Skip to content

Commit 64525a5

Browse files
AccessContextManager - Add dry run version of Ingress / Egress policy resources. (#10990) (#18994)
[upstream:c3ebf61c3f68fc46c7010f1d91e75fcf237340dc] Signed-off-by: Modular Magician <[email protected]>
1 parent 6b2af66 commit 64525a5

15 files changed

+2599
-108
lines changed

.changelog/10990.txt

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
```release-note:new-resource
2+
`google_access_context_manager_service_perimeter_dry_run_ingress_policy`
3+
```
4+
```release-note:new-resource
5+
`google_access_context_manager_service_perimeter_dry_run_egress_policy`
6+
```

google/provider/provider_mmv1_resources.go

+4-2
Original file line numberDiff line numberDiff line change
@@ -424,9 +424,9 @@ var handwrittenIAMDatasources = map[string]*schema.Resource{
424424
}
425425

426426
// Resources
427-
// Generated resources: 442
427+
// Generated resources: 444
428428
// Generated IAM resources: 252
429-
// Total generated resources: 694
429+
// Total generated resources: 696
430430
var generatedResources = map[string]*schema.Resource{
431431
"google_folder_access_approval_settings": accessapproval.ResourceAccessApprovalFolderSettings(),
432432
"google_organization_access_approval_settings": accessapproval.ResourceAccessApprovalOrganizationSettings(),
@@ -443,6 +443,8 @@ var generatedResources = map[string]*schema.Resource{
443443
"google_access_context_manager_gcp_user_access_binding": accesscontextmanager.ResourceAccessContextManagerGcpUserAccessBinding(),
444444
"google_access_context_manager_ingress_policy": accesscontextmanager.ResourceAccessContextManagerIngressPolicy(),
445445
"google_access_context_manager_service_perimeter": accesscontextmanager.ResourceAccessContextManagerServicePerimeter(),
446+
"google_access_context_manager_service_perimeter_dry_run_egress_policy": accesscontextmanager.ResourceAccessContextManagerServicePerimeterDryRunEgressPolicy(),
447+
"google_access_context_manager_service_perimeter_dry_run_ingress_policy": accesscontextmanager.ResourceAccessContextManagerServicePerimeterDryRunIngressPolicy(),
446448
"google_access_context_manager_service_perimeter_dry_run_resource": accesscontextmanager.ResourceAccessContextManagerServicePerimeterDryRunResource(),
447449
"google_access_context_manager_service_perimeter_egress_policy": accesscontextmanager.ResourceAccessContextManagerServicePerimeterEgressPolicy(),
448450
"google_access_context_manager_service_perimeter_ingress_policy": accesscontextmanager.ResourceAccessContextManagerServicePerimeterIngressPolicy(),

google/services/accesscontextmanager/resource_access_context_manager_access_policy_test.go

+18-16
Original file line numberDiff line numberDiff line change
@@ -18,22 +18,24 @@ import (
1818
// can exist, they need to be run serially
1919
func TestAccAccessContextManager(t *testing.T) {
2020
testCases := map[string]func(t *testing.T){
21-
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
22-
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
23-
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
24-
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
25-
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
26-
"service_perimeter_dry_run_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
27-
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
28-
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
29-
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
30-
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
31-
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
32-
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
33-
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
34-
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
35-
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
36-
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
21+
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
22+
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
23+
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
24+
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
25+
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
26+
"service_perimeter_dry_run_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
27+
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
28+
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
29+
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
30+
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
31+
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
32+
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
33+
"service_perimeter_dry_run_egress_policy": testAccAccessContextManagerServicePerimeterDryRunEgressPolicy_basicTest,
34+
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
35+
"service_perimeter_dry_run_ingress_policy": testAccAccessContextManagerServicePerimeterDryRunIngressPolicy_basicTest,
36+
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
37+
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
38+
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
3739
}
3840

3941
for name, tc := range testCases {

0 commit comments

Comments
 (0)