlacklist(original["queryStringBlacklist"], d) transformed["query_string_whitelist"] = flattenComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringWhitelist(original["queryStringWhitelist"], d) return []interface{}{transformed} } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeHost(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeProtocol(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeQueryString(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringBlacklist(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return schema.NewSet(schema.HashString, v.([]interface{})) } func flattenComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringWhitelist(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return schema.NewSet(schema.HashString, v.([]interface{})) } func flattenComputeBackendServiceCdnPolicySignedUrlCacheMaxAgeSec(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceConnectionDrainingConnection_draining_timeout_sec(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeBackendServiceCreationTimestamp(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceFingerprint(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceDescription(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceEnableCDN(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceHealthChecks(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return convertAndMapStringArr(v.([]interface{}), ConvertSelfLinkToV1) } func flattenComputeBackendServiceIap(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["oauth2_client_id"] = flattenComputeBackendServiceIapOauth2ClientId(original["oauth2ClientId"], d) transformed["oauth2_client_secret"] = flattenComputeBackendServiceIapOauth2ClientSecret(original["oauth2ClientSecret"], d) transformed["oauth2_client_secret_sha256"] = flattenComputeBackendServiceIapOauth2ClientSecretSha256(original["oauth2ClientSecretSha256"], d) return []interface{}{transformed} } func flattenComputeBackendServiceIapOauth2ClientId(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceIapOauth2ClientSecret(v interface{}, d *schema.ResourceData) interface{} { return d.Get("iap.0.oauth2_client_secret") } func flattenComputeBackendServiceIapOauth2ClientSecretSha256(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceLoadBalancingScheme(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceName(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServicePortName(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceProtocol(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceSecurityPolicy(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceSessionAffinity(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeBackendServiceTimeoutSec(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func expandComputeBackendServiceAffinityCookieTtlSec(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackend(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { v = v.(*schema.Set).List() l := v.([]interface{}) req := make([]interface{}, 0, len(l)) for _, raw := range l { if raw == nil { continue } original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedBalancingMode, err := expandComputeBackendServiceBackendBalancingMode(original["balancing_mode"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedBalancingMode); val.IsValid() && !isEmptyValue(val) { transformed["balancingMode"] = transformedBalancingMode } transformedCapacityScaler, err := expandComputeBackendServiceBackendCapacityScaler(original["capacity_scaler"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedCapacityScaler); val.IsValid() && !isEmptyValue(val) { transformed["capacityScaler"] = transformedCapacityScaler } transformedDescription, err := expandComputeBackendServiceBackendDescription(original["description"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedDescription); val.IsValid() && !isEmptyValue(val) { transformed["description"] = transformedDescription } transformedGroup, err := expandComputeBackendServiceBackendGroup(original["group"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedGroup); val.IsValid() && !isEmptyValue(val) { transformed["group"] = transformedGroup } transformedMaxConnections, err := expandComputeBackendServiceBackendMaxConnections(original["max_connections"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedMaxConnections); val.IsValid() && !isEmptyValue(val) { transformed["maxConnections"] = transformedMaxConnections } transformedMaxConnectionsPerInstance, err := expandComputeBackendServiceBackendMaxConnectionsPerInstance(original["max_connections_per_instance"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedMaxConnectionsPerInstance); val.IsValid() && !isEmptyValue(val) { transformed["maxConnectionsPerInstance"] = transformedMaxConnectionsPerInstance } transformedMaxRate, err := expandComputeBackendServiceBackendMaxRate(original["max_rate"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedMaxRate); val.IsValid() && !isEmptyValue(val) { transformed["maxRate"] = transformedMaxRate } transformedMaxRatePerInstance, err := expandComputeBackendServiceBackendMaxRatePerInstance(original["max_rate_per_instance"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedMaxRatePerInstance); val.IsValid() && !isEmptyValue(val) { transformed["maxRatePerInstance"] = transformedMaxRatePerInstance } transformedMaxUtilization, err := expandComputeBackendServiceBackendMaxUtilization(original["max_utilization"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedMaxUtilization); val.IsValid() && !isEmptyValue(val) { transformed["maxUtilization"] = transformedMaxUtilization } req = append(req, transformed) } return req, nil } func expandComputeBackendServiceBackendBalancingMode(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendCapacityScaler(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendDescription(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendGroup(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendMaxConnections(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendMaxConnectionsPerInstance(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendMaxRate(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendMaxRatePerInstance(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceBackendMaxUtilization(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceCdnPolicy(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedCacheKeyPolicy, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicy(original["cache_key_policy"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedCacheKeyPolicy); val.IsValid() && !isEmptyValue(val) { transformed["cacheKeyPolicy"] = transformedCacheKeyPolicy } transformedSignedUrlCacheMaxAgeSec, err := expandComputeBackendServiceCdnPolicySignedUrlCacheMaxAgeSec(original["signed_url_cache_max_age_sec"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedSignedUrlCacheMaxAgeSec); val.IsValid() && !isEmptyValue(val) { transformed["signedUrlCacheMaxAgeSec"] = transformedSignedUrlCacheMaxAgeSec } return transformed, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicy(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedIncludeHost, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeHost(original["include_host"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedIncludeHost); val.IsValid() && !isEmptyValue(val) { transformed["includeHost"] = transformedIncludeHost } transformedIncludeProtocol, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeProtocol(original["include_protocol"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedIncludeProtocol); val.IsValid() && !isEmptyValue(val) { transformed["includeProtocol"] = transformedIncludeProtocol } transformedIncludeQueryString, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeQueryString(original["include_query_string"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedIncludeQueryString); val.IsValid() && !isEmptyValue(val) { transformed["includeQueryString"] = transformedIncludeQueryString } transformedQueryStringBlacklist, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringBlacklist(original["query_string_blacklist"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedQueryStringBlacklist); val.IsValid() && !isEmptyValue(val) { transformed["queryStringBlacklist"] = transformedQueryStringBlacklist } transformedQueryStringWhitelist, err := expandComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringWhitelist(original["query_string_whitelist"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedQueryStringWhitelist); val.IsValid() && !isEmptyValue(val) { transformed["queryStringWhitelist"] = transformedQueryStringWhitelist } return transformed, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeHost(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeProtocol(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicyIncludeQueryString(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringBlacklist(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { v = v.(*schema.Set).List() return v, nil } func expandComputeBackendServiceCdnPolicyCacheKeyPolicyQueryStringWhitelist(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { v = v.(*schema.Set).List() return v, nil } func expandComputeBackendServiceCdnPolicySignedUrlCacheMaxAgeSec(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceConnectionDraining(d TerraformResourceData, config *Config) (interface{}, error) { transformed := make(map[string]interface{}) // Note that nesting flattened objects won't work because we don't handle them properly here. transformedConnection_draining_timeout_sec, err := expandComputeBackendServiceConnectionDrainingConnection_draining_timeout_sec(d.Get("connection_draining_timeout_sec"), d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedConnection_draining_timeout_sec); val.IsValid() && !isEmptyValue(val) { transformed["drainingTimeoutSec"] = transformedConnection_draining_timeout_sec } return transformed, nil } func expandComputeBackendServiceConnectionDrainingConnection_draining_timeout_sec(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceFingerprint(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceDescription(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceEnableCDN(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceHealthChecks(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { v = v.(*schema.Set).List() return v, nil } func expandComputeBackendServiceIap(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedOauth2ClientId, err := expandComputeBackendServiceIapOauth2ClientId(original["oauth2_client_id"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedOauth2ClientId); val.IsValid() && !isEmptyValue(val) { transformed["oauth2ClientId"] = transformedOauth2ClientId } transformedOauth2ClientSecret, err := expandComputeBackendServiceIapOauth2ClientSecret(original["oauth2_client_secret"], d, config) if err != nil { return nil, err } else { transformed["oauth2ClientSecret"] = transformedOauth2ClientSecret } transformedOauth2ClientSecretSha256, err := expandComputeBackendServiceIapOauth2ClientSecretSha256(original["oauth2_client_secret_sha256"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedOauth2ClientSecretSha256); val.IsValid() && !isEmptyValue(val) { transformed["oauth2ClientSecretSha256"] = transformedOauth2ClientSecretSha256 } return transformed, nil } func expandComputeBackendServiceIapOauth2ClientId(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceIapOauth2ClientSecret(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceIapOauth2ClientSecretSha256(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceLoadBalancingScheme(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceName(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServicePortName(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceProtocol(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceSecurityPolicy(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceSessionAffinity(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeBackendServiceTimeoutSec(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func resourceComputeBackendServiceEncoder(d *schema.ResourceData, meta interface{}, obj map[string]interface{}) (map[string]interface{}, error) { // The BackendService API's Update / PUT API is badly formed and behaves like // a PATCH field for at least IAP. When sent a `null` `iap` field, the API // doesn't disable an existing field. To work around this, we need to emulate // the old Terraform behaviour of always sending the block (at both update and // create), and force sending each subfield as empty when the block isn't // present in config. iapVal := obj["iap"] if iapVal == nil { data := map[string]interface{}{} data["enabled"] = false data["oauth2ClientId"] = "" data["oauth2ClientSecret"] = "" obj["iap"] = data } else { iap := iapVal.(map[string]interface{}) iap["enabled"] = true obj["iap"] = iap } return obj, nil } func resourceComputeBackendServiceDecoder(d *schema.ResourceData, meta interface{}, res map[string]interface{}) (map[string]interface{}, error) { // We need to pretend IAP isn't there if it's disabled for Terraform to maintain // BC behaviour with the handwritten resource. v, ok := res["iap"] if !ok || v == nil { delete(res, "iap") return res, nil } m := v.(map[string]interface{}) if ok && m["enabled"] == false { delete(res, "iap") } return res, nil }