services/google/networksecurity/alpha/client_tls_policy_internal.go (2,444 lines of code) (raw):
// Copyright 2025 Google LLC. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package alpha
import (
"bytes"
"context"
"encoding/json"
"fmt"
"io/ioutil"
"strings"
"github.com/GoogleCloudPlatform/declarative-resource-client-library/dcl"
"github.com/GoogleCloudPlatform/declarative-resource-client-library/dcl/operations"
)
func (r *ClientTlsPolicy) validate() error {
if err := dcl.Required(r, "name"); err != nil {
return err
}
if err := dcl.RequiredParameter(r.Project, "Project"); err != nil {
return err
}
if err := dcl.RequiredParameter(r.Location, "Location"); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.ClientCertificate) {
if err := r.ClientCertificate.validate(); err != nil {
return err
}
}
return nil
}
func (r *ClientTlsPolicyClientCertificate) validate() error {
if err := dcl.ValidateAtMostOneOfFieldsSet([]string{"LocalFilepath", "GrpcEndpoint", "CertificateProviderInstance"}, r.LocalFilepath, r.GrpcEndpoint, r.CertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.LocalFilepath) {
if err := r.LocalFilepath.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.GrpcEndpoint) {
if err := r.GrpcEndpoint.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.CertificateProviderInstance) {
if err := r.CertificateProviderInstance.validate(); err != nil {
return err
}
}
return nil
}
func (r *ClientTlsPolicyClientCertificateLocalFilepath) validate() error {
if err := dcl.Required(r, "certificatePath"); err != nil {
return err
}
if err := dcl.Required(r, "privateKeyPath"); err != nil {
return err
}
return nil
}
func (r *ClientTlsPolicyClientCertificateGrpcEndpoint) validate() error {
if err := dcl.Required(r, "targetUri"); err != nil {
return err
}
return nil
}
func (r *ClientTlsPolicyClientCertificateCertificateProviderInstance) validate() error {
if err := dcl.Required(r, "pluginInstance"); err != nil {
return err
}
return nil
}
func (r *ClientTlsPolicyServerValidationCa) validate() error {
if err := dcl.ValidateAtMostOneOfFieldsSet([]string{"CaCertPath", "GrpcEndpoint", "CertificateProviderInstance"}, r.CaCertPath, r.GrpcEndpoint, r.CertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.GrpcEndpoint) {
if err := r.GrpcEndpoint.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.CertificateProviderInstance) {
if err := r.CertificateProviderInstance.validate(); err != nil {
return err
}
}
return nil
}
func (r *ClientTlsPolicyServerValidationCaGrpcEndpoint) validate() error {
if err := dcl.Required(r, "targetUri"); err != nil {
return err
}
return nil
}
func (r *ClientTlsPolicyServerValidationCaCertificateProviderInstance) validate() error {
if err := dcl.Required(r, "pluginInstance"); err != nil {
return err
}
return nil
}
func (r *ClientTlsPolicy) basePath() string {
params := map[string]interface{}{}
return dcl.Nprintf("https://networksecurity.googleapis.com/v1alpha1/", params)
}
func (r *ClientTlsPolicy) getURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ClientTlsPolicy) listURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies", nr.basePath(), userBasePath, params), nil
}
func (r *ClientTlsPolicy) createURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies?clientTlsPolicyId={{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ClientTlsPolicy) deleteURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ClientTlsPolicy) SetPolicyURL(userBasePath string) string {
nr := r.urlNormalized()
fields := map[string]interface{}{
"project": *nr.Project,
"location": *nr.Location,
"name": *nr.Name,
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}:setIamPolicy", nr.basePath(), userBasePath, fields)
}
func (r *ClientTlsPolicy) SetPolicyVerb() string {
return "POST"
}
func (r *ClientTlsPolicy) getPolicyURL(userBasePath string) string {
nr := r.urlNormalized()
fields := map[string]interface{}{
"project": *nr.Project,
"location": *nr.Location,
"name": *nr.Name,
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}:getIamPolicy", nr.basePath(), userBasePath, fields)
}
func (r *ClientTlsPolicy) IAMPolicyVersion() int {
return 3
}
// clientTlsPolicyApiOperation represents a mutable operation in the underlying REST
// API such as Create, Update, or Delete.
type clientTlsPolicyApiOperation interface {
do(context.Context, *ClientTlsPolicy, *Client) error
}
// newUpdateClientTlsPolicyUpdateClientTlsPolicyRequest creates a request for an
// ClientTlsPolicy resource's UpdateClientTlsPolicy update type by filling in the update
// fields based on the intended state of the resource.
func newUpdateClientTlsPolicyUpdateClientTlsPolicyRequest(ctx context.Context, f *ClientTlsPolicy, c *Client) (map[string]interface{}, error) {
req := map[string]interface{}{}
res := f
_ = res
if v := f.Description; !dcl.IsEmptyValueIndirect(v) {
req["description"] = v
}
if v := f.Labels; !dcl.IsEmptyValueIndirect(v) {
req["labels"] = v
}
if v := f.Sni; !dcl.IsEmptyValueIndirect(v) {
req["sni"] = v
}
if v, err := expandClientTlsPolicyClientCertificate(c, f.ClientCertificate, res); err != nil {
return nil, fmt.Errorf("error expanding ClientCertificate into clientCertificate: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
req["clientCertificate"] = v
}
if v, err := expandClientTlsPolicyServerValidationCaSlice(c, f.ServerValidationCa, res); err != nil {
return nil, fmt.Errorf("error expanding ServerValidationCa into serverValidationCa: %w", err)
} else if v != nil {
req["serverValidationCa"] = v
}
return req, nil
}
// marshalUpdateClientTlsPolicyUpdateClientTlsPolicyRequest converts the update into
// the final JSON request body.
func marshalUpdateClientTlsPolicyUpdateClientTlsPolicyRequest(c *Client, m map[string]interface{}) ([]byte, error) {
return json.Marshal(m)
}
type updateClientTlsPolicyUpdateClientTlsPolicyOperation struct {
// If the update operation has the REQUIRES_APPLY_OPTIONS trait, this will be populated.
// Usually it will be nil - this is to prevent us from accidentally depending on apply
// options, which should usually be unnecessary.
ApplyOptions []dcl.ApplyOption
FieldDiffs []*dcl.FieldDiff
}
// do creates a request and sends it to the appropriate URL. In most operations,
// do will transcribe a subset of the resource into a request object and send a
// PUT request to a single URL.
func (op *updateClientTlsPolicyUpdateClientTlsPolicyOperation) do(ctx context.Context, r *ClientTlsPolicy, c *Client) error {
_, err := c.GetClientTlsPolicy(ctx, r)
if err != nil {
return err
}
u, err := r.updateURL(c.Config.BasePath, "UpdateClientTlsPolicy")
if err != nil {
return err
}
req, err := newUpdateClientTlsPolicyUpdateClientTlsPolicyRequest(ctx, r, c)
if err != nil {
return err
}
c.Config.Logger.InfoWithContextf(ctx, "Created update: %#v", req)
body, err := marshalUpdateClientTlsPolicyUpdateClientTlsPolicyRequest(c, req)
if err != nil {
return err
}
resp, err := dcl.SendRequest(ctx, c.Config, "PATCH", u, bytes.NewBuffer(body), c.Config.RetryProvider)
if err != nil {
return err
}
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
err = o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET")
if err != nil {
return err
}
return nil
}
func (c *Client) listClientTlsPolicyRaw(ctx context.Context, r *ClientTlsPolicy, pageToken string, pageSize int32) ([]byte, error) {
u, err := r.urlNormalized().listURL(c.Config.BasePath)
if err != nil {
return nil, err
}
m := make(map[string]string)
if pageToken != "" {
m["pageToken"] = pageToken
}
if pageSize != ClientTlsPolicyMaxPage {
m["pageSize"] = fmt.Sprintf("%v", pageSize)
}
u, err = dcl.AddQueryParams(u, m)
if err != nil {
return nil, err
}
resp, err := dcl.SendRequest(ctx, c.Config, "GET", u, &bytes.Buffer{}, c.Config.RetryProvider)
if err != nil {
return nil, err
}
defer resp.Response.Body.Close()
return ioutil.ReadAll(resp.Response.Body)
}
type listClientTlsPolicyOperation struct {
ClientTlsPolicies []map[string]interface{} `json:"clientTlsPolicies"`
Token string `json:"nextPageToken"`
}
func (c *Client) listClientTlsPolicy(ctx context.Context, r *ClientTlsPolicy, pageToken string, pageSize int32) ([]*ClientTlsPolicy, string, error) {
b, err := c.listClientTlsPolicyRaw(ctx, r, pageToken, pageSize)
if err != nil {
return nil, "", err
}
var m listClientTlsPolicyOperation
if err := json.Unmarshal(b, &m); err != nil {
return nil, "", err
}
var l []*ClientTlsPolicy
for _, v := range m.ClientTlsPolicies {
res, err := unmarshalMapClientTlsPolicy(v, c, r)
if err != nil {
return nil, m.Token, err
}
res.Project = r.Project
res.Location = r.Location
l = append(l, res)
}
return l, m.Token, nil
}
func (c *Client) deleteAllClientTlsPolicy(ctx context.Context, f func(*ClientTlsPolicy) bool, resources []*ClientTlsPolicy) error {
var errors []string
for _, res := range resources {
if f(res) {
// We do not want deleteAll to fail on a deletion or else it will stop deleting other resources.
err := c.DeleteClientTlsPolicy(ctx, res)
if err != nil {
errors = append(errors, err.Error())
}
}
}
if len(errors) > 0 {
return fmt.Errorf("%v", strings.Join(errors, "\n"))
} else {
return nil
}
}
type deleteClientTlsPolicyOperation struct{}
func (op *deleteClientTlsPolicyOperation) do(ctx context.Context, r *ClientTlsPolicy, c *Client) error {
r, err := c.GetClientTlsPolicy(ctx, r)
if err != nil {
if dcl.IsNotFound(err) {
c.Config.Logger.InfoWithContextf(ctx, "ClientTlsPolicy not found, returning. Original error: %v", err)
return nil
}
c.Config.Logger.WarningWithContextf(ctx, "GetClientTlsPolicy checking for existence. error: %v", err)
return err
}
u, err := r.deleteURL(c.Config.BasePath)
if err != nil {
return err
}
// Delete should never have a body
body := &bytes.Buffer{}
resp, err := dcl.SendRequest(ctx, c.Config, "DELETE", u, body, c.Config.RetryProvider)
if err != nil {
return err
}
// wait for object to be deleted.
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
if err := o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET"); err != nil {
return err
}
// We saw a race condition where for some successful delete operation, the Get calls returned resources for a short duration.
// This is the reason we are adding retry to handle that case.
retriesRemaining := 10
dcl.Do(ctx, func(ctx context.Context) (*dcl.RetryDetails, error) {
_, err := c.GetClientTlsPolicy(ctx, r)
if dcl.IsNotFound(err) {
return nil, nil
}
if retriesRemaining > 0 {
retriesRemaining--
return &dcl.RetryDetails{}, dcl.OperationNotDone{}
}
return nil, dcl.NotDeletedError{ExistingResource: r}
}, c.Config.RetryProvider)
return nil
}
// Create operations are similar to Update operations, although they do not have
// specific request objects. The Create request object is the json encoding of
// the resource, which is modified by res.marshal to form the base request body.
type createClientTlsPolicyOperation struct {
response map[string]interface{}
}
func (op *createClientTlsPolicyOperation) FirstResponse() (map[string]interface{}, bool) {
return op.response, len(op.response) > 0
}
func (op *createClientTlsPolicyOperation) do(ctx context.Context, r *ClientTlsPolicy, c *Client) error {
c.Config.Logger.InfoWithContextf(ctx, "Attempting to create %v", r)
u, err := r.createURL(c.Config.BasePath)
if err != nil {
return err
}
req, err := r.marshal(c)
if err != nil {
return err
}
resp, err := dcl.SendRequest(ctx, c.Config, "POST", u, bytes.NewBuffer(req), c.Config.RetryProvider)
if err != nil {
return err
}
// wait for object to be created.
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
if err := o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET"); err != nil {
c.Config.Logger.Warningf("Creation failed after waiting for operation: %v", err)
return err
}
c.Config.Logger.InfoWithContextf(ctx, "Successfully waited for operation")
op.response, _ = o.FirstResponse()
if _, err := c.GetClientTlsPolicy(ctx, r); err != nil {
c.Config.Logger.WarningWithContextf(ctx, "get returned error: %v", err)
return err
}
return nil
}
func (c *Client) getClientTlsPolicyRaw(ctx context.Context, r *ClientTlsPolicy) ([]byte, error) {
u, err := r.getURL(c.Config.BasePath)
if err != nil {
return nil, err
}
resp, err := dcl.SendRequest(ctx, c.Config, "GET", u, &bytes.Buffer{}, c.Config.RetryProvider)
if err != nil {
return nil, err
}
defer resp.Response.Body.Close()
b, err := ioutil.ReadAll(resp.Response.Body)
if err != nil {
return nil, err
}
return b, nil
}
func (c *Client) clientTlsPolicyDiffsForRawDesired(ctx context.Context, rawDesired *ClientTlsPolicy, opts ...dcl.ApplyOption) (initial, desired *ClientTlsPolicy, diffs []*dcl.FieldDiff, err error) {
c.Config.Logger.InfoWithContext(ctx, "Fetching initial state...")
// First, let us see if the user provided a state hint. If they did, we will start fetching based on that.
var fetchState *ClientTlsPolicy
if sh := dcl.FetchStateHint(opts); sh != nil {
if r, ok := sh.(*ClientTlsPolicy); !ok {
c.Config.Logger.WarningWithContextf(ctx, "Initial state hint was of the wrong type; expected ClientTlsPolicy, got %T", sh)
} else {
fetchState = r
}
}
if fetchState == nil {
fetchState = rawDesired
}
// 1.2: Retrieval of raw initial state from API
rawInitial, err := c.GetClientTlsPolicy(ctx, fetchState)
if rawInitial == nil {
if !dcl.IsNotFound(err) {
c.Config.Logger.WarningWithContextf(ctx, "Failed to retrieve whether a ClientTlsPolicy resource already exists: %s", err)
return nil, nil, nil, fmt.Errorf("failed to retrieve ClientTlsPolicy resource: %v", err)
}
c.Config.Logger.InfoWithContext(ctx, "Found that ClientTlsPolicy resource did not exist.")
// Perform canonicalization to pick up defaults.
desired, err = canonicalizeClientTlsPolicyDesiredState(rawDesired, rawInitial)
return nil, desired, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Found initial state for ClientTlsPolicy: %v", rawInitial)
c.Config.Logger.InfoWithContextf(ctx, "Initial desired state for ClientTlsPolicy: %v", rawDesired)
// The Get call applies postReadExtract and so the result may contain fields that are not part of API version.
if err := extractClientTlsPolicyFields(rawInitial); err != nil {
return nil, nil, nil, err
}
// 1.3: Canonicalize raw initial state into initial state.
initial, err = canonicalizeClientTlsPolicyInitialState(rawInitial, rawDesired)
if err != nil {
return nil, nil, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Canonicalized initial state for ClientTlsPolicy: %v", initial)
// 1.4: Canonicalize raw desired state into desired state.
desired, err = canonicalizeClientTlsPolicyDesiredState(rawDesired, rawInitial, opts...)
if err != nil {
return nil, nil, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Canonicalized desired state for ClientTlsPolicy: %v", desired)
// 2.1: Comparison of initial and desired state.
diffs, err = diffClientTlsPolicy(c, desired, initial, opts...)
return initial, desired, diffs, err
}
func canonicalizeClientTlsPolicyInitialState(rawInitial, rawDesired *ClientTlsPolicy) (*ClientTlsPolicy, error) {
// TODO(magic-modules-eng): write canonicalizer once relevant traits are added.
return rawInitial, nil
}
/*
* Canonicalizers
*
* These are responsible for converting either a user-specified config or a
* GCP API response to a standard format that can be used for difference checking.
* */
func canonicalizeClientTlsPolicyDesiredState(rawDesired, rawInitial *ClientTlsPolicy, opts ...dcl.ApplyOption) (*ClientTlsPolicy, error) {
if rawInitial == nil {
// Since the initial state is empty, the desired state is all we have.
// We canonicalize the remaining nested objects with nil to pick up defaults.
rawDesired.ClientCertificate = canonicalizeClientTlsPolicyClientCertificate(rawDesired.ClientCertificate, nil, opts...)
return rawDesired, nil
}
canonicalDesired := &ClientTlsPolicy{}
if dcl.PartialSelfLinkToSelfLink(rawDesired.Name, rawInitial.Name) {
canonicalDesired.Name = rawInitial.Name
} else {
canonicalDesired.Name = rawDesired.Name
}
if dcl.StringCanonicalize(rawDesired.Description, rawInitial.Description) {
canonicalDesired.Description = rawInitial.Description
} else {
canonicalDesired.Description = rawDesired.Description
}
if dcl.IsZeroValue(rawDesired.Labels) || (dcl.IsEmptyValueIndirect(rawDesired.Labels) && dcl.IsEmptyValueIndirect(rawInitial.Labels)) {
// Desired and initial values are equivalent, so set canonical desired value to initial value.
canonicalDesired.Labels = rawInitial.Labels
} else {
canonicalDesired.Labels = rawDesired.Labels
}
if dcl.StringCanonicalize(rawDesired.Sni, rawInitial.Sni) {
canonicalDesired.Sni = rawInitial.Sni
} else {
canonicalDesired.Sni = rawDesired.Sni
}
canonicalDesired.ClientCertificate = canonicalizeClientTlsPolicyClientCertificate(rawDesired.ClientCertificate, rawInitial.ClientCertificate, opts...)
canonicalDesired.ServerValidationCa = canonicalizeClientTlsPolicyServerValidationCaSlice(rawDesired.ServerValidationCa, rawInitial.ServerValidationCa, opts...)
if dcl.NameToSelfLink(rawDesired.Project, rawInitial.Project) {
canonicalDesired.Project = rawInitial.Project
} else {
canonicalDesired.Project = rawDesired.Project
}
if dcl.NameToSelfLink(rawDesired.Location, rawInitial.Location) {
canonicalDesired.Location = rawInitial.Location
} else {
canonicalDesired.Location = rawDesired.Location
}
return canonicalDesired, nil
}
func canonicalizeClientTlsPolicyNewState(c *Client, rawNew, rawDesired *ClientTlsPolicy) (*ClientTlsPolicy, error) {
if dcl.IsEmptyValueIndirect(rawNew.Name) && dcl.IsEmptyValueIndirect(rawDesired.Name) {
rawNew.Name = rawDesired.Name
} else {
if dcl.PartialSelfLinkToSelfLink(rawDesired.Name, rawNew.Name) {
rawNew.Name = rawDesired.Name
}
}
if dcl.IsEmptyValueIndirect(rawNew.Description) && dcl.IsEmptyValueIndirect(rawDesired.Description) {
rawNew.Description = rawDesired.Description
} else {
if dcl.StringCanonicalize(rawDesired.Description, rawNew.Description) {
rawNew.Description = rawDesired.Description
}
}
if dcl.IsEmptyValueIndirect(rawNew.CreateTime) && dcl.IsEmptyValueIndirect(rawDesired.CreateTime) {
rawNew.CreateTime = rawDesired.CreateTime
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.UpdateTime) && dcl.IsEmptyValueIndirect(rawDesired.UpdateTime) {
rawNew.UpdateTime = rawDesired.UpdateTime
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.Labels) && dcl.IsEmptyValueIndirect(rawDesired.Labels) {
rawNew.Labels = rawDesired.Labels
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.Sni) && dcl.IsEmptyValueIndirect(rawDesired.Sni) {
rawNew.Sni = rawDesired.Sni
} else {
if dcl.StringCanonicalize(rawDesired.Sni, rawNew.Sni) {
rawNew.Sni = rawDesired.Sni
}
}
if dcl.IsEmptyValueIndirect(rawNew.ClientCertificate) && dcl.IsEmptyValueIndirect(rawDesired.ClientCertificate) {
rawNew.ClientCertificate = rawDesired.ClientCertificate
} else {
rawNew.ClientCertificate = canonicalizeNewClientTlsPolicyClientCertificate(c, rawDesired.ClientCertificate, rawNew.ClientCertificate)
}
if dcl.IsEmptyValueIndirect(rawNew.ServerValidationCa) && dcl.IsEmptyValueIndirect(rawDesired.ServerValidationCa) {
rawNew.ServerValidationCa = rawDesired.ServerValidationCa
} else {
rawNew.ServerValidationCa = canonicalizeNewClientTlsPolicyServerValidationCaSlice(c, rawDesired.ServerValidationCa, rawNew.ServerValidationCa)
}
rawNew.Project = rawDesired.Project
rawNew.Location = rawDesired.Location
return rawNew, nil
}
func canonicalizeClientTlsPolicyClientCertificate(des, initial *ClientTlsPolicyClientCertificate, opts ...dcl.ApplyOption) *ClientTlsPolicyClientCertificate {
if des == nil {
return initial
}
if des.empty {
return des
}
if des.LocalFilepath != nil || (initial != nil && initial.LocalFilepath != nil) {
// Check if anything else is set.
if dcl.AnySet(des.GrpcEndpoint, des.CertificateProviderInstance) {
des.LocalFilepath = nil
if initial != nil {
initial.LocalFilepath = nil
}
}
}
if des.GrpcEndpoint != nil || (initial != nil && initial.GrpcEndpoint != nil) {
// Check if anything else is set.
if dcl.AnySet(des.LocalFilepath, des.CertificateProviderInstance) {
des.GrpcEndpoint = nil
if initial != nil {
initial.GrpcEndpoint = nil
}
}
}
if des.CertificateProviderInstance != nil || (initial != nil && initial.CertificateProviderInstance != nil) {
// Check if anything else is set.
if dcl.AnySet(des.LocalFilepath, des.GrpcEndpoint) {
des.CertificateProviderInstance = nil
if initial != nil {
initial.CertificateProviderInstance = nil
}
}
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyClientCertificate{}
cDes.LocalFilepath = canonicalizeClientTlsPolicyClientCertificateLocalFilepath(des.LocalFilepath, initial.LocalFilepath, opts...)
cDes.GrpcEndpoint = canonicalizeClientTlsPolicyClientCertificateGrpcEndpoint(des.GrpcEndpoint, initial.GrpcEndpoint, opts...)
cDes.CertificateProviderInstance = canonicalizeClientTlsPolicyClientCertificateCertificateProviderInstance(des.CertificateProviderInstance, initial.CertificateProviderInstance, opts...)
return cDes
}
func canonicalizeClientTlsPolicyClientCertificateSlice(des, initial []ClientTlsPolicyClientCertificate, opts ...dcl.ApplyOption) []ClientTlsPolicyClientCertificate {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyClientCertificate, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificate(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyClientCertificate, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificate(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyClientCertificate(c *Client, des, nw *ClientTlsPolicyClientCertificate) *ClientTlsPolicyClientCertificate {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyClientCertificate while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
nw.LocalFilepath = canonicalizeNewClientTlsPolicyClientCertificateLocalFilepath(c, des.LocalFilepath, nw.LocalFilepath)
nw.GrpcEndpoint = canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpoint(c, des.GrpcEndpoint, nw.GrpcEndpoint)
nw.CertificateProviderInstance = canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstance(c, des.CertificateProviderInstance, nw.CertificateProviderInstance)
return nw
}
func canonicalizeNewClientTlsPolicyClientCertificateSet(c *Client, des, nw []ClientTlsPolicyClientCertificate) []ClientTlsPolicyClientCertificate {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyClientCertificate
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyClientCertificateNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificate(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateSlice(c *Client, des, nw []ClientTlsPolicyClientCertificate) []ClientTlsPolicyClientCertificate {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyClientCertificate
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificate(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyClientCertificateLocalFilepath(des, initial *ClientTlsPolicyClientCertificateLocalFilepath, opts ...dcl.ApplyOption) *ClientTlsPolicyClientCertificateLocalFilepath {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyClientCertificateLocalFilepath{}
if dcl.StringCanonicalize(des.CertificatePath, initial.CertificatePath) || dcl.IsZeroValue(des.CertificatePath) {
cDes.CertificatePath = initial.CertificatePath
} else {
cDes.CertificatePath = des.CertificatePath
}
if dcl.StringCanonicalize(des.PrivateKeyPath, initial.PrivateKeyPath) || dcl.IsZeroValue(des.PrivateKeyPath) {
cDes.PrivateKeyPath = initial.PrivateKeyPath
} else {
cDes.PrivateKeyPath = des.PrivateKeyPath
}
return cDes
}
func canonicalizeClientTlsPolicyClientCertificateLocalFilepathSlice(des, initial []ClientTlsPolicyClientCertificateLocalFilepath, opts ...dcl.ApplyOption) []ClientTlsPolicyClientCertificateLocalFilepath {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyClientCertificateLocalFilepath, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateLocalFilepath(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyClientCertificateLocalFilepath, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateLocalFilepath(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateLocalFilepath(c *Client, des, nw *ClientTlsPolicyClientCertificateLocalFilepath) *ClientTlsPolicyClientCertificateLocalFilepath {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyClientCertificateLocalFilepath while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.CertificatePath, nw.CertificatePath) {
nw.CertificatePath = des.CertificatePath
}
if dcl.StringCanonicalize(des.PrivateKeyPath, nw.PrivateKeyPath) {
nw.PrivateKeyPath = des.PrivateKeyPath
}
return nw
}
func canonicalizeNewClientTlsPolicyClientCertificateLocalFilepathSet(c *Client, des, nw []ClientTlsPolicyClientCertificateLocalFilepath) []ClientTlsPolicyClientCertificateLocalFilepath {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyClientCertificateLocalFilepath
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyClientCertificateLocalFilepathNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateLocalFilepath(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateLocalFilepathSlice(c *Client, des, nw []ClientTlsPolicyClientCertificateLocalFilepath) []ClientTlsPolicyClientCertificateLocalFilepath {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyClientCertificateLocalFilepath
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateLocalFilepath(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyClientCertificateGrpcEndpoint(des, initial *ClientTlsPolicyClientCertificateGrpcEndpoint, opts ...dcl.ApplyOption) *ClientTlsPolicyClientCertificateGrpcEndpoint {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyClientCertificateGrpcEndpoint{}
if dcl.StringCanonicalize(des.TargetUri, initial.TargetUri) || dcl.IsZeroValue(des.TargetUri) {
cDes.TargetUri = initial.TargetUri
} else {
cDes.TargetUri = des.TargetUri
}
return cDes
}
func canonicalizeClientTlsPolicyClientCertificateGrpcEndpointSlice(des, initial []ClientTlsPolicyClientCertificateGrpcEndpoint, opts ...dcl.ApplyOption) []ClientTlsPolicyClientCertificateGrpcEndpoint {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyClientCertificateGrpcEndpoint, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateGrpcEndpoint(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyClientCertificateGrpcEndpoint, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateGrpcEndpoint(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpoint(c *Client, des, nw *ClientTlsPolicyClientCertificateGrpcEndpoint) *ClientTlsPolicyClientCertificateGrpcEndpoint {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyClientCertificateGrpcEndpoint while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.TargetUri, nw.TargetUri) {
nw.TargetUri = des.TargetUri
}
return nw
}
func canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpointSet(c *Client, des, nw []ClientTlsPolicyClientCertificateGrpcEndpoint) []ClientTlsPolicyClientCertificateGrpcEndpoint {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyClientCertificateGrpcEndpoint
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyClientCertificateGrpcEndpointNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpoint(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpointSlice(c *Client, des, nw []ClientTlsPolicyClientCertificateGrpcEndpoint) []ClientTlsPolicyClientCertificateGrpcEndpoint {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyClientCertificateGrpcEndpoint
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateGrpcEndpoint(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyClientCertificateCertificateProviderInstance(des, initial *ClientTlsPolicyClientCertificateCertificateProviderInstance, opts ...dcl.ApplyOption) *ClientTlsPolicyClientCertificateCertificateProviderInstance {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyClientCertificateCertificateProviderInstance{}
if dcl.StringCanonicalize(des.PluginInstance, initial.PluginInstance) || dcl.IsZeroValue(des.PluginInstance) {
cDes.PluginInstance = initial.PluginInstance
} else {
cDes.PluginInstance = des.PluginInstance
}
return cDes
}
func canonicalizeClientTlsPolicyClientCertificateCertificateProviderInstanceSlice(des, initial []ClientTlsPolicyClientCertificateCertificateProviderInstance, opts ...dcl.ApplyOption) []ClientTlsPolicyClientCertificateCertificateProviderInstance {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyClientCertificateCertificateProviderInstance, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateCertificateProviderInstance(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyClientCertificateCertificateProviderInstance, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyClientCertificateCertificateProviderInstance(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstance(c *Client, des, nw *ClientTlsPolicyClientCertificateCertificateProviderInstance) *ClientTlsPolicyClientCertificateCertificateProviderInstance {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyClientCertificateCertificateProviderInstance while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.PluginInstance, nw.PluginInstance) {
nw.PluginInstance = des.PluginInstance
}
return nw
}
func canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstanceSet(c *Client, des, nw []ClientTlsPolicyClientCertificateCertificateProviderInstance) []ClientTlsPolicyClientCertificateCertificateProviderInstance {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyClientCertificateCertificateProviderInstance
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyClientCertificateCertificateProviderInstanceNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstance(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstanceSlice(c *Client, des, nw []ClientTlsPolicyClientCertificateCertificateProviderInstance) []ClientTlsPolicyClientCertificateCertificateProviderInstance {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyClientCertificateCertificateProviderInstance
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyClientCertificateCertificateProviderInstance(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyServerValidationCa(des, initial *ClientTlsPolicyServerValidationCa, opts ...dcl.ApplyOption) *ClientTlsPolicyServerValidationCa {
if des == nil {
return initial
}
if des.empty {
return des
}
if des.CaCertPath != nil || (initial != nil && initial.CaCertPath != nil) {
// Check if anything else is set.
if dcl.AnySet(des.GrpcEndpoint, des.CertificateProviderInstance) {
des.CaCertPath = nil
if initial != nil {
initial.CaCertPath = nil
}
}
}
if des.GrpcEndpoint != nil || (initial != nil && initial.GrpcEndpoint != nil) {
// Check if anything else is set.
if dcl.AnySet(des.CaCertPath, des.CertificateProviderInstance) {
des.GrpcEndpoint = nil
if initial != nil {
initial.GrpcEndpoint = nil
}
}
}
if des.CertificateProviderInstance != nil || (initial != nil && initial.CertificateProviderInstance != nil) {
// Check if anything else is set.
if dcl.AnySet(des.CaCertPath, des.GrpcEndpoint) {
des.CertificateProviderInstance = nil
if initial != nil {
initial.CertificateProviderInstance = nil
}
}
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyServerValidationCa{}
if dcl.StringCanonicalize(des.CaCertPath, initial.CaCertPath) || dcl.IsZeroValue(des.CaCertPath) {
cDes.CaCertPath = initial.CaCertPath
} else {
cDes.CaCertPath = des.CaCertPath
}
cDes.GrpcEndpoint = canonicalizeClientTlsPolicyServerValidationCaGrpcEndpoint(des.GrpcEndpoint, initial.GrpcEndpoint, opts...)
cDes.CertificateProviderInstance = canonicalizeClientTlsPolicyServerValidationCaCertificateProviderInstance(des.CertificateProviderInstance, initial.CertificateProviderInstance, opts...)
return cDes
}
func canonicalizeClientTlsPolicyServerValidationCaSlice(des, initial []ClientTlsPolicyServerValidationCa, opts ...dcl.ApplyOption) []ClientTlsPolicyServerValidationCa {
if des == nil {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyServerValidationCa, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCa(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyServerValidationCa, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCa(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCa(c *Client, des, nw *ClientTlsPolicyServerValidationCa) *ClientTlsPolicyServerValidationCa {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyServerValidationCa while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.CaCertPath, nw.CaCertPath) {
nw.CaCertPath = des.CaCertPath
}
nw.GrpcEndpoint = canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpoint(c, des.GrpcEndpoint, nw.GrpcEndpoint)
nw.CertificateProviderInstance = canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstance(c, des.CertificateProviderInstance, nw.CertificateProviderInstance)
return nw
}
func canonicalizeNewClientTlsPolicyServerValidationCaSet(c *Client, des, nw []ClientTlsPolicyServerValidationCa) []ClientTlsPolicyServerValidationCa {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyServerValidationCa
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyServerValidationCaNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCa(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCaSlice(c *Client, des, nw []ClientTlsPolicyServerValidationCa) []ClientTlsPolicyServerValidationCa {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyServerValidationCa
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCa(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyServerValidationCaGrpcEndpoint(des, initial *ClientTlsPolicyServerValidationCaGrpcEndpoint, opts ...dcl.ApplyOption) *ClientTlsPolicyServerValidationCaGrpcEndpoint {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyServerValidationCaGrpcEndpoint{}
if dcl.StringCanonicalize(des.TargetUri, initial.TargetUri) || dcl.IsZeroValue(des.TargetUri) {
cDes.TargetUri = initial.TargetUri
} else {
cDes.TargetUri = des.TargetUri
}
return cDes
}
func canonicalizeClientTlsPolicyServerValidationCaGrpcEndpointSlice(des, initial []ClientTlsPolicyServerValidationCaGrpcEndpoint, opts ...dcl.ApplyOption) []ClientTlsPolicyServerValidationCaGrpcEndpoint {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyServerValidationCaGrpcEndpoint, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCaGrpcEndpoint(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyServerValidationCaGrpcEndpoint, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCaGrpcEndpoint(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpoint(c *Client, des, nw *ClientTlsPolicyServerValidationCaGrpcEndpoint) *ClientTlsPolicyServerValidationCaGrpcEndpoint {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyServerValidationCaGrpcEndpoint while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.TargetUri, nw.TargetUri) {
nw.TargetUri = des.TargetUri
}
return nw
}
func canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpointSet(c *Client, des, nw []ClientTlsPolicyServerValidationCaGrpcEndpoint) []ClientTlsPolicyServerValidationCaGrpcEndpoint {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyServerValidationCaGrpcEndpoint
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyServerValidationCaGrpcEndpointNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpoint(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpointSlice(c *Client, des, nw []ClientTlsPolicyServerValidationCaGrpcEndpoint) []ClientTlsPolicyServerValidationCaGrpcEndpoint {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyServerValidationCaGrpcEndpoint
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCaGrpcEndpoint(c, &d, &n))
}
return items
}
func canonicalizeClientTlsPolicyServerValidationCaCertificateProviderInstance(des, initial *ClientTlsPolicyServerValidationCaCertificateProviderInstance, opts ...dcl.ApplyOption) *ClientTlsPolicyServerValidationCaCertificateProviderInstance {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
if dcl.StringCanonicalize(des.PluginInstance, initial.PluginInstance) || dcl.IsZeroValue(des.PluginInstance) {
cDes.PluginInstance = initial.PluginInstance
} else {
cDes.PluginInstance = des.PluginInstance
}
return cDes
}
func canonicalizeClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice(des, initial []ClientTlsPolicyServerValidationCaCertificateProviderInstance, opts ...dcl.ApplyOption) []ClientTlsPolicyServerValidationCaCertificateProviderInstance {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ClientTlsPolicyServerValidationCaCertificateProviderInstance, 0, len(des))
for _, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCaCertificateProviderInstance(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ClientTlsPolicyServerValidationCaCertificateProviderInstance, 0, len(des))
for i, d := range des {
cd := canonicalizeClientTlsPolicyServerValidationCaCertificateProviderInstance(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstance(c *Client, des, nw *ClientTlsPolicyServerValidationCaCertificateProviderInstance) *ClientTlsPolicyServerValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ClientTlsPolicyServerValidationCaCertificateProviderInstance while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.PluginInstance, nw.PluginInstance) {
nw.PluginInstance = des.PluginInstance
}
return nw
}
func canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstanceSet(c *Client, des, nw []ClientTlsPolicyServerValidationCaCertificateProviderInstance) []ClientTlsPolicyServerValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ClientTlsPolicyServerValidationCaCertificateProviderInstance
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareClientTlsPolicyServerValidationCaCertificateProviderInstanceNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstance(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice(c *Client, des, nw []ClientTlsPolicyServerValidationCaCertificateProviderInstance) []ClientTlsPolicyServerValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ClientTlsPolicyServerValidationCaCertificateProviderInstance
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewClientTlsPolicyServerValidationCaCertificateProviderInstance(c, &d, &n))
}
return items
}
// The differ returns a list of diffs, along with a list of operations that should be taken
// to remedy them. Right now, it does not attempt to consolidate operations - if several
// fields can be fixed with a patch update, it will perform the patch several times.
// Diffs on some fields will be ignored if the `desired` state has an empty (nil)
// value. This empty value indicates that the user does not care about the state for
// the field. Empty fields on the actual object will cause diffs.
// TODO(magic-modules-eng): for efficiency in some resources, add batching.
func diffClientTlsPolicy(c *Client, desired, actual *ClientTlsPolicy, opts ...dcl.ApplyOption) ([]*dcl.FieldDiff, error) {
if desired == nil || actual == nil {
return nil, fmt.Errorf("nil resource passed to diff - always a programming error: %#v, %#v", desired, actual)
}
c.Config.Logger.Infof("Diff function called with desired state: %v", desired)
c.Config.Logger.Infof("Diff function called with actual state: %v", actual)
var fn dcl.FieldName
var newDiffs []*dcl.FieldDiff
// New style diffs.
if ds, err := dcl.Diff(desired.Name, actual.Name, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Name")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Description, actual.Description, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateClientTlsPolicyUpdateClientTlsPolicyOperation")}, fn.AddNest("Description")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.CreateTime, actual.CreateTime, dcl.DiffInfo{OutputOnly: true, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CreateTime")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.UpdateTime, actual.UpdateTime, dcl.DiffInfo{OutputOnly: true, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("UpdateTime")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Labels, actual.Labels, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateClientTlsPolicyUpdateClientTlsPolicyOperation")}, fn.AddNest("Labels")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Sni, actual.Sni, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateClientTlsPolicyUpdateClientTlsPolicyOperation")}, fn.AddNest("Sni")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.ClientCertificate, actual.ClientCertificate, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyClientCertificateNewStyle, EmptyObject: EmptyClientTlsPolicyClientCertificate, OperationSelector: dcl.TriggersOperation("updateClientTlsPolicyUpdateClientTlsPolicyOperation")}, fn.AddNest("ClientCertificate")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.ServerValidationCa, actual.ServerValidationCa, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyServerValidationCaNewStyle, EmptyObject: EmptyClientTlsPolicyServerValidationCa, OperationSelector: dcl.TriggersOperation("updateClientTlsPolicyUpdateClientTlsPolicyOperation")}, fn.AddNest("ServerValidationCa")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Project, actual.Project, dcl.DiffInfo{Type: "ReferenceType", OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Project")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Location, actual.Location, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Location")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if len(newDiffs) > 0 {
c.Config.Logger.Infof("Diff function found diffs: %v", newDiffs)
}
return newDiffs, nil
}
func compareClientTlsPolicyClientCertificateNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyClientCertificate)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyClientCertificate)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificate or *ClientTlsPolicyClientCertificate", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyClientCertificate)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyClientCertificate)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificate", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.LocalFilepath, actual.LocalFilepath, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyClientCertificateLocalFilepathNewStyle, EmptyObject: EmptyClientTlsPolicyClientCertificateLocalFilepath, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("LocalFilepath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.GrpcEndpoint, actual.GrpcEndpoint, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyClientCertificateGrpcEndpointNewStyle, EmptyObject: EmptyClientTlsPolicyClientCertificateGrpcEndpoint, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("GrpcEndpoint")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.CertificateProviderInstance, actual.CertificateProviderInstance, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyClientCertificateCertificateProviderInstanceNewStyle, EmptyObject: EmptyClientTlsPolicyClientCertificateCertificateProviderInstance, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificateProviderInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyClientCertificateLocalFilepathNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyClientCertificateLocalFilepath)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyClientCertificateLocalFilepath)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateLocalFilepath or *ClientTlsPolicyClientCertificateLocalFilepath", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyClientCertificateLocalFilepath)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyClientCertificateLocalFilepath)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateLocalFilepath", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.CertificatePath, actual.CertificatePath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificatePath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.PrivateKeyPath, actual.PrivateKeyPath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PrivateKeyPath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyClientCertificateGrpcEndpointNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyClientCertificateGrpcEndpoint)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyClientCertificateGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateGrpcEndpoint or *ClientTlsPolicyClientCertificateGrpcEndpoint", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyClientCertificateGrpcEndpoint)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyClientCertificateGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateGrpcEndpoint", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.TargetUri, actual.TargetUri, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("TargetUri")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyClientCertificateCertificateProviderInstanceNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyClientCertificateCertificateProviderInstance)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyClientCertificateCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateCertificateProviderInstance or *ClientTlsPolicyClientCertificateCertificateProviderInstance", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyClientCertificateCertificateProviderInstance)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyClientCertificateCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyClientCertificateCertificateProviderInstance", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.PluginInstance, actual.PluginInstance, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PluginInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyServerValidationCaNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyServerValidationCa)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyServerValidationCa)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCa or *ClientTlsPolicyServerValidationCa", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyServerValidationCa)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyServerValidationCa)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCa", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.CaCertPath, actual.CaCertPath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CaCertPath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.GrpcEndpoint, actual.GrpcEndpoint, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyServerValidationCaGrpcEndpointNewStyle, EmptyObject: EmptyClientTlsPolicyServerValidationCaGrpcEndpoint, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("GrpcEndpoint")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.CertificateProviderInstance, actual.CertificateProviderInstance, dcl.DiffInfo{ObjectFunction: compareClientTlsPolicyServerValidationCaCertificateProviderInstanceNewStyle, EmptyObject: EmptyClientTlsPolicyServerValidationCaCertificateProviderInstance, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificateProviderInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyServerValidationCaGrpcEndpointNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyServerValidationCaGrpcEndpoint)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyServerValidationCaGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCaGrpcEndpoint or *ClientTlsPolicyServerValidationCaGrpcEndpoint", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyServerValidationCaGrpcEndpoint)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyServerValidationCaGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCaGrpcEndpoint", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.TargetUri, actual.TargetUri, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("TargetUri")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareClientTlsPolicyServerValidationCaCertificateProviderInstanceNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ClientTlsPolicyServerValidationCaCertificateProviderInstance)
if !ok {
desiredNotPointer, ok := d.(ClientTlsPolicyServerValidationCaCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCaCertificateProviderInstance or *ClientTlsPolicyServerValidationCaCertificateProviderInstance", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ClientTlsPolicyServerValidationCaCertificateProviderInstance)
if !ok {
actualNotPointer, ok := a.(ClientTlsPolicyServerValidationCaCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ClientTlsPolicyServerValidationCaCertificateProviderInstance", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.PluginInstance, actual.PluginInstance, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PluginInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
// urlNormalized returns a copy of the resource struct with values normalized
// for URL substitutions. For instance, it converts long-form self-links to
// short-form so they can be substituted in.
func (r *ClientTlsPolicy) urlNormalized() *ClientTlsPolicy {
normalized := dcl.Copy(*r).(ClientTlsPolicy)
normalized.Name = dcl.SelfLinkToName(r.Name)
normalized.Description = dcl.SelfLinkToName(r.Description)
normalized.Sni = dcl.SelfLinkToName(r.Sni)
normalized.Project = dcl.SelfLinkToName(r.Project)
normalized.Location = dcl.SelfLinkToName(r.Location)
return &normalized
}
func (r *ClientTlsPolicy) updateURL(userBasePath, updateName string) (string, error) {
nr := r.urlNormalized()
if updateName == "UpdateClientTlsPolicy" {
fields := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/clientTlsPolicies/{{name}}", nr.basePath(), userBasePath, fields), nil
}
return "", fmt.Errorf("unknown update name: %s", updateName)
}
// marshal encodes the ClientTlsPolicy resource into JSON for a Create request, and
// performs transformations from the resource schema to the API schema if
// necessary.
func (r *ClientTlsPolicy) marshal(c *Client) ([]byte, error) {
m, err := expandClientTlsPolicy(c, r)
if err != nil {
return nil, fmt.Errorf("error marshalling ClientTlsPolicy: %w", err)
}
return json.Marshal(m)
}
// unmarshalClientTlsPolicy decodes JSON responses into the ClientTlsPolicy resource schema.
func unmarshalClientTlsPolicy(b []byte, c *Client, res *ClientTlsPolicy) (*ClientTlsPolicy, error) {
var m map[string]interface{}
if err := json.Unmarshal(b, &m); err != nil {
return nil, err
}
return unmarshalMapClientTlsPolicy(m, c, res)
}
func unmarshalMapClientTlsPolicy(m map[string]interface{}, c *Client, res *ClientTlsPolicy) (*ClientTlsPolicy, error) {
flattened := flattenClientTlsPolicy(c, m, res)
if flattened == nil {
return nil, fmt.Errorf("attempted to flatten empty json object")
}
return flattened, nil
}
// expandClientTlsPolicy expands ClientTlsPolicy into a JSON request object.
func expandClientTlsPolicy(c *Client, f *ClientTlsPolicy) (map[string]interface{}, error) {
m := make(map[string]interface{})
res := f
_ = res
if v, err := dcl.DeriveField("projects/%s/locations/%s/clientTlsPolicies/%s", f.Name, dcl.SelfLinkToName(f.Project), dcl.SelfLinkToName(f.Location), dcl.SelfLinkToName(f.Name)); err != nil {
return nil, fmt.Errorf("error expanding Name into name: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["name"] = v
}
if v := f.Description; dcl.ValueShouldBeSent(v) {
m["description"] = v
}
if v := f.Labels; dcl.ValueShouldBeSent(v) {
m["labels"] = v
}
if v := f.Sni; dcl.ValueShouldBeSent(v) {
m["sni"] = v
}
if v, err := expandClientTlsPolicyClientCertificate(c, f.ClientCertificate, res); err != nil {
return nil, fmt.Errorf("error expanding ClientCertificate into clientCertificate: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["clientCertificate"] = v
}
if v, err := expandClientTlsPolicyServerValidationCaSlice(c, f.ServerValidationCa, res); err != nil {
return nil, fmt.Errorf("error expanding ServerValidationCa into serverValidationCa: %w", err)
} else if v != nil {
m["serverValidationCa"] = v
}
if v, err := dcl.EmptyValue(); err != nil {
return nil, fmt.Errorf("error expanding Project into project: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["project"] = v
}
if v, err := dcl.EmptyValue(); err != nil {
return nil, fmt.Errorf("error expanding Location into location: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["location"] = v
}
return m, nil
}
// flattenClientTlsPolicy flattens ClientTlsPolicy from a JSON request object into the
// ClientTlsPolicy type.
func flattenClientTlsPolicy(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicy {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
if len(m) == 0 {
return nil
}
resultRes := &ClientTlsPolicy{}
resultRes.Name = dcl.FlattenString(m["name"])
resultRes.Description = dcl.FlattenString(m["description"])
resultRes.CreateTime = dcl.FlattenString(m["createTime"])
resultRes.UpdateTime = dcl.FlattenString(m["updateTime"])
resultRes.Labels = dcl.FlattenKeyValuePairs(m["labels"])
resultRes.Sni = dcl.FlattenString(m["sni"])
resultRes.ClientCertificate = flattenClientTlsPolicyClientCertificate(c, m["clientCertificate"], res)
resultRes.ServerValidationCa = flattenClientTlsPolicyServerValidationCaSlice(c, m["serverValidationCa"], res)
resultRes.Project = dcl.FlattenString(m["project"])
resultRes.Location = dcl.FlattenString(m["location"])
return resultRes
}
// expandClientTlsPolicyClientCertificateMap expands the contents of ClientTlsPolicyClientCertificate into a JSON
// request object.
func expandClientTlsPolicyClientCertificateMap(c *Client, f map[string]ClientTlsPolicyClientCertificate, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyClientCertificate(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyClientCertificateSlice expands the contents of ClientTlsPolicyClientCertificate into a JSON
// request object.
func expandClientTlsPolicyClientCertificateSlice(c *Client, f []ClientTlsPolicyClientCertificate, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyClientCertificate(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyClientCertificateMap flattens the contents of ClientTlsPolicyClientCertificate from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyClientCertificate {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyClientCertificate{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyClientCertificate{}
}
items := make(map[string]ClientTlsPolicyClientCertificate)
for k, item := range a {
items[k] = *flattenClientTlsPolicyClientCertificate(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyClientCertificateSlice flattens the contents of ClientTlsPolicyClientCertificate from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyClientCertificate {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyClientCertificate{}
}
if len(a) == 0 {
return []ClientTlsPolicyClientCertificate{}
}
items := make([]ClientTlsPolicyClientCertificate, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyClientCertificate(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyClientCertificate expands an instance of ClientTlsPolicyClientCertificate into a JSON
// request object.
func expandClientTlsPolicyClientCertificate(c *Client, f *ClientTlsPolicyClientCertificate, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v, err := expandClientTlsPolicyClientCertificateLocalFilepath(c, f.LocalFilepath, res); err != nil {
return nil, fmt.Errorf("error expanding LocalFilepath into localFilepath: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["localFilepath"] = v
}
if v, err := expandClientTlsPolicyClientCertificateGrpcEndpoint(c, f.GrpcEndpoint, res); err != nil {
return nil, fmt.Errorf("error expanding GrpcEndpoint into grpcEndpoint: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["grpcEndpoint"] = v
}
if v, err := expandClientTlsPolicyClientCertificateCertificateProviderInstance(c, f.CertificateProviderInstance, res); err != nil {
return nil, fmt.Errorf("error expanding CertificateProviderInstance into certificateProviderInstance: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["certificateProviderInstance"] = v
}
return m, nil
}
// flattenClientTlsPolicyClientCertificate flattens an instance of ClientTlsPolicyClientCertificate from a JSON
// response object.
func flattenClientTlsPolicyClientCertificate(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyClientCertificate {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyClientCertificate{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyClientCertificate
}
r.LocalFilepath = flattenClientTlsPolicyClientCertificateLocalFilepath(c, m["localFilepath"], res)
r.GrpcEndpoint = flattenClientTlsPolicyClientCertificateGrpcEndpoint(c, m["grpcEndpoint"], res)
r.CertificateProviderInstance = flattenClientTlsPolicyClientCertificateCertificateProviderInstance(c, m["certificateProviderInstance"], res)
return r
}
// expandClientTlsPolicyClientCertificateLocalFilepathMap expands the contents of ClientTlsPolicyClientCertificateLocalFilepath into a JSON
// request object.
func expandClientTlsPolicyClientCertificateLocalFilepathMap(c *Client, f map[string]ClientTlsPolicyClientCertificateLocalFilepath, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyClientCertificateLocalFilepath(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyClientCertificateLocalFilepathSlice expands the contents of ClientTlsPolicyClientCertificateLocalFilepath into a JSON
// request object.
func expandClientTlsPolicyClientCertificateLocalFilepathSlice(c *Client, f []ClientTlsPolicyClientCertificateLocalFilepath, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyClientCertificateLocalFilepath(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyClientCertificateLocalFilepathMap flattens the contents of ClientTlsPolicyClientCertificateLocalFilepath from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateLocalFilepathMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyClientCertificateLocalFilepath {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyClientCertificateLocalFilepath{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyClientCertificateLocalFilepath{}
}
items := make(map[string]ClientTlsPolicyClientCertificateLocalFilepath)
for k, item := range a {
items[k] = *flattenClientTlsPolicyClientCertificateLocalFilepath(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyClientCertificateLocalFilepathSlice flattens the contents of ClientTlsPolicyClientCertificateLocalFilepath from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateLocalFilepathSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyClientCertificateLocalFilepath {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyClientCertificateLocalFilepath{}
}
if len(a) == 0 {
return []ClientTlsPolicyClientCertificateLocalFilepath{}
}
items := make([]ClientTlsPolicyClientCertificateLocalFilepath, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyClientCertificateLocalFilepath(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyClientCertificateLocalFilepath expands an instance of ClientTlsPolicyClientCertificateLocalFilepath into a JSON
// request object.
func expandClientTlsPolicyClientCertificateLocalFilepath(c *Client, f *ClientTlsPolicyClientCertificateLocalFilepath, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.CertificatePath; !dcl.IsEmptyValueIndirect(v) {
m["certificatePath"] = v
}
if v := f.PrivateKeyPath; !dcl.IsEmptyValueIndirect(v) {
m["privateKeyPath"] = v
}
return m, nil
}
// flattenClientTlsPolicyClientCertificateLocalFilepath flattens an instance of ClientTlsPolicyClientCertificateLocalFilepath from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateLocalFilepath(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyClientCertificateLocalFilepath {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyClientCertificateLocalFilepath{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyClientCertificateLocalFilepath
}
r.CertificatePath = dcl.FlattenString(m["certificatePath"])
r.PrivateKeyPath = dcl.FlattenString(m["privateKeyPath"])
return r
}
// expandClientTlsPolicyClientCertificateGrpcEndpointMap expands the contents of ClientTlsPolicyClientCertificateGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyClientCertificateGrpcEndpointMap(c *Client, f map[string]ClientTlsPolicyClientCertificateGrpcEndpoint, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyClientCertificateGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyClientCertificateGrpcEndpointSlice expands the contents of ClientTlsPolicyClientCertificateGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyClientCertificateGrpcEndpointSlice(c *Client, f []ClientTlsPolicyClientCertificateGrpcEndpoint, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyClientCertificateGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyClientCertificateGrpcEndpointMap flattens the contents of ClientTlsPolicyClientCertificateGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateGrpcEndpointMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyClientCertificateGrpcEndpoint {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
items := make(map[string]ClientTlsPolicyClientCertificateGrpcEndpoint)
for k, item := range a {
items[k] = *flattenClientTlsPolicyClientCertificateGrpcEndpoint(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyClientCertificateGrpcEndpointSlice flattens the contents of ClientTlsPolicyClientCertificateGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateGrpcEndpointSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyClientCertificateGrpcEndpoint {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
if len(a) == 0 {
return []ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
items := make([]ClientTlsPolicyClientCertificateGrpcEndpoint, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyClientCertificateGrpcEndpoint(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyClientCertificateGrpcEndpoint expands an instance of ClientTlsPolicyClientCertificateGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyClientCertificateGrpcEndpoint(c *Client, f *ClientTlsPolicyClientCertificateGrpcEndpoint, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.TargetUri; !dcl.IsEmptyValueIndirect(v) {
m["targetUri"] = v
}
return m, nil
}
// flattenClientTlsPolicyClientCertificateGrpcEndpoint flattens an instance of ClientTlsPolicyClientCertificateGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateGrpcEndpoint(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyClientCertificateGrpcEndpoint {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyClientCertificateGrpcEndpoint{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyClientCertificateGrpcEndpoint
}
r.TargetUri = dcl.FlattenString(m["targetUri"])
return r
}
// expandClientTlsPolicyClientCertificateCertificateProviderInstanceMap expands the contents of ClientTlsPolicyClientCertificateCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyClientCertificateCertificateProviderInstanceMap(c *Client, f map[string]ClientTlsPolicyClientCertificateCertificateProviderInstance, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyClientCertificateCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyClientCertificateCertificateProviderInstanceSlice expands the contents of ClientTlsPolicyClientCertificateCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyClientCertificateCertificateProviderInstanceSlice(c *Client, f []ClientTlsPolicyClientCertificateCertificateProviderInstance, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyClientCertificateCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyClientCertificateCertificateProviderInstanceMap flattens the contents of ClientTlsPolicyClientCertificateCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateCertificateProviderInstanceMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyClientCertificateCertificateProviderInstance {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
items := make(map[string]ClientTlsPolicyClientCertificateCertificateProviderInstance)
for k, item := range a {
items[k] = *flattenClientTlsPolicyClientCertificateCertificateProviderInstance(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyClientCertificateCertificateProviderInstanceSlice flattens the contents of ClientTlsPolicyClientCertificateCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateCertificateProviderInstanceSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyClientCertificateCertificateProviderInstance {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
if len(a) == 0 {
return []ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
items := make([]ClientTlsPolicyClientCertificateCertificateProviderInstance, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyClientCertificateCertificateProviderInstance(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyClientCertificateCertificateProviderInstance expands an instance of ClientTlsPolicyClientCertificateCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyClientCertificateCertificateProviderInstance(c *Client, f *ClientTlsPolicyClientCertificateCertificateProviderInstance, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.PluginInstance; !dcl.IsEmptyValueIndirect(v) {
m["pluginInstance"] = v
}
return m, nil
}
// flattenClientTlsPolicyClientCertificateCertificateProviderInstance flattens an instance of ClientTlsPolicyClientCertificateCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyClientCertificateCertificateProviderInstance(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyClientCertificateCertificateProviderInstance {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyClientCertificateCertificateProviderInstance{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyClientCertificateCertificateProviderInstance
}
r.PluginInstance = dcl.FlattenString(m["pluginInstance"])
return r
}
// expandClientTlsPolicyServerValidationCaMap expands the contents of ClientTlsPolicyServerValidationCa into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaMap(c *Client, f map[string]ClientTlsPolicyServerValidationCa, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyServerValidationCa(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyServerValidationCaSlice expands the contents of ClientTlsPolicyServerValidationCa into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaSlice(c *Client, f []ClientTlsPolicyServerValidationCa, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyServerValidationCa(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyServerValidationCaMap flattens the contents of ClientTlsPolicyServerValidationCa from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyServerValidationCa {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyServerValidationCa{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyServerValidationCa{}
}
items := make(map[string]ClientTlsPolicyServerValidationCa)
for k, item := range a {
items[k] = *flattenClientTlsPolicyServerValidationCa(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyServerValidationCaSlice flattens the contents of ClientTlsPolicyServerValidationCa from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyServerValidationCa {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyServerValidationCa{}
}
if len(a) == 0 {
return []ClientTlsPolicyServerValidationCa{}
}
items := make([]ClientTlsPolicyServerValidationCa, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyServerValidationCa(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyServerValidationCa expands an instance of ClientTlsPolicyServerValidationCa into a JSON
// request object.
func expandClientTlsPolicyServerValidationCa(c *Client, f *ClientTlsPolicyServerValidationCa, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
m := make(map[string]interface{})
if v := f.CaCertPath; !dcl.IsEmptyValueIndirect(v) {
m["caCertPath"] = v
}
if v, err := expandClientTlsPolicyServerValidationCaGrpcEndpoint(c, f.GrpcEndpoint, res); err != nil {
return nil, fmt.Errorf("error expanding GrpcEndpoint into grpcEndpoint: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["grpcEndpoint"] = v
}
if v, err := expandClientTlsPolicyServerValidationCaCertificateProviderInstance(c, f.CertificateProviderInstance, res); err != nil {
return nil, fmt.Errorf("error expanding CertificateProviderInstance into certificateProviderInstance: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["certificateProviderInstance"] = v
}
return m, nil
}
// flattenClientTlsPolicyServerValidationCa flattens an instance of ClientTlsPolicyServerValidationCa from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCa(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyServerValidationCa {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyServerValidationCa{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyServerValidationCa
}
r.CaCertPath = dcl.FlattenString(m["caCertPath"])
r.GrpcEndpoint = flattenClientTlsPolicyServerValidationCaGrpcEndpoint(c, m["grpcEndpoint"], res)
r.CertificateProviderInstance = flattenClientTlsPolicyServerValidationCaCertificateProviderInstance(c, m["certificateProviderInstance"], res)
return r
}
// expandClientTlsPolicyServerValidationCaGrpcEndpointMap expands the contents of ClientTlsPolicyServerValidationCaGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaGrpcEndpointMap(c *Client, f map[string]ClientTlsPolicyServerValidationCaGrpcEndpoint, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyServerValidationCaGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyServerValidationCaGrpcEndpointSlice expands the contents of ClientTlsPolicyServerValidationCaGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaGrpcEndpointSlice(c *Client, f []ClientTlsPolicyServerValidationCaGrpcEndpoint, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyServerValidationCaGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyServerValidationCaGrpcEndpointMap flattens the contents of ClientTlsPolicyServerValidationCaGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaGrpcEndpointMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyServerValidationCaGrpcEndpoint {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
items := make(map[string]ClientTlsPolicyServerValidationCaGrpcEndpoint)
for k, item := range a {
items[k] = *flattenClientTlsPolicyServerValidationCaGrpcEndpoint(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyServerValidationCaGrpcEndpointSlice flattens the contents of ClientTlsPolicyServerValidationCaGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaGrpcEndpointSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyServerValidationCaGrpcEndpoint {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
if len(a) == 0 {
return []ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
items := make([]ClientTlsPolicyServerValidationCaGrpcEndpoint, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyServerValidationCaGrpcEndpoint(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyServerValidationCaGrpcEndpoint expands an instance of ClientTlsPolicyServerValidationCaGrpcEndpoint into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaGrpcEndpoint(c *Client, f *ClientTlsPolicyServerValidationCaGrpcEndpoint, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.TargetUri; !dcl.IsEmptyValueIndirect(v) {
m["targetUri"] = v
}
return m, nil
}
// flattenClientTlsPolicyServerValidationCaGrpcEndpoint flattens an instance of ClientTlsPolicyServerValidationCaGrpcEndpoint from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaGrpcEndpoint(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyServerValidationCaGrpcEndpoint {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyServerValidationCaGrpcEndpoint{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyServerValidationCaGrpcEndpoint
}
r.TargetUri = dcl.FlattenString(m["targetUri"])
return r
}
// expandClientTlsPolicyServerValidationCaCertificateProviderInstanceMap expands the contents of ClientTlsPolicyServerValidationCaCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaCertificateProviderInstanceMap(c *Client, f map[string]ClientTlsPolicyServerValidationCaCertificateProviderInstance, res *ClientTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandClientTlsPolicyServerValidationCaCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice expands the contents of ClientTlsPolicyServerValidationCaCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice(c *Client, f []ClientTlsPolicyServerValidationCaCertificateProviderInstance, res *ClientTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandClientTlsPolicyServerValidationCaCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenClientTlsPolicyServerValidationCaCertificateProviderInstanceMap flattens the contents of ClientTlsPolicyServerValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaCertificateProviderInstanceMap(c *Client, i interface{}, res *ClientTlsPolicy) map[string]ClientTlsPolicyServerValidationCaCertificateProviderInstance {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
if len(a) == 0 {
return map[string]ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
items := make(map[string]ClientTlsPolicyServerValidationCaCertificateProviderInstance)
for k, item := range a {
items[k] = *flattenClientTlsPolicyServerValidationCaCertificateProviderInstance(c, item.(map[string]interface{}), res)
}
return items
}
// flattenClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice flattens the contents of ClientTlsPolicyServerValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaCertificateProviderInstanceSlice(c *Client, i interface{}, res *ClientTlsPolicy) []ClientTlsPolicyServerValidationCaCertificateProviderInstance {
a, ok := i.([]interface{})
if !ok {
return []ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
if len(a) == 0 {
return []ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
items := make([]ClientTlsPolicyServerValidationCaCertificateProviderInstance, 0, len(a))
for _, item := range a {
items = append(items, *flattenClientTlsPolicyServerValidationCaCertificateProviderInstance(c, item.(map[string]interface{}), res))
}
return items
}
// expandClientTlsPolicyServerValidationCaCertificateProviderInstance expands an instance of ClientTlsPolicyServerValidationCaCertificateProviderInstance into a JSON
// request object.
func expandClientTlsPolicyServerValidationCaCertificateProviderInstance(c *Client, f *ClientTlsPolicyServerValidationCaCertificateProviderInstance, res *ClientTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.PluginInstance; !dcl.IsEmptyValueIndirect(v) {
m["pluginInstance"] = v
}
return m, nil
}
// flattenClientTlsPolicyServerValidationCaCertificateProviderInstance flattens an instance of ClientTlsPolicyServerValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenClientTlsPolicyServerValidationCaCertificateProviderInstance(c *Client, i interface{}, res *ClientTlsPolicy) *ClientTlsPolicyServerValidationCaCertificateProviderInstance {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyClientTlsPolicyServerValidationCaCertificateProviderInstance
}
r.PluginInstance = dcl.FlattenString(m["pluginInstance"])
return r
}
// This function returns a matcher that checks whether a serialized resource matches this resource
// in its parameters (as defined by the fields in a Get, which definitionally define resource
// identity). This is useful in extracting the element from a List call.
func (r *ClientTlsPolicy) matcher(c *Client) func([]byte) bool {
return func(b []byte) bool {
cr, err := unmarshalClientTlsPolicy(b, c, r)
if err != nil {
c.Config.Logger.Warning("failed to unmarshal provided resource in matcher.")
return false
}
nr := r.urlNormalized()
ncr := cr.urlNormalized()
c.Config.Logger.Infof("looking for %v\nin %v", nr, ncr)
if nr.Project == nil && ncr.Project == nil {
c.Config.Logger.Info("Both Project fields null - considering equal.")
} else if nr.Project == nil || ncr.Project == nil {
c.Config.Logger.Info("Only one Project field is null - considering unequal.")
return false
} else if *nr.Project != *ncr.Project {
return false
}
if nr.Location == nil && ncr.Location == nil {
c.Config.Logger.Info("Both Location fields null - considering equal.")
} else if nr.Location == nil || ncr.Location == nil {
c.Config.Logger.Info("Only one Location field is null - considering unequal.")
return false
} else if *nr.Location != *ncr.Location {
return false
}
if nr.Name == nil && ncr.Name == nil {
c.Config.Logger.Info("Both Name fields null - considering equal.")
} else if nr.Name == nil || ncr.Name == nil {
c.Config.Logger.Info("Only one Name field is null - considering unequal.")
return false
} else if *nr.Name != *ncr.Name {
return false
}
return true
}
}
type clientTlsPolicyDiff struct {
// The diff should include one or the other of RequiresRecreate or UpdateOp.
RequiresRecreate bool
UpdateOp clientTlsPolicyApiOperation
FieldName string // used for error logging
}
func convertFieldDiffsToClientTlsPolicyDiffs(config *dcl.Config, fds []*dcl.FieldDiff, opts []dcl.ApplyOption) ([]clientTlsPolicyDiff, error) {
opNamesToFieldDiffs := make(map[string][]*dcl.FieldDiff)
// Map each operation name to the field diffs associated with it.
for _, fd := range fds {
for _, ro := range fd.ResultingOperation {
if fieldDiffs, ok := opNamesToFieldDiffs[ro]; ok {
fieldDiffs = append(fieldDiffs, fd)
opNamesToFieldDiffs[ro] = fieldDiffs
} else {
config.Logger.Infof("%s required due to diff: %v", ro, fd)
opNamesToFieldDiffs[ro] = []*dcl.FieldDiff{fd}
}
}
}
var diffs []clientTlsPolicyDiff
// For each operation name, create a clientTlsPolicyDiff which contains the operation.
for opName, fieldDiffs := range opNamesToFieldDiffs {
// Use the first field diff's field name for logging required recreate error.
diff := clientTlsPolicyDiff{FieldName: fieldDiffs[0].FieldName}
if opName == "Recreate" {
diff.RequiresRecreate = true
} else {
apiOp, err := convertOpNameToClientTlsPolicyApiOperation(opName, fieldDiffs, opts...)
if err != nil {
return diffs, err
}
diff.UpdateOp = apiOp
}
diffs = append(diffs, diff)
}
return diffs, nil
}
func convertOpNameToClientTlsPolicyApiOperation(opName string, fieldDiffs []*dcl.FieldDiff, opts ...dcl.ApplyOption) (clientTlsPolicyApiOperation, error) {
switch opName {
case "updateClientTlsPolicyUpdateClientTlsPolicyOperation":
return &updateClientTlsPolicyUpdateClientTlsPolicyOperation{FieldDiffs: fieldDiffs}, nil
default:
return nil, fmt.Errorf("no such operation with name: %v", opName)
}
}
func extractClientTlsPolicyFields(r *ClientTlsPolicy) error {
vClientCertificate := r.ClientCertificate
if vClientCertificate == nil {
// note: explicitly not the empty object.
vClientCertificate = &ClientTlsPolicyClientCertificate{}
}
if err := extractClientTlsPolicyClientCertificateFields(r, vClientCertificate); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vClientCertificate) {
r.ClientCertificate = vClientCertificate
}
return nil
}
func extractClientTlsPolicyClientCertificateFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificate) error {
vLocalFilepath := o.LocalFilepath
if vLocalFilepath == nil {
// note: explicitly not the empty object.
vLocalFilepath = &ClientTlsPolicyClientCertificateLocalFilepath{}
}
if err := extractClientTlsPolicyClientCertificateLocalFilepathFields(r, vLocalFilepath); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vLocalFilepath) {
o.LocalFilepath = vLocalFilepath
}
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
if err := extractClientTlsPolicyClientCertificateGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
if err := extractClientTlsPolicyClientCertificateCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func extractClientTlsPolicyClientCertificateLocalFilepathFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateLocalFilepath) error {
return nil
}
func extractClientTlsPolicyClientCertificateGrpcEndpointFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateGrpcEndpoint) error {
return nil
}
func extractClientTlsPolicyClientCertificateCertificateProviderInstanceFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateCertificateProviderInstance) error {
return nil
}
func extractClientTlsPolicyServerValidationCaFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCa) error {
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
if err := extractClientTlsPolicyServerValidationCaGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
if err := extractClientTlsPolicyServerValidationCaCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func extractClientTlsPolicyServerValidationCaGrpcEndpointFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCaGrpcEndpoint) error {
return nil
}
func extractClientTlsPolicyServerValidationCaCertificateProviderInstanceFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCaCertificateProviderInstance) error {
return nil
}
func postReadExtractClientTlsPolicyFields(r *ClientTlsPolicy) error {
vClientCertificate := r.ClientCertificate
if vClientCertificate == nil {
// note: explicitly not the empty object.
vClientCertificate = &ClientTlsPolicyClientCertificate{}
}
if err := postReadExtractClientTlsPolicyClientCertificateFields(r, vClientCertificate); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vClientCertificate) {
r.ClientCertificate = vClientCertificate
}
return nil
}
func postReadExtractClientTlsPolicyClientCertificateFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificate) error {
vLocalFilepath := o.LocalFilepath
if vLocalFilepath == nil {
// note: explicitly not the empty object.
vLocalFilepath = &ClientTlsPolicyClientCertificateLocalFilepath{}
}
if err := extractClientTlsPolicyClientCertificateLocalFilepathFields(r, vLocalFilepath); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vLocalFilepath) {
o.LocalFilepath = vLocalFilepath
}
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ClientTlsPolicyClientCertificateGrpcEndpoint{}
}
if err := extractClientTlsPolicyClientCertificateGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ClientTlsPolicyClientCertificateCertificateProviderInstance{}
}
if err := extractClientTlsPolicyClientCertificateCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func postReadExtractClientTlsPolicyClientCertificateLocalFilepathFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateLocalFilepath) error {
return nil
}
func postReadExtractClientTlsPolicyClientCertificateGrpcEndpointFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateGrpcEndpoint) error {
return nil
}
func postReadExtractClientTlsPolicyClientCertificateCertificateProviderInstanceFields(r *ClientTlsPolicy, o *ClientTlsPolicyClientCertificateCertificateProviderInstance) error {
return nil
}
func postReadExtractClientTlsPolicyServerValidationCaFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCa) error {
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ClientTlsPolicyServerValidationCaGrpcEndpoint{}
}
if err := extractClientTlsPolicyServerValidationCaGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ClientTlsPolicyServerValidationCaCertificateProviderInstance{}
}
if err := extractClientTlsPolicyServerValidationCaCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func postReadExtractClientTlsPolicyServerValidationCaGrpcEndpointFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCaGrpcEndpoint) error {
return nil
}
func postReadExtractClientTlsPolicyServerValidationCaCertificateProviderInstanceFields(r *ClientTlsPolicy, o *ClientTlsPolicyServerValidationCaCertificateProviderInstance) error {
return nil
}