@@ -375,6 +375,18 @@ func resourceComputeRegionDiskCreate(d *schema.ResourceData, meta interface{}) e
375
375
}
376
376
377
377
obj := make (map [string ]interface {})
378
+ diskEncryptionKeyProp , err := expandComputeRegionDiskDiskEncryptionKey (d .Get ("disk_encryption_key" ), d , config )
379
+ if err != nil {
380
+ return err
381
+ } else if v , ok := d .GetOkExists ("disk_encryption_key" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (diskEncryptionKeyProp )) && (ok || ! reflect .DeepEqual (v , diskEncryptionKeyProp )) {
382
+ obj ["diskEncryptionKey" ] = diskEncryptionKeyProp
383
+ }
384
+ sourceSnapshotEncryptionKeyProp , err := expandComputeRegionDiskSourceSnapshotEncryptionKey (d .Get ("source_snapshot_encryption_key" ), d , config )
385
+ if err != nil {
386
+ return err
387
+ } else if v , ok := d .GetOkExists ("source_snapshot_encryption_key" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (sourceSnapshotEncryptionKeyProp )) && (ok || ! reflect .DeepEqual (v , sourceSnapshotEncryptionKeyProp )) {
388
+ obj ["sourceSnapshotEncryptionKey" ] = sourceSnapshotEncryptionKeyProp
389
+ }
378
390
labelFingerprintProp , err := expandComputeRegionDiskLabelFingerprint (d .Get ("label_fingerprint" ), d , config )
379
391
if err != nil {
380
392
return err
@@ -453,24 +465,12 @@ func resourceComputeRegionDiskCreate(d *schema.ResourceData, meta interface{}) e
453
465
} else if v , ok := d .GetOkExists ("region" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (regionProp )) && (ok || ! reflect .DeepEqual (v , regionProp )) {
454
466
obj ["region" ] = regionProp
455
467
}
456
- diskEncryptionKeyProp , err := expandComputeRegionDiskDiskEncryptionKey (d .Get ("disk_encryption_key" ), d , config )
457
- if err != nil {
458
- return err
459
- } else if v , ok := d .GetOkExists ("disk_encryption_key" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (diskEncryptionKeyProp )) && (ok || ! reflect .DeepEqual (v , diskEncryptionKeyProp )) {
460
- obj ["diskEncryptionKey" ] = diskEncryptionKeyProp
461
- }
462
468
sourceSnapshotProp , err := expandComputeRegionDiskSnapshot (d .Get ("snapshot" ), d , config )
463
469
if err != nil {
464
470
return err
465
471
} else if v , ok := d .GetOkExists ("snapshot" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (sourceSnapshotProp )) && (ok || ! reflect .DeepEqual (v , sourceSnapshotProp )) {
466
472
obj ["sourceSnapshot" ] = sourceSnapshotProp
467
473
}
468
- sourceSnapshotEncryptionKeyProp , err := expandComputeRegionDiskSourceSnapshotEncryptionKey (d .Get ("source_snapshot_encryption_key" ), d , config )
469
- if err != nil {
470
- return err
471
- } else if v , ok := d .GetOkExists ("source_snapshot_encryption_key" ); ! tpgresource .IsEmptyValue (reflect .ValueOf (sourceSnapshotEncryptionKeyProp )) && (ok || ! reflect .DeepEqual (v , sourceSnapshotEncryptionKeyProp )) {
472
- obj ["sourceSnapshotEncryptionKey" ] = sourceSnapshotEncryptionKeyProp
473
- }
474
474
475
475
obj , err = resourceComputeRegionDiskEncoder (d , meta , obj )
476
476
if err != nil {
@@ -587,6 +587,15 @@ func resourceComputeRegionDiskRead(d *schema.ResourceData, meta interface{}) err
587
587
return fmt .Errorf ("Error reading RegionDisk: %s" , err )
588
588
}
589
589
590
+ if err := d .Set ("disk_encryption_key" , flattenComputeRegionDiskDiskEncryptionKey (res ["diskEncryptionKey" ], d , config )); err != nil {
591
+ return fmt .Errorf ("Error reading RegionDisk: %s" , err )
592
+ }
593
+ if err := d .Set ("source_snapshot_encryption_key" , flattenComputeRegionDiskSourceSnapshotEncryptionKey (res ["sourceSnapshotEncryptionKey" ], d , config )); err != nil {
594
+ return fmt .Errorf ("Error reading RegionDisk: %s" , err )
595
+ }
596
+ if err := d .Set ("source_snapshot_id" , flattenComputeRegionDiskSourceSnapshotId (res ["sourceSnapshotId" ], d , config )); err != nil {
597
+ return fmt .Errorf ("Error reading RegionDisk: %s" , err )
598
+ }
590
599
if err := d .Set ("label_fingerprint" , flattenComputeRegionDiskLabelFingerprint (res ["labelFingerprint" ], d , config )); err != nil {
591
600
return fmt .Errorf ("Error reading RegionDisk: %s" , err )
592
601
}
@@ -647,18 +656,9 @@ func resourceComputeRegionDiskRead(d *schema.ResourceData, meta interface{}) err
647
656
if err := d .Set ("region" , flattenComputeRegionDiskRegion (res ["region" ], d , config )); err != nil {
648
657
return fmt .Errorf ("Error reading RegionDisk: %s" , err )
649
658
}
650
- if err := d .Set ("disk_encryption_key" , flattenComputeRegionDiskDiskEncryptionKey (res ["diskEncryptionKey" ], d , config )); err != nil {
651
- return fmt .Errorf ("Error reading RegionDisk: %s" , err )
652
- }
653
659
if err := d .Set ("snapshot" , flattenComputeRegionDiskSnapshot (res ["sourceSnapshot" ], d , config )); err != nil {
654
660
return fmt .Errorf ("Error reading RegionDisk: %s" , err )
655
661
}
656
- if err := d .Set ("source_snapshot_encryption_key" , flattenComputeRegionDiskSourceSnapshotEncryptionKey (res ["sourceSnapshotEncryptionKey" ], d , config )); err != nil {
657
- return fmt .Errorf ("Error reading RegionDisk: %s" , err )
658
- }
659
- if err := d .Set ("source_snapshot_id" , flattenComputeRegionDiskSourceSnapshotId (res ["sourceSnapshotId" ], d , config )); err != nil {
660
- return fmt .Errorf ("Error reading RegionDisk: %s" , err )
661
- }
662
662
if err := d .Set ("self_link" , tpgresource .ConvertSelfLinkToV1 (res ["selfLink" ].(string ))); err != nil {
663
663
return fmt .Errorf ("Error reading RegionDisk: %s" , err )
664
664
}
@@ -923,6 +923,62 @@ func resourceComputeRegionDiskImport(d *schema.ResourceData, meta interface{}) (
923
923
return []* schema.ResourceData {d }, nil
924
924
}
925
925
926
+ func flattenComputeRegionDiskDiskEncryptionKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
927
+ if v == nil {
928
+ return nil
929
+ }
930
+ original := v .(map [string ]interface {})
931
+ if len (original ) == 0 {
932
+ return nil
933
+ }
934
+ transformed := make (map [string ]interface {})
935
+ transformed ["raw_key" ] =
936
+ flattenComputeRegionDiskDiskEncryptionKeyRawKey (original ["rawKey" ], d , config )
937
+ transformed ["sha256" ] =
938
+ flattenComputeRegionDiskDiskEncryptionKeySha256 (original ["sha256" ], d , config )
939
+ transformed ["kms_key_name" ] =
940
+ flattenComputeRegionDiskDiskEncryptionKeyKmsKeyName (original ["kmsKeyName" ], d , config )
941
+ return []interface {}{transformed }
942
+ }
943
+ func flattenComputeRegionDiskDiskEncryptionKeyRawKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
944
+ return v
945
+ }
946
+
947
+ func flattenComputeRegionDiskDiskEncryptionKeySha256 (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
948
+ return v
949
+ }
950
+
951
+ func flattenComputeRegionDiskDiskEncryptionKeyKmsKeyName (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
952
+ return v
953
+ }
954
+
955
+ func flattenComputeRegionDiskSourceSnapshotEncryptionKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
956
+ if v == nil {
957
+ return nil
958
+ }
959
+ original := v .(map [string ]interface {})
960
+ if len (original ) == 0 {
961
+ return nil
962
+ }
963
+ transformed := make (map [string ]interface {})
964
+ transformed ["raw_key" ] =
965
+ flattenComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (original ["rawKey" ], d , config )
966
+ transformed ["sha256" ] =
967
+ flattenComputeRegionDiskSourceSnapshotEncryptionKeySha256 (original ["sha256" ], d , config )
968
+ return []interface {}{transformed }
969
+ }
970
+ func flattenComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
971
+ return v
972
+ }
973
+
974
+ func flattenComputeRegionDiskSourceSnapshotEncryptionKeySha256 (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
975
+ return v
976
+ }
977
+
978
+ func flattenComputeRegionDiskSourceSnapshotId (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
979
+ return v
980
+ }
981
+
926
982
func flattenComputeRegionDiskLabelFingerprint (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
927
983
return v
928
984
}
@@ -1097,67 +1153,90 @@ func flattenComputeRegionDiskRegion(v interface{}, d *schema.ResourceData, confi
1097
1153
return tpgresource .NameFromSelfLinkStateFunc (v )
1098
1154
}
1099
1155
1100
- func flattenComputeRegionDiskDiskEncryptionKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1156
+ func flattenComputeRegionDiskSnapshot (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1101
1157
if v == nil {
1102
- return nil
1158
+ return v
1103
1159
}
1104
- original := v .(map [string ]interface {})
1105
- if len (original ) == 0 {
1106
- return nil
1160
+ return tpgresource .ConvertSelfLinkToV1 (v .(string ))
1161
+ }
1162
+
1163
+ func expandComputeRegionDiskDiskEncryptionKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1164
+ l := v .([]interface {})
1165
+ if len (l ) == 0 || l [0 ] == nil {
1166
+ return nil , nil
1107
1167
}
1168
+ raw := l [0 ]
1169
+ original := raw .(map [string ]interface {})
1108
1170
transformed := make (map [string ]interface {})
1109
- transformed ["raw_key" ] =
1110
- flattenComputeRegionDiskDiskEncryptionKeyRawKey (original ["rawKey" ], d , config )
1111
- transformed ["sha256" ] =
1112
- flattenComputeRegionDiskDiskEncryptionKeySha256 (original ["sha256" ], d , config )
1113
- transformed ["kms_key_name" ] =
1114
- flattenComputeRegionDiskDiskEncryptionKeyKmsKeyName (original ["kmsKeyName" ], d , config )
1115
- return []interface {}{transformed }
1171
+
1172
+ transformedRawKey , err := expandComputeRegionDiskDiskEncryptionKeyRawKey (original ["raw_key" ], d , config )
1173
+ if err != nil {
1174
+ return nil , err
1175
+ } else if val := reflect .ValueOf (transformedRawKey ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1176
+ transformed ["rawKey" ] = transformedRawKey
1177
+ }
1178
+
1179
+ transformedSha256 , err := expandComputeRegionDiskDiskEncryptionKeySha256 (original ["sha256" ], d , config )
1180
+ if err != nil {
1181
+ return nil , err
1182
+ } else if val := reflect .ValueOf (transformedSha256 ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1183
+ transformed ["sha256" ] = transformedSha256
1184
+ }
1185
+
1186
+ transformedKmsKeyName , err := expandComputeRegionDiskDiskEncryptionKeyKmsKeyName (original ["kms_key_name" ], d , config )
1187
+ if err != nil {
1188
+ return nil , err
1189
+ } else if val := reflect .ValueOf (transformedKmsKeyName ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1190
+ transformed ["kmsKeyName" ] = transformedKmsKeyName
1191
+ }
1192
+
1193
+ return transformed , nil
1116
1194
}
1117
- func flattenComputeRegionDiskDiskEncryptionKeyRawKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1118
- return v
1195
+
1196
+ func expandComputeRegionDiskDiskEncryptionKeyRawKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1197
+ return v , nil
1119
1198
}
1120
1199
1121
- func flattenComputeRegionDiskDiskEncryptionKeySha256 (v interface {}, d * schema. ResourceData , config * transport_tpg.Config ) interface {} {
1122
- return v
1200
+ func expandComputeRegionDiskDiskEncryptionKeySha256 (v interface {}, d tpgresource. TerraformResourceData , config * transport_tpg.Config ) ( interface {}, error ) {
1201
+ return v , nil
1123
1202
}
1124
1203
1125
- func flattenComputeRegionDiskDiskEncryptionKeyKmsKeyName (v interface {}, d * schema. ResourceData , config * transport_tpg.Config ) interface {} {
1126
- return v
1204
+ func expandComputeRegionDiskDiskEncryptionKeyKmsKeyName (v interface {}, d tpgresource. TerraformResourceData , config * transport_tpg.Config ) ( interface {}, error ) {
1205
+ return v , nil
1127
1206
}
1128
1207
1129
- func flattenComputeRegionDiskSnapshot (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1130
- if v == nil {
1131
- return v
1208
+ func expandComputeRegionDiskSourceSnapshotEncryptionKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1209
+ l := v .([]interface {})
1210
+ if len (l ) == 0 || l [0 ] == nil {
1211
+ return nil , nil
1132
1212
}
1133
- return tpgresource .ConvertSelfLinkToV1 (v .(string ))
1134
- }
1213
+ raw := l [0 ]
1214
+ original := raw .(map [string ]interface {})
1215
+ transformed := make (map [string ]interface {})
1135
1216
1136
- func flattenComputeRegionDiskSourceSnapshotEncryptionKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1137
- if v == nil {
1138
- return nil
1217
+ transformedRawKey , err := expandComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (original ["raw_key" ], d , config )
1218
+ if err != nil {
1219
+ return nil , err
1220
+ } else if val := reflect .ValueOf (transformedRawKey ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1221
+ transformed ["rawKey" ] = transformedRawKey
1139
1222
}
1140
- original := v .(map [string ]interface {})
1141
- if len (original ) == 0 {
1142
- return nil
1223
+
1224
+ transformedSha256 , err := expandComputeRegionDiskSourceSnapshotEncryptionKeySha256 (original ["sha256" ], d , config )
1225
+ if err != nil {
1226
+ return nil , err
1227
+ } else if val := reflect .ValueOf (transformedSha256 ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1228
+ transformed ["sha256" ] = transformedSha256
1143
1229
}
1144
- transformed := make (map [string ]interface {})
1145
- transformed ["raw_key" ] =
1146
- flattenComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (original ["rawKey" ], d , config )
1147
- transformed ["sha256" ] =
1148
- flattenComputeRegionDiskSourceSnapshotEncryptionKeySha256 (original ["sha256" ], d , config )
1149
- return []interface {}{transformed }
1150
- }
1151
- func flattenComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (v interface {}, d * schema.ResourceData , config * transport_tpg.Config ) interface {} {
1152
- return v
1230
+
1231
+ return transformed , nil
1153
1232
}
1154
1233
1155
- func flattenComputeRegionDiskSourceSnapshotEncryptionKeySha256 (v interface {}, d * schema. ResourceData , config * transport_tpg.Config ) interface {} {
1156
- return v
1234
+ func expandComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (v interface {}, d tpgresource. TerraformResourceData , config * transport_tpg.Config ) ( interface {}, error ) {
1235
+ return v , nil
1157
1236
}
1158
1237
1159
- func flattenComputeRegionDiskSourceSnapshotId (v interface {}, d * schema. ResourceData , config * transport_tpg.Config ) interface {} {
1160
- return v
1238
+ func expandComputeRegionDiskSourceSnapshotEncryptionKeySha256 (v interface {}, d tpgresource. TerraformResourceData , config * transport_tpg.Config ) ( interface {}, error ) {
1239
+ return v , nil
1161
1240
}
1162
1241
1163
1242
func expandComputeRegionDiskLabelFingerprint (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
@@ -1293,51 +1372,6 @@ func expandComputeRegionDiskRegion(v interface{}, d tpgresource.TerraformResourc
1293
1372
return f .RelativeLink (), nil
1294
1373
}
1295
1374
1296
- func expandComputeRegionDiskDiskEncryptionKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1297
- l := v .([]interface {})
1298
- if len (l ) == 0 || l [0 ] == nil {
1299
- return nil , nil
1300
- }
1301
- raw := l [0 ]
1302
- original := raw .(map [string ]interface {})
1303
- transformed := make (map [string ]interface {})
1304
-
1305
- transformedRawKey , err := expandComputeRegionDiskDiskEncryptionKeyRawKey (original ["raw_key" ], d , config )
1306
- if err != nil {
1307
- return nil , err
1308
- } else if val := reflect .ValueOf (transformedRawKey ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1309
- transformed ["rawKey" ] = transformedRawKey
1310
- }
1311
-
1312
- transformedSha256 , err := expandComputeRegionDiskDiskEncryptionKeySha256 (original ["sha256" ], d , config )
1313
- if err != nil {
1314
- return nil , err
1315
- } else if val := reflect .ValueOf (transformedSha256 ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1316
- transformed ["sha256" ] = transformedSha256
1317
- }
1318
-
1319
- transformedKmsKeyName , err := expandComputeRegionDiskDiskEncryptionKeyKmsKeyName (original ["kms_key_name" ], d , config )
1320
- if err != nil {
1321
- return nil , err
1322
- } else if val := reflect .ValueOf (transformedKmsKeyName ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1323
- transformed ["kmsKeyName" ] = transformedKmsKeyName
1324
- }
1325
-
1326
- return transformed , nil
1327
- }
1328
-
1329
- func expandComputeRegionDiskDiskEncryptionKeyRawKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1330
- return v , nil
1331
- }
1332
-
1333
- func expandComputeRegionDiskDiskEncryptionKeySha256 (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1334
- return v , nil
1335
- }
1336
-
1337
- func expandComputeRegionDiskDiskEncryptionKeyKmsKeyName (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1338
- return v , nil
1339
- }
1340
-
1341
1375
func expandComputeRegionDiskSnapshot (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1342
1376
f , err := tpgresource .ParseGlobalFieldValue ("snapshots" , v .(string ), "project" , d , config , true )
1343
1377
if err != nil {
@@ -1346,40 +1380,6 @@ func expandComputeRegionDiskSnapshot(v interface{}, d tpgresource.TerraformResou
1346
1380
return f .RelativeLink (), nil
1347
1381
}
1348
1382
1349
- func expandComputeRegionDiskSourceSnapshotEncryptionKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1350
- l := v .([]interface {})
1351
- if len (l ) == 0 || l [0 ] == nil {
1352
- return nil , nil
1353
- }
1354
- raw := l [0 ]
1355
- original := raw .(map [string ]interface {})
1356
- transformed := make (map [string ]interface {})
1357
-
1358
- transformedRawKey , err := expandComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (original ["raw_key" ], d , config )
1359
- if err != nil {
1360
- return nil , err
1361
- } else if val := reflect .ValueOf (transformedRawKey ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1362
- transformed ["rawKey" ] = transformedRawKey
1363
- }
1364
-
1365
- transformedSha256 , err := expandComputeRegionDiskSourceSnapshotEncryptionKeySha256 (original ["sha256" ], d , config )
1366
- if err != nil {
1367
- return nil , err
1368
- } else if val := reflect .ValueOf (transformedSha256 ); val .IsValid () && ! tpgresource .IsEmptyValue (val ) {
1369
- transformed ["sha256" ] = transformedSha256
1370
- }
1371
-
1372
- return transformed , nil
1373
- }
1374
-
1375
- func expandComputeRegionDiskSourceSnapshotEncryptionKeyRawKey (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1376
- return v , nil
1377
- }
1378
-
1379
- func expandComputeRegionDiskSourceSnapshotEncryptionKeySha256 (v interface {}, d tpgresource.TerraformResourceData , config * transport_tpg.Config ) (interface {}, error ) {
1380
- return v , nil
1381
- }
1382
-
1383
1383
func resourceComputeRegionDiskEncoder (d * schema.ResourceData , meta interface {}, obj map [string ]interface {}) (map [string ]interface {}, error ) {
1384
1384
config := meta .(* transport_tpg.Config )
1385
1385
0 commit comments