Skip to content

Commit 292ac0e

Browse files
committed
Revert "Add Erase Windows VSS support to compute disk (#3898) (#2434)"
This reverts commit 78e82be.
1 parent 61b814d commit 292ac0e

8 files changed

+9
-185
lines changed

.changelog/3898.txt

Lines changed: 0 additions & 3 deletions
This file was deleted.

google-beta/iam_compute_disk_generated_test.go

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -122,7 +122,7 @@ resource "google_compute_disk" "default" {
122122
name = "tf-test-test-disk%{random_suffix}"
123123
type = "pd-ssd"
124124
zone = "us-central1-a"
125-
image = "debian-9-stretch-v20200805"
125+
image = "debian-8-jessie-v20170523"
126126
labels = {
127127
environment = "dev"
128128
}
@@ -145,7 +145,7 @@ resource "google_compute_disk" "default" {
145145
name = "tf-test-test-disk%{random_suffix}"
146146
type = "pd-ssd"
147147
zone = "us-central1-a"
148-
image = "debian-9-stretch-v20200805"
148+
image = "debian-8-jessie-v20170523"
149149
labels = {
150150
environment = "dev"
151151
}
@@ -174,7 +174,7 @@ resource "google_compute_disk" "default" {
174174
name = "tf-test-test-disk%{random_suffix}"
175175
type = "pd-ssd"
176176
zone = "us-central1-a"
177-
image = "debian-9-stretch-v20200805"
177+
image = "debian-8-jessie-v20170523"
178178
labels = {
179179
environment = "dev"
180180
}
@@ -199,7 +199,7 @@ resource "google_compute_disk" "default" {
199199
name = "tf-test-test-disk%{random_suffix}"
200200
type = "pd-ssd"
201201
zone = "us-central1-a"
202-
image = "debian-9-stretch-v20200805"
202+
image = "debian-8-jessie-v20170523"
203203
labels = {
204204
environment = "dev"
205205
}
@@ -222,7 +222,7 @@ resource "google_compute_disk" "default" {
222222
name = "tf-test-test-disk%{random_suffix}"
223223
type = "pd-ssd"
224224
zone = "us-central1-a"
225-
image = "debian-9-stretch-v20200805"
225+
image = "debian-8-jessie-v20170523"
226226
labels = {
227227
environment = "dev"
228228
}

google-beta/resource_compute_disk.go

Lines changed: 0 additions & 97 deletions
Original file line numberDiff line numberDiff line change
@@ -287,13 +287,6 @@ in the cloud console. Your project's Compute Engine System service account
287287
('service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com') must have
288288
'roles/cloudkms.cryptoKeyEncrypterDecrypter' to use this feature.
289289
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys`,
290-
},
291-
"kms_key_service_account": {
292-
Type: schema.TypeString,
293-
Optional: true,
294-
ForceNew: true,
295-
Description: `The service account used for the encryption request for the given KMS key.
296-
If absent, the Compute Engine Service Agent service account is used.`,
297290
},
298291
"raw_key": {
299292
Type: schema.TypeString,
@@ -312,14 +305,6 @@ encryption key that protects this resource.`,
312305
},
313306
},
314307
},
315-
"erase_windows_vss_signature": {
316-
Type: schema.TypeBool,
317-
Optional: true,
318-
ForceNew: true,
319-
Description: `Specifies whether the disk restored from a source snapshot
320-
should erase Windows specific VSS signature.`,
321-
Default: false,
322-
},
323308
"image": {
324309
Type: schema.TypeString,
325310
Optional: true,
@@ -416,13 +401,6 @@ in the cloud console. Your project's Compute Engine System service account
416401
('service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com') must have
417402
'roles/cloudkms.cryptoKeyEncrypterDecrypter' to use this feature.
418403
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys`,
419-
},
420-
"kms_key_service_account": {
421-
Type: schema.TypeString,
422-
Optional: true,
423-
ForceNew: true,
424-
Description: `The service account used for the encryption request for the given KMS key.
425-
If absent, the Compute Engine Service Agent service account is used.`,
426404
},
427405
"raw_key": {
428406
Type: schema.TypeString,
@@ -460,13 +438,6 @@ in the cloud console. Your project's Compute Engine System service account
460438
('service-{{PROJECT_NUMBER}}@compute-system.iam.gserviceaccount.com') must have
461439
'roles/cloudkms.cryptoKeyEncrypterDecrypter' to use this feature.
462440
See https://cloud.google.com/compute/docs/disks/customer-managed-encryption#encrypt_a_new_persistent_disk_with_your_own_keys`,
463-
},
464-
"kms_key_service_account": {
465-
Type: schema.TypeString,
466-
Optional: true,
467-
ForceNew: true,
468-
Description: `The service account used for the encryption request for the given KMS key.
469-
If absent, the Compute Engine Service Agent service account is used.`,
470441
},
471442
"raw_key": {
472443
Type: schema.TypeString,
@@ -611,12 +582,6 @@ func resourceComputeDiskCreate(d *schema.ResourceData, meta interface{}) error {
611582
} else if v, ok := d.GetOkExists("type"); !isEmptyValue(reflect.ValueOf(typeProp)) && (ok || !reflect.DeepEqual(v, typeProp)) {
612583
obj["type"] = typeProp
613584
}
614-
eraseWindowsVssSignatureProp, err := expandComputeDiskEraseWindowsVssSignature(d.Get("erase_windows_vss_signature"), d, config)
615-
if err != nil {
616-
return err
617-
} else if v, ok := d.GetOkExists("erase_windows_vss_signature"); !isEmptyValue(reflect.ValueOf(eraseWindowsVssSignatureProp)) && (ok || !reflect.DeepEqual(v, eraseWindowsVssSignatureProp)) {
618-
obj["eraseWindowsVssSignature"] = eraseWindowsVssSignatureProp
619-
}
620585
sourceImageProp, err := expandComputeDiskImage(d.Get("image"), d, config)
621586
if err != nil {
622587
return err
@@ -786,9 +751,6 @@ func resourceComputeDiskRead(d *schema.ResourceData, meta interface{}) error {
786751
if err := d.Set("type", flattenComputeDiskType(res["type"], d, config)); err != nil {
787752
return fmt.Errorf("Error reading Disk: %s", err)
788753
}
789-
if err := d.Set("erase_windows_vss_signature", flattenComputeDiskEraseWindowsVssSignature(res["eraseWindowsVssSignature"], d, config)); err != nil {
790-
return fmt.Errorf("Error reading Disk: %s", err)
791-
}
792754
if err := d.Set("image", flattenComputeDiskImage(res["sourceImage"], d, config)); err != nil {
793755
return fmt.Errorf("Error reading Disk: %s", err)
794756
}
@@ -1113,10 +1075,6 @@ func flattenComputeDiskType(v interface{}, d *schema.ResourceData, config *Confi
11131075
return NameFromSelfLinkStateFunc(v)
11141076
}
11151077

1116-
func flattenComputeDiskEraseWindowsVssSignature(v interface{}, d *schema.ResourceData, config *Config) interface{} {
1117-
return v
1118-
}
1119-
11201078
func flattenComputeDiskImage(v interface{}, d *schema.ResourceData, config *Config) interface{} {
11211079
return v
11221080
}
@@ -1150,8 +1108,6 @@ func flattenComputeDiskSourceImageEncryptionKey(v interface{}, d *schema.Resourc
11501108
flattenComputeDiskSourceImageEncryptionKeySha256(original["sha256"], d, config)
11511109
transformed["kms_key_self_link"] =
11521110
flattenComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d, config)
1153-
transformed["kms_key_service_account"] =
1154-
flattenComputeDiskSourceImageEncryptionKeyKmsKeyServiceAccount(original["kmsKeyServiceAccount"], d, config)
11551111
return []interface{}{transformed}
11561112
}
11571113
func flattenComputeDiskSourceImageEncryptionKeyRawKey(v interface{}, d *schema.ResourceData, config *Config) interface{} {
@@ -1166,10 +1122,6 @@ func flattenComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(v interface{}, d *
11661122
return v
11671123
}
11681124

1169-
func flattenComputeDiskSourceImageEncryptionKeyKmsKeyServiceAccount(v interface{}, d *schema.ResourceData, config *Config) interface{} {
1170-
return v
1171-
}
1172-
11731125
func flattenComputeDiskSourceImageId(v interface{}, d *schema.ResourceData, config *Config) interface{} {
11741126
return v
11751127
}
@@ -1189,8 +1141,6 @@ func flattenComputeDiskDiskEncryptionKey(v interface{}, d *schema.ResourceData,
11891141
flattenComputeDiskDiskEncryptionKeySha256(original["sha256"], d, config)
11901142
transformed["kms_key_self_link"] =
11911143
flattenComputeDiskDiskEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d, config)
1192-
transformed["kms_key_service_account"] =
1193-
flattenComputeDiskDiskEncryptionKeyKmsKeyServiceAccount(original["kmsKeyServiceAccount"], d, config)
11941144
return []interface{}{transformed}
11951145
}
11961146
func flattenComputeDiskDiskEncryptionKeyRawKey(v interface{}, d *schema.ResourceData, config *Config) interface{} {
@@ -1205,10 +1155,6 @@ func flattenComputeDiskDiskEncryptionKeyKmsKeySelfLink(v interface{}, d *schema.
12051155
return v
12061156
}
12071157

1208-
func flattenComputeDiskDiskEncryptionKeyKmsKeyServiceAccount(v interface{}, d *schema.ResourceData, config *Config) interface{} {
1209-
return v
1210-
}
1211-
12121158
func flattenComputeDiskSnapshot(v interface{}, d *schema.ResourceData, config *Config) interface{} {
12131159
if v == nil {
12141160
return v
@@ -1231,8 +1177,6 @@ func flattenComputeDiskSourceSnapshotEncryptionKey(v interface{}, d *schema.Reso
12311177
flattenComputeDiskSourceSnapshotEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d, config)
12321178
transformed["sha256"] =
12331179
flattenComputeDiskSourceSnapshotEncryptionKeySha256(original["sha256"], d, config)
1234-
transformed["kms_key_service_account"] =
1235-
flattenComputeDiskSourceSnapshotEncryptionKeyKmsKeyServiceAccount(original["kmsKeyServiceAccount"], d, config)
12361180
return []interface{}{transformed}
12371181
}
12381182
func flattenComputeDiskSourceSnapshotEncryptionKeyRawKey(v interface{}, d *schema.ResourceData, config *Config) interface{} {
@@ -1247,10 +1191,6 @@ func flattenComputeDiskSourceSnapshotEncryptionKeySha256(v interface{}, d *schem
12471191
return v
12481192
}
12491193

1250-
func flattenComputeDiskSourceSnapshotEncryptionKeyKmsKeyServiceAccount(v interface{}, d *schema.ResourceData, config *Config) interface{} {
1251-
return v
1252-
}
1253-
12541194
func flattenComputeDiskSourceSnapshotId(v interface{}, d *schema.ResourceData, config *Config) interface{} {
12551195
return v
12561196
}
@@ -1294,10 +1234,6 @@ func expandComputeDiskType(v interface{}, d TerraformResourceData, config *Confi
12941234
return f.RelativeLink(), nil
12951235
}
12961236

1297-
func expandComputeDiskEraseWindowsVssSignature(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
1298-
return v, nil
1299-
}
1300-
13011237
func expandComputeDiskImage(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
13021238
return v, nil
13031239
}
@@ -1356,13 +1292,6 @@ func expandComputeDiskSourceImageEncryptionKey(v interface{}, d TerraformResourc
13561292
transformed["kmsKeyName"] = transformedKmsKeySelfLink
13571293
}
13581294

1359-
transformedKmsKeyServiceAccount, err := expandComputeDiskSourceImageEncryptionKeyKmsKeyServiceAccount(original["kms_key_service_account"], d, config)
1360-
if err != nil {
1361-
return nil, err
1362-
} else if val := reflect.ValueOf(transformedKmsKeyServiceAccount); val.IsValid() && !isEmptyValue(val) {
1363-
transformed["kmsKeyServiceAccount"] = transformedKmsKeyServiceAccount
1364-
}
1365-
13661295
return transformed, nil
13671296
}
13681297

@@ -1378,10 +1307,6 @@ func expandComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(v interface{}, d Te
13781307
return v, nil
13791308
}
13801309

1381-
func expandComputeDiskSourceImageEncryptionKeyKmsKeyServiceAccount(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
1382-
return v, nil
1383-
}
1384-
13851310
func expandComputeDiskDiskEncryptionKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
13861311
l := v.([]interface{})
13871312
if len(l) == 0 || l[0] == nil {
@@ -1412,13 +1337,6 @@ func expandComputeDiskDiskEncryptionKey(v interface{}, d TerraformResourceData,
14121337
transformed["kmsKeyName"] = transformedKmsKeySelfLink
14131338
}
14141339

1415-
transformedKmsKeyServiceAccount, err := expandComputeDiskDiskEncryptionKeyKmsKeyServiceAccount(original["kms_key_service_account"], d, config)
1416-
if err != nil {
1417-
return nil, err
1418-
} else if val := reflect.ValueOf(transformedKmsKeyServiceAccount); val.IsValid() && !isEmptyValue(val) {
1419-
transformed["kmsKeyServiceAccount"] = transformedKmsKeyServiceAccount
1420-
}
1421-
14221340
return transformed, nil
14231341
}
14241342

@@ -1434,10 +1352,6 @@ func expandComputeDiskDiskEncryptionKeyKmsKeySelfLink(v interface{}, d Terraform
14341352
return v, nil
14351353
}
14361354

1437-
func expandComputeDiskDiskEncryptionKeyKmsKeyServiceAccount(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
1438-
return v, nil
1439-
}
1440-
14411355
func expandComputeDiskSnapshot(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
14421356
f, err := parseGlobalFieldValue("snapshots", v.(string), "project", d, config, true)
14431357
if err != nil {
@@ -1476,13 +1390,6 @@ func expandComputeDiskSourceSnapshotEncryptionKey(v interface{}, d TerraformReso
14761390
transformed["sha256"] = transformedSha256
14771391
}
14781392

1479-
transformedKmsKeyServiceAccount, err := expandComputeDiskSourceSnapshotEncryptionKeyKmsKeyServiceAccount(original["kms_key_service_account"], d, config)
1480-
if err != nil {
1481-
return nil, err
1482-
} else if val := reflect.ValueOf(transformedKmsKeyServiceAccount); val.IsValid() && !isEmptyValue(val) {
1483-
transformed["kmsKeyServiceAccount"] = transformedKmsKeyServiceAccount
1484-
}
1485-
14861393
return transformed, nil
14871394
}
14881395

@@ -1498,10 +1405,6 @@ func expandComputeDiskSourceSnapshotEncryptionKeySha256(v interface{}, d Terrafo
14981405
return v, nil
14991406
}
15001407

1501-
func expandComputeDiskSourceSnapshotEncryptionKeyKmsKeyServiceAccount(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) {
1502-
return v, nil
1503-
}
1504-
15051408
func resourceComputeDiskEncoder(d *schema.ResourceData, meta interface{}, obj map[string]interface{}) (map[string]interface{}, error) {
15061409
config := meta.(*Config)
15071410

google-beta/resource_compute_disk_generated_test.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ resource "google_compute_disk" "default" {
5454
name = "tf-test-test-disk%{random_suffix}"
5555
type = "pd-ssd"
5656
zone = "us-central1-a"
57-
image = "debian-9-stretch-v20200805"
57+
image = "debian-8-jessie-v20170523"
5858
labels = {
5959
environment = "dev"
6060
}

google-beta/resource_compute_disk_test.go

Lines changed: 0 additions & 56 deletions
Original file line numberDiff line numberDiff line change
@@ -453,30 +453,6 @@ func TestAccComputeDisk_resourcePolicies(t *testing.T) {
453453
})
454454
}
455455

456-
func TestAccComputeDisk_VSSWindows(t *testing.T) {
457-
t.Parallel()
458-
459-
diskName := fmt.Sprintf("tf-test-%s", randString(t, 10))
460-
firstDiskName := fmt.Sprintf("tf-test-%s", randString(t, 10))
461-
snapshotName := fmt.Sprintf("tf-test-%s", randString(t, 10))
462-
projectName := getTestProjectFromEnv()
463-
464-
vcrTest(t, resource.TestCase{
465-
PreCheck: func() { testAccPreCheck(t) },
466-
Providers: testAccProviders,
467-
Steps: []resource.TestStep{
468-
{
469-
Config: testAccComputeDisk_WindowsVSS(firstDiskName, projectName, snapshotName, diskName),
470-
},
471-
{
472-
ResourceName: "google_compute_disk.foobar",
473-
ImportState: true,
474-
ImportStateVerify: true,
475-
},
476-
},
477-
})
478-
}
479-
480456
func testAccCheckComputeDiskExists(t *testing.T, n, p string, disk *compute.Disk) resource.TestCheckFunc {
481457
return func(s *terraform.State) error {
482458
rs, ok := s.RootModule().Resources[n]
@@ -793,35 +769,3 @@ resource "google_compute_disk" "foobar" {
793769
}
794770
`, policyName, diskName)
795771
}
796-
797-
func testAccComputeDisk_WindowsVSS(firstDiskName, projectName, snapshotName, diskName string) string {
798-
return fmt.Sprintf(`
799-
resource "google_compute_disk" "sourcedisk" {
800-
name = "d1-%s"
801-
image = "windows-server-2019-dc-v20200813"
802-
size = 50
803-
type = "pd-ssd"
804-
zone = "us-central1-a"
805-
project = "%s"
806-
}
807-
808-
resource "google_compute_snapshot" "snapdisk" {
809-
name = "%s"
810-
source_disk = google_compute_disk.sourcedisk.name
811-
zone = "us-central1-a"
812-
project = "%s"
813-
}
814-
815-
resource "google_compute_disk" "foobar" {
816-
name = "%s"
817-
snapshot = google_compute_snapshot.snapdisk.self_link
818-
size = 50
819-
type = "pd-ssd"
820-
zone = "us-central1-a"
821-
erase_windows_vss_signature = true
822-
timeouts {
823-
create = "10m"
824-
}
825-
}
826-
`, firstDiskName, projectName, snapshotName, projectName, diskName)
827-
}

0 commit comments

Comments
 (0)