mirror of
https://github.com/letic/terraform-provider-google.git
synced 2024-10-05 02:01:05 +00:00
42cc44efe2
* Add IAM support for pubsub topic * Fix resource name * Add update test for iam_policy resource * Standardize policy conversion function * Standardize policy conversion function all resources
105 lines
2.7 KiB
Go
105 lines
2.7 KiB
Go
package google
|
|
|
|
import (
|
|
"fmt"
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
"google.golang.org/api/cloudkms/v1"
|
|
"google.golang.org/api/cloudresourcemanager/v1"
|
|
)
|
|
|
|
var IamKmsKeyRingSchema = map[string]*schema.Schema{
|
|
"key_ring_id": {
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
}
|
|
|
|
type KmsKeyRingIamUpdater struct {
|
|
resourceId string
|
|
Config *Config
|
|
}
|
|
|
|
func NewKmsKeyRingIamUpdater(d *schema.ResourceData, config *Config) (ResourceIamUpdater, error) {
|
|
keyRing := d.Get("key_ring_id").(string)
|
|
keyRingId, err := parseKmsKeyRingId(keyRing, config)
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error parsing resource ID for for %s: %s", keyRing, err)
|
|
}
|
|
|
|
return &KmsKeyRingIamUpdater{
|
|
resourceId: keyRingId.keyRingId(),
|
|
Config: config,
|
|
}, nil
|
|
}
|
|
|
|
func KeyRingIdParseFunc(d *schema.ResourceData, _ *Config) error {
|
|
d.Set("key_ring_id", d.Id())
|
|
return nil
|
|
}
|
|
|
|
func (u *KmsKeyRingIamUpdater) GetResourceIamPolicy() (*cloudresourcemanager.Policy, error) {
|
|
p, err := u.Config.clientKms.Projects.Locations.KeyRings.GetIamPolicy(u.resourceId).Do()
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error retrieving IAM policy for %s: %s", u.DescribeResource(), err)
|
|
}
|
|
|
|
cloudResourcePolicy, err := kmsToResourceManagerPolicy(p)
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Invalid IAM policy for %s: %s", u.DescribeResource(), err)
|
|
}
|
|
|
|
return cloudResourcePolicy, nil
|
|
}
|
|
|
|
func (u *KmsKeyRingIamUpdater) SetResourceIamPolicy(policy *cloudresourcemanager.Policy) error {
|
|
kmsPolicy, err := resourceManagerToKmsPolicy(policy)
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("Invalid IAM policy for %s: %s", u.DescribeResource(), err)
|
|
}
|
|
|
|
_, err = u.Config.clientKms.Projects.Locations.KeyRings.SetIamPolicy(u.resourceId, &cloudkms.SetIamPolicyRequest{
|
|
Policy: kmsPolicy,
|
|
}).Do()
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("Error setting IAM policy for %s: %s", u.DescribeResource(), err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func (u *KmsKeyRingIamUpdater) GetResourceId() string {
|
|
return u.resourceId
|
|
}
|
|
|
|
func (u *KmsKeyRingIamUpdater) GetMutexKey() string {
|
|
return fmt.Sprintf("iam-kms-key-ring-%s", u.resourceId)
|
|
}
|
|
|
|
func (u *KmsKeyRingIamUpdater) DescribeResource() string {
|
|
return fmt.Sprintf("KMS KeyRing %q", u.resourceId)
|
|
}
|
|
|
|
func resourceManagerToKmsPolicy(p *cloudresourcemanager.Policy) (*cloudkms.Policy, error) {
|
|
out := &cloudkms.Policy{}
|
|
err := Convert(p, out)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Cannot convert a v1 policy to a kms policy: %s", err)
|
|
}
|
|
return out, nil
|
|
}
|
|
|
|
func kmsToResourceManagerPolicy(p *cloudkms.Policy) (*cloudresourcemanager.Policy, error) {
|
|
out := &cloudresourcemanager.Policy{}
|
|
err := Convert(p, out)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Cannot convert a kms policy to a v1 policy: %s", err)
|
|
}
|
|
return out, nil
|
|
}
|