Skip to content

Commit 8cd88af

Browse files
AccessContextManager - Add dry run service perimeter resource (#10145) (#17614)
[upstream:5b99a9a281b329b84b6a12d3947dcd31896b0a30] Signed-off-by: Modular Magician <[email protected]>
1 parent b59098a commit 8cd88af

7 files changed

+1381
-629
lines changed

.changelog/10145.txt

+6
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
```release-note:enhancement
2+
accesscontextmanager: support managing service perimeter dry run resources outside the perimeter via new resource `google_access_context_manager_service_perimeter_dry_run_resource`
3+
```
4+
```release-note:new-resource
5+
`google_access_context_manager_service_perimeter_dry_run_resource`
6+
```

google/provider/provider_mmv1_resources.go

+613-612
Large diffs are not rendered by default.

google/services/accesscontextmanager/resource_access_context_manager_access_policy_test.go

+16-15
Original file line numberDiff line numberDiff line change
@@ -18,21 +18,22 @@ import (
1818
// can exist, they need to be run serially
1919
func TestAccAccessContextManager(t *testing.T) {
2020
testCases := map[string]func(t *testing.T){
21-
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
22-
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
23-
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
24-
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
25-
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
26-
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
27-
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
28-
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
29-
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
30-
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
31-
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
32-
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
33-
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
34-
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
35-
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
21+
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
22+
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
23+
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
24+
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
25+
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
26+
"service_perimeter_dry_run_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
27+
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
28+
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
29+
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
30+
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
31+
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
32+
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
33+
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
34+
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
35+
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
36+
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
3637
}
3738

3839
for name, tc := range testCases {

0 commit comments

Comments
 (0)