Skip to content

Commit dd0483f

Browse files
Revert "Add missing fields to compute resources [KMS and disks]" (#13125) (#9367)
[upstream:68ee03a7a4ccf26aa336ef6b20a35fce8942a0ab] Signed-off-by: Modular Magician <[email protected]>
1 parent 7ee2cf3 commit dd0483f

20 files changed

+67
-2218
lines changed

.changelog/13125.txt

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,9 @@
1+
```release-note:enhancement
2+
compute: added several `boot_disk`, `attached_disk`, and `instance_encryption_key` fields for improved encryption key support in `google_compute_instance` and template resources (revert)
3+
```
4+
```release-note:enhancement
5+
compute: added support for `image_encryption_key.raw_key` and ` image_encryption_key.rsa_encrypted_key` to `google_compute_image` resource (revert)
6+
```
7+
```release-note:enhancement
8+
compute: added support for `snapshot_encryption_key.rsa_encrypted_key` to `google_compute_snapshot` resource (revert)
9+
```

google-beta/services/compute/compute_instance_helpers.go

Lines changed: 0 additions & 86 deletions
Original file line numberDiff line numberDiff line change
@@ -1009,89 +1009,3 @@ func flattenNetworkPerformanceConfig(c *compute.NetworkPerformanceConfig) []map[
10091009
},
10101010
}
10111011
}
1012-
1013-
func flattenComputeInstanceGuestOsFeatures(v interface{}) []interface{} {
1014-
if v == nil {
1015-
return nil
1016-
}
1017-
features, ok := v.([]*compute.GuestOsFeature)
1018-
if !ok {
1019-
return nil
1020-
}
1021-
var result []interface{}
1022-
for _, feature := range features {
1023-
if feature != nil && feature.Type != "" {
1024-
result = append(result, feature.Type)
1025-
}
1026-
}
1027-
return result
1028-
}
1029-
1030-
func expandComputeInstanceGuestOsFeatures(v interface{}) []*compute.GuestOsFeature {
1031-
if v == nil {
1032-
return nil
1033-
}
1034-
var result []*compute.GuestOsFeature
1035-
for _, feature := range v.([]interface{}) {
1036-
result = append(result, &compute.GuestOsFeature{Type: feature.(string)})
1037-
}
1038-
return result
1039-
}
1040-
1041-
func expandComputeInstanceEncryptionKey(d tpgresource.TerraformResourceData) *compute.CustomerEncryptionKey {
1042-
iek, ok := d.GetOk("instance_encryption_key")
1043-
if !ok {
1044-
return nil
1045-
}
1046-
1047-
iekRes := iek.([]interface{})[0].(map[string]interface{})
1048-
return &compute.CustomerEncryptionKey{
1049-
KmsKeyName: iekRes["kms_key_self_link"].(string),
1050-
Sha256: iekRes["sha256"].(string),
1051-
KmsKeyServiceAccount: iekRes["kms_key_service_account"].(string),
1052-
}
1053-
}
1054-
1055-
func flattenComputeInstanceEncryptionKey(v *compute.CustomerEncryptionKey) []map[string]interface{} {
1056-
if v == nil {
1057-
return nil
1058-
}
1059-
return []map[string]interface{}{
1060-
{
1061-
"kms_key_self_link": v.KmsKeyName,
1062-
"sha256": v.Sha256,
1063-
"kms_key_service_account": v.KmsKeyServiceAccount,
1064-
},
1065-
}
1066-
}
1067-
1068-
func expandComputeInstanceSourceEncryptionKey(d tpgresource.TerraformResourceData, field string) *compute.CustomerEncryptionKey {
1069-
cek, ok := d.GetOk(field)
1070-
if !ok {
1071-
return nil
1072-
}
1073-
1074-
cekRes := cek.([]interface{})[0].(map[string]interface{})
1075-
return &compute.CustomerEncryptionKey{
1076-
RsaEncryptedKey: cekRes["rsa_encrypted_key"].(string),
1077-
RawKey: cekRes["raw_key"].(string),
1078-
KmsKeyName: cekRes["kms_key_self_link"].(string),
1079-
Sha256: cekRes["sha256"].(string),
1080-
KmsKeyServiceAccount: cekRes["kms_key_service_account"].(string),
1081-
}
1082-
}
1083-
1084-
func flattenComputeInstanceSourceEncryptionKey(v *compute.CustomerEncryptionKey) []map[string]interface{} {
1085-
if v == nil {
1086-
return nil
1087-
}
1088-
return []map[string]interface{}{
1089-
{
1090-
"rsa_encrypted_key": v.RsaEncryptedKey,
1091-
"raw_key": v.RawKey,
1092-
"kms_key_self_link": v.KmsKeyName,
1093-
"sha256": v.Sha256,
1094-
"kms_key_service_account": v.KmsKeyServiceAccount,
1095-
},
1096-
}
1097-
}

google-beta/services/compute/resource_compute_image.go

Lines changed: 0 additions & 50 deletions
Original file line numberDiff line numberDiff line change
@@ -132,22 +132,6 @@ KMS.`,
132132
given KMS key. If absent, the Compute Engine default service
133133
account is used.`,
134134
},
135-
"raw_key": {
136-
Type: schema.TypeString,
137-
Optional: true,
138-
ForceNew: true,
139-
Description: `Specifies a 256-bit customer-supplied encryption key, encoded in
140-
RFC 4648 base64 to either encrypt or decrypt this resource.`,
141-
Sensitive: true,
142-
},
143-
"rsa_encrypted_key": {
144-
Type: schema.TypeString,
145-
Optional: true,
146-
ForceNew: true,
147-
Description: `Specifies a 256-bit customer-supplied encryption key, encoded in
148-
RFC 4648 base64 to either encrypt or decrypt this resource.`,
149-
Sensitive: true,
150-
},
151135
},
152136
},
153137
},
@@ -800,10 +784,6 @@ func flattenComputeImageImageEncryptionKey(v interface{}, d *schema.ResourceData
800784
flattenComputeImageImageEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d, config)
801785
transformed["kms_key_service_account"] =
802786
flattenComputeImageImageEncryptionKeyKmsKeyServiceAccount(original["kmsKeyServiceAccount"], d, config)
803-
transformed["raw_key"] =
804-
flattenComputeImageImageEncryptionKeyRawKey(original["rawKey"], d, config)
805-
transformed["rsa_encrypted_key"] =
806-
flattenComputeImageImageEncryptionKeyRsaEncryptedKey(original["rsaEncryptedKey"], d, config)
807787
return []interface{}{transformed}
808788
}
809789
func flattenComputeImageImageEncryptionKeyKmsKeySelfLink(v interface{}, d *schema.ResourceData, config *transport_tpg.Config) interface{} {
@@ -818,14 +798,6 @@ func flattenComputeImageImageEncryptionKeyKmsKeyServiceAccount(v interface{}, d
818798
return v
819799
}
820800

821-
func flattenComputeImageImageEncryptionKeyRawKey(v interface{}, d *schema.ResourceData, config *transport_tpg.Config) interface{} {
822-
return d.Get("image_encryption_key.0.raw_key")
823-
}
824-
825-
func flattenComputeImageImageEncryptionKeyRsaEncryptedKey(v interface{}, d *schema.ResourceData, config *transport_tpg.Config) interface{} {
826-
return d.Get("image_encryption_key.0.rsa_encrypted_key")
827-
}
828-
829801
func flattenComputeImageLabels(v interface{}, d *schema.ResourceData, config *transport_tpg.Config) interface{} {
830802
if v == nil {
831803
return v
@@ -962,20 +934,6 @@ func expandComputeImageImageEncryptionKey(v interface{}, d tpgresource.Terraform
962934
transformed["kmsKeyServiceAccount"] = transformedKmsKeyServiceAccount
963935
}
964936

965-
transformedRawKey, err := expandComputeImageImageEncryptionKeyRawKey(original["raw_key"], d, config)
966-
if err != nil {
967-
return nil, err
968-
} else if val := reflect.ValueOf(transformedRawKey); val.IsValid() && !tpgresource.IsEmptyValue(val) {
969-
transformed["rawKey"] = transformedRawKey
970-
}
971-
972-
transformedRsaEncryptedKey, err := expandComputeImageImageEncryptionKeyRsaEncryptedKey(original["rsa_encrypted_key"], d, config)
973-
if err != nil {
974-
return nil, err
975-
} else if val := reflect.ValueOf(transformedRsaEncryptedKey); val.IsValid() && !tpgresource.IsEmptyValue(val) {
976-
transformed["rsaEncryptedKey"] = transformedRsaEncryptedKey
977-
}
978-
979937
return transformed, nil
980938
}
981939

@@ -987,14 +945,6 @@ func expandComputeImageImageEncryptionKeyKmsKeyServiceAccount(v interface{}, d t
987945
return v, nil
988946
}
989947

990-
func expandComputeImageImageEncryptionKeyRawKey(v interface{}, d tpgresource.TerraformResourceData, config *transport_tpg.Config) (interface{}, error) {
991-
return v, nil
992-
}
993-
994-
func expandComputeImageImageEncryptionKeyRsaEncryptedKey(v interface{}, d tpgresource.TerraformResourceData, config *transport_tpg.Config) (interface{}, error) {
995-
return v, nil
996-
}
997-
998948
func expandComputeImageLabelFingerprint(v interface{}, d tpgresource.TerraformResourceData, config *transport_tpg.Config) (interface{}, error) {
999949
return v, nil
1000950
}

google-beta/services/compute/resource_compute_image_generated_meta.yaml

Lines changed: 0 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -16,8 +16,6 @@ fields:
1616
- field: 'image_encryption_key.kms_key_self_link'
1717
api_field: 'image_encryption_key.kms_key_name'
1818
- field: 'image_encryption_key.kms_key_service_account'
19-
- field: 'image_encryption_key.raw_key'
20-
- field: 'image_encryption_key.rsa_encrypted_key'
2119
- field: 'label_fingerprint'
2220
- field: 'labels'
2321
- field: 'licenses'

google-beta/services/compute/resource_compute_image_generated_test.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -49,7 +49,7 @@ func TestAccComputeImage_imageBasicExample(t *testing.T) {
4949
ResourceName: "google_compute_image.example",
5050
ImportState: true,
5151
ImportStateVerify: true,
52-
ImportStateVerifyIgnore: []string{"image_encryption_key.0.raw_key", "image_encryption_key.0.rsa_encrypted_key", "labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
52+
ImportStateVerifyIgnore: []string{"labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
5353
},
5454
},
5555
})
@@ -97,7 +97,7 @@ func TestAccComputeImage_imageGuestOsExample(t *testing.T) {
9797
ResourceName: "google_compute_image.example",
9898
ImportState: true,
9999
ImportStateVerify: true,
100-
ImportStateVerifyIgnore: []string{"image_encryption_key.0.raw_key", "image_encryption_key.0.rsa_encrypted_key", "labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
100+
ImportStateVerifyIgnore: []string{"labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
101101
},
102102
},
103103
})
@@ -165,7 +165,7 @@ func TestAccComputeImage_imageBasicStorageLocationExample(t *testing.T) {
165165
ResourceName: "google_compute_image.example",
166166
ImportState: true,
167167
ImportStateVerify: true,
168-
ImportStateVerifyIgnore: []string{"image_encryption_key.0.raw_key", "image_encryption_key.0.rsa_encrypted_key", "labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
168+
ImportStateVerifyIgnore: []string{"labels", "raw_disk", "source_disk", "source_image", "source_snapshot", "terraform_labels"},
169169
},
170170
},
171171
})

0 commit comments

Comments
 (0)