|
3 | 3 | package google |
4 | 4 |
|
5 | 5 | import ( |
6 | | - "fmt" |
7 | | - |
8 | | - "github.com/hashicorp/errwrap" |
9 | 6 | "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" |
| 7 | + "github.com/hashicorp/terraform-provider-google-beta/google-beta/services/dataproc" |
10 | 8 | "github.com/hashicorp/terraform-provider-google-beta/google-beta/tpgiamresource" |
11 | 9 | "github.com/hashicorp/terraform-provider-google-beta/google-beta/tpgresource" |
12 | 10 | transport_tpg "github.com/hashicorp/terraform-provider-google-beta/google-beta/transport" |
13 | | - "google.golang.org/api/cloudresourcemanager/v1" |
14 | | - "google.golang.org/api/dataproc/v1" |
15 | 11 | ) |
16 | 12 |
|
17 | | -var IamDataprocClusterSchema = map[string]*schema.Schema{ |
18 | | - "cluster": { |
19 | | - Type: schema.TypeString, |
20 | | - Required: true, |
21 | | - ForceNew: true, |
22 | | - }, |
23 | | - "project": { |
24 | | - Type: schema.TypeString, |
25 | | - Optional: true, |
26 | | - Computed: true, |
27 | | - ForceNew: true, |
28 | | - }, |
29 | | - "region": { |
30 | | - Type: schema.TypeString, |
31 | | - Optional: true, |
32 | | - Computed: true, |
33 | | - ForceNew: true, |
34 | | - }, |
35 | | -} |
36 | | - |
37 | | -type DataprocClusterIamUpdater struct { |
38 | | - project string |
39 | | - region string |
40 | | - cluster string |
41 | | - d tpgresource.TerraformResourceData |
42 | | - Config *transport_tpg.Config |
43 | | -} |
| 13 | +var IamDataprocClusterSchema = dataproc.IamDataprocClusterSchema |
44 | 14 |
|
45 | 15 | func NewDataprocClusterUpdater(d tpgresource.TerraformResourceData, config *transport_tpg.Config) (tpgiamresource.ResourceIamUpdater, error) { |
46 | | - project, err := tpgresource.GetProject(d, config) |
47 | | - if err != nil { |
48 | | - return nil, err |
49 | | - } |
50 | | - |
51 | | - region, err := tpgresource.GetRegion(d, config) |
52 | | - if err != nil { |
53 | | - return nil, err |
54 | | - } |
55 | | - |
56 | | - if err := d.Set("project", project); err != nil { |
57 | | - return nil, fmt.Errorf("Error setting project: %s", err) |
58 | | - } |
59 | | - if err := d.Set("region", region); err != nil { |
60 | | - return nil, fmt.Errorf("Error setting region: %s", err) |
61 | | - } |
62 | | - |
63 | | - return &DataprocClusterIamUpdater{ |
64 | | - project: project, |
65 | | - region: region, |
66 | | - cluster: d.Get("cluster").(string), |
67 | | - d: d, |
68 | | - Config: config, |
69 | | - }, nil |
| 16 | + return dataproc.NewDataprocClusterUpdater(d, config) |
70 | 17 | } |
71 | 18 |
|
72 | 19 | func DataprocClusterIdParseFunc(d *schema.ResourceData, config *transport_tpg.Config) error { |
73 | | - fv, err := tpgresource.ParseRegionalFieldValue("clusters", d.Id(), "project", "region", "zone", d, config, true) |
74 | | - if err != nil { |
75 | | - return err |
76 | | - } |
77 | | - |
78 | | - if err := d.Set("project", fv.Project); err != nil { |
79 | | - return fmt.Errorf("Error setting project: %s", err) |
80 | | - } |
81 | | - if err := d.Set("region", fv.Region); err != nil { |
82 | | - return fmt.Errorf("Error setting region: %s", err) |
83 | | - } |
84 | | - if err := d.Set("cluster", fv.Name); err != nil { |
85 | | - return fmt.Errorf("Error setting cluster: %s", err) |
86 | | - } |
87 | | - |
88 | | - // Explicitly set the id so imported resources have the same ID format as non-imported ones. |
89 | | - d.SetId(fv.RelativeLink()) |
90 | | - return nil |
91 | | -} |
92 | | - |
93 | | -func (u *DataprocClusterIamUpdater) GetResourceIamPolicy() (*cloudresourcemanager.Policy, error) { |
94 | | - req := &dataproc.GetIamPolicyRequest{} |
95 | | - |
96 | | - userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent) |
97 | | - if err != nil { |
98 | | - return nil, err |
99 | | - } |
100 | | - |
101 | | - p, err := u.Config.NewDataprocClient(userAgent).Projects.Regions.Clusters.GetIamPolicy(u.GetResourceId(), req).Do() |
102 | | - if err != nil { |
103 | | - return nil, errwrap.Wrapf(fmt.Sprintf("Error retrieving IAM policy for %s: {{err}}", u.DescribeResource()), err) |
104 | | - } |
105 | | - |
106 | | - cloudResourcePolicy, err := dataprocToResourceManagerPolicy(p) |
107 | | - if err != nil { |
108 | | - return nil, errwrap.Wrapf(fmt.Sprintf("Invalid IAM policy for %s: {{err}}", u.DescribeResource()), err) |
109 | | - } |
110 | | - |
111 | | - return cloudResourcePolicy, nil |
112 | | -} |
113 | | - |
114 | | -func (u *DataprocClusterIamUpdater) SetResourceIamPolicy(policy *cloudresourcemanager.Policy) error { |
115 | | - dataprocPolicy, err := resourceManagerToDataprocPolicy(policy) |
116 | | - if err != nil { |
117 | | - return errwrap.Wrapf(fmt.Sprintf("Invalid IAM policy for %s: {{err}}", u.DescribeResource()), err) |
118 | | - } |
119 | | - |
120 | | - userAgent, err := tpgresource.GenerateUserAgentString(u.d, u.Config.UserAgent) |
121 | | - if err != nil { |
122 | | - return err |
123 | | - } |
124 | | - |
125 | | - req := &dataproc.SetIamPolicyRequest{Policy: dataprocPolicy} |
126 | | - _, err = u.Config.NewDataprocClient(userAgent).Projects.Regions.Clusters.SetIamPolicy(u.GetResourceId(), req).Do() |
127 | | - if err != nil { |
128 | | - return errwrap.Wrapf(fmt.Sprintf("Error setting IAM policy for %s: {{err}}", u.DescribeResource()), err) |
129 | | - } |
130 | | - |
131 | | - return nil |
132 | | -} |
133 | | - |
134 | | -func (u *DataprocClusterIamUpdater) GetResourceId() string { |
135 | | - return fmt.Sprintf("projects/%s/regions/%s/clusters/%s", u.project, u.region, u.cluster) |
136 | | -} |
137 | | - |
138 | | -func (u *DataprocClusterIamUpdater) GetMutexKey() string { |
139 | | - return fmt.Sprintf("iam-dataproc-cluster-%s-%s-%s", u.project, u.region, u.cluster) |
140 | | -} |
141 | | - |
142 | | -func (u *DataprocClusterIamUpdater) DescribeResource() string { |
143 | | - return fmt.Sprintf("Dataproc Cluster %s/%s/%s", u.project, u.region, u.cluster) |
| 20 | + return dataproc.DataprocClusterIdParseFunc(d, config) |
144 | 21 | } |
0 commit comments