services/google/networksecurity/alpha/server_tls_policy_internal.go (2,675 lines of code) (raw):
// Copyright 2025 Google LLC. All Rights Reserved.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package alpha
import (
"bytes"
"context"
"encoding/json"
"fmt"
"io/ioutil"
"strings"
"github.com/GoogleCloudPlatform/declarative-resource-client-library/dcl"
"github.com/GoogleCloudPlatform/declarative-resource-client-library/dcl/operations"
)
func (r *ServerTlsPolicy) validate() error {
if err := dcl.Required(r, "name"); err != nil {
return err
}
if err := dcl.RequiredParameter(r.Project, "Project"); err != nil {
return err
}
if err := dcl.RequiredParameter(r.Location, "Location"); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.ServerCertificate) {
if err := r.ServerCertificate.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.MtlsPolicy) {
if err := r.MtlsPolicy.validate(); err != nil {
return err
}
}
return nil
}
func (r *ServerTlsPolicyServerCertificate) validate() error {
if err := dcl.ValidateAtMostOneOfFieldsSet([]string{"LocalFilepath", "GrpcEndpoint", "CertificateProviderInstance"}, r.LocalFilepath, r.GrpcEndpoint, r.CertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.LocalFilepath) {
if err := r.LocalFilepath.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.GrpcEndpoint) {
if err := r.GrpcEndpoint.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.CertificateProviderInstance) {
if err := r.CertificateProviderInstance.validate(); err != nil {
return err
}
}
return nil
}
func (r *ServerTlsPolicyServerCertificateLocalFilepath) validate() error {
if err := dcl.Required(r, "certificatePath"); err != nil {
return err
}
if err := dcl.Required(r, "privateKeyPath"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicyServerCertificateGrpcEndpoint) validate() error {
if err := dcl.Required(r, "targetUri"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicyServerCertificateCertificateProviderInstance) validate() error {
if err := dcl.Required(r, "pluginInstance"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicyMtlsPolicy) validate() error {
if err := dcl.Required(r, "clientValidationCa"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicyMtlsPolicyClientValidationCa) validate() error {
if err := dcl.ValidateAtMostOneOfFieldsSet([]string{"CaCertPath", "GrpcEndpoint", "CertificateProviderInstance"}, r.CaCertPath, r.GrpcEndpoint, r.CertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(r.GrpcEndpoint) {
if err := r.GrpcEndpoint.validate(); err != nil {
return err
}
}
if !dcl.IsEmptyValueIndirect(r.CertificateProviderInstance) {
if err := r.CertificateProviderInstance.validate(); err != nil {
return err
}
}
return nil
}
func (r *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) validate() error {
if err := dcl.Required(r, "targetUri"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) validate() error {
if err := dcl.Required(r, "pluginInstance"); err != nil {
return err
}
return nil
}
func (r *ServerTlsPolicy) basePath() string {
params := map[string]interface{}{}
return dcl.Nprintf("https://networksecurity.googleapis.com/v1alpha1/", params)
}
func (r *ServerTlsPolicy) getURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies/{{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ServerTlsPolicy) listURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies", nr.basePath(), userBasePath, params), nil
}
func (r *ServerTlsPolicy) createURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies?serverTlsPolicyId={{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ServerTlsPolicy) deleteURL(userBasePath string) (string, error) {
nr := r.urlNormalized()
params := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies/{{name}}", nr.basePath(), userBasePath, params), nil
}
func (r *ServerTlsPolicy) SetPolicyURL(userBasePath string) string {
nr := r.urlNormalized()
fields := map[string]interface{}{
"project": *nr.Project,
"location": *nr.Location,
"name": *nr.Name,
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies/{{name}}:setIamPolicy", nr.basePath(), userBasePath, fields)
}
func (r *ServerTlsPolicy) SetPolicyVerb() string {
return "POST"
}
func (r *ServerTlsPolicy) getPolicyURL(userBasePath string) string {
nr := r.urlNormalized()
fields := map[string]interface{}{
"project": *nr.Project,
"location": *nr.Location,
"name": *nr.Name,
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies/{{name}}:getIamPolicy", nr.basePath(), userBasePath, fields)
}
func (r *ServerTlsPolicy) IAMPolicyVersion() int {
return 3
}
// serverTlsPolicyApiOperation represents a mutable operation in the underlying REST
// API such as Create, Update, or Delete.
type serverTlsPolicyApiOperation interface {
do(context.Context, *ServerTlsPolicy, *Client) error
}
// newUpdateServerTlsPolicyUpdateServerTlsPolicyRequest creates a request for an
// ServerTlsPolicy resource's UpdateServerTlsPolicy update type by filling in the update
// fields based on the intended state of the resource.
func newUpdateServerTlsPolicyUpdateServerTlsPolicyRequest(ctx context.Context, f *ServerTlsPolicy, c *Client) (map[string]interface{}, error) {
req := map[string]interface{}{}
res := f
_ = res
if v := f.Description; !dcl.IsEmptyValueIndirect(v) {
req["description"] = v
}
if v := f.Labels; !dcl.IsEmptyValueIndirect(v) {
req["labels"] = v
}
if v := f.AllowOpen; !dcl.IsEmptyValueIndirect(v) {
req["allowOpen"] = v
}
if v, err := expandServerTlsPolicyServerCertificate(c, f.ServerCertificate, res); err != nil {
return nil, fmt.Errorf("error expanding ServerCertificate into serverCertificate: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
req["serverCertificate"] = v
}
if v, err := expandServerTlsPolicyMtlsPolicy(c, f.MtlsPolicy, res); err != nil {
return nil, fmt.Errorf("error expanding MtlsPolicy into mtlsPolicy: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
req["mtlsPolicy"] = v
}
return req, nil
}
// marshalUpdateServerTlsPolicyUpdateServerTlsPolicyRequest converts the update into
// the final JSON request body.
func marshalUpdateServerTlsPolicyUpdateServerTlsPolicyRequest(c *Client, m map[string]interface{}) ([]byte, error) {
return json.Marshal(m)
}
type updateServerTlsPolicyUpdateServerTlsPolicyOperation struct {
// If the update operation has the REQUIRES_APPLY_OPTIONS trait, this will be populated.
// Usually it will be nil - this is to prevent us from accidentally depending on apply
// options, which should usually be unnecessary.
ApplyOptions []dcl.ApplyOption
FieldDiffs []*dcl.FieldDiff
}
// do creates a request and sends it to the appropriate URL. In most operations,
// do will transcribe a subset of the resource into a request object and send a
// PUT request to a single URL.
func (op *updateServerTlsPolicyUpdateServerTlsPolicyOperation) do(ctx context.Context, r *ServerTlsPolicy, c *Client) error {
_, err := c.GetServerTlsPolicy(ctx, r)
if err != nil {
return err
}
u, err := r.updateURL(c.Config.BasePath, "UpdateServerTlsPolicy")
if err != nil {
return err
}
req, err := newUpdateServerTlsPolicyUpdateServerTlsPolicyRequest(ctx, r, c)
if err != nil {
return err
}
c.Config.Logger.InfoWithContextf(ctx, "Created update: %#v", req)
body, err := marshalUpdateServerTlsPolicyUpdateServerTlsPolicyRequest(c, req)
if err != nil {
return err
}
resp, err := dcl.SendRequest(ctx, c.Config, "PATCH", u, bytes.NewBuffer(body), c.Config.RetryProvider)
if err != nil {
return err
}
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
err = o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET")
if err != nil {
return err
}
return nil
}
func (c *Client) listServerTlsPolicyRaw(ctx context.Context, r *ServerTlsPolicy, pageToken string, pageSize int32) ([]byte, error) {
u, err := r.urlNormalized().listURL(c.Config.BasePath)
if err != nil {
return nil, err
}
m := make(map[string]string)
if pageToken != "" {
m["pageToken"] = pageToken
}
if pageSize != ServerTlsPolicyMaxPage {
m["pageSize"] = fmt.Sprintf("%v", pageSize)
}
u, err = dcl.AddQueryParams(u, m)
if err != nil {
return nil, err
}
resp, err := dcl.SendRequest(ctx, c.Config, "GET", u, &bytes.Buffer{}, c.Config.RetryProvider)
if err != nil {
return nil, err
}
defer resp.Response.Body.Close()
return ioutil.ReadAll(resp.Response.Body)
}
type listServerTlsPolicyOperation struct {
ServerTlsPolicies []map[string]interface{} `json:"serverTlsPolicies"`
Token string `json:"nextPageToken"`
}
func (c *Client) listServerTlsPolicy(ctx context.Context, r *ServerTlsPolicy, pageToken string, pageSize int32) ([]*ServerTlsPolicy, string, error) {
b, err := c.listServerTlsPolicyRaw(ctx, r, pageToken, pageSize)
if err != nil {
return nil, "", err
}
var m listServerTlsPolicyOperation
if err := json.Unmarshal(b, &m); err != nil {
return nil, "", err
}
var l []*ServerTlsPolicy
for _, v := range m.ServerTlsPolicies {
res, err := unmarshalMapServerTlsPolicy(v, c, r)
if err != nil {
return nil, m.Token, err
}
res.Project = r.Project
res.Location = r.Location
l = append(l, res)
}
return l, m.Token, nil
}
func (c *Client) deleteAllServerTlsPolicy(ctx context.Context, f func(*ServerTlsPolicy) bool, resources []*ServerTlsPolicy) error {
var errors []string
for _, res := range resources {
if f(res) {
// We do not want deleteAll to fail on a deletion or else it will stop deleting other resources.
err := c.DeleteServerTlsPolicy(ctx, res)
if err != nil {
errors = append(errors, err.Error())
}
}
}
if len(errors) > 0 {
return fmt.Errorf("%v", strings.Join(errors, "\n"))
} else {
return nil
}
}
type deleteServerTlsPolicyOperation struct{}
func (op *deleteServerTlsPolicyOperation) do(ctx context.Context, r *ServerTlsPolicy, c *Client) error {
r, err := c.GetServerTlsPolicy(ctx, r)
if err != nil {
if dcl.IsNotFound(err) {
c.Config.Logger.InfoWithContextf(ctx, "ServerTlsPolicy not found, returning. Original error: %v", err)
return nil
}
c.Config.Logger.WarningWithContextf(ctx, "GetServerTlsPolicy checking for existence. error: %v", err)
return err
}
u, err := r.deleteURL(c.Config.BasePath)
if err != nil {
return err
}
// Delete should never have a body
body := &bytes.Buffer{}
resp, err := dcl.SendRequest(ctx, c.Config, "DELETE", u, body, c.Config.RetryProvider)
if err != nil {
return err
}
// wait for object to be deleted.
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
if err := o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET"); err != nil {
return err
}
// We saw a race condition where for some successful delete operation, the Get calls returned resources for a short duration.
// This is the reason we are adding retry to handle that case.
retriesRemaining := 10
dcl.Do(ctx, func(ctx context.Context) (*dcl.RetryDetails, error) {
_, err := c.GetServerTlsPolicy(ctx, r)
if dcl.IsNotFound(err) {
return nil, nil
}
if retriesRemaining > 0 {
retriesRemaining--
return &dcl.RetryDetails{}, dcl.OperationNotDone{}
}
return nil, dcl.NotDeletedError{ExistingResource: r}
}, c.Config.RetryProvider)
return nil
}
// Create operations are similar to Update operations, although they do not have
// specific request objects. The Create request object is the json encoding of
// the resource, which is modified by res.marshal to form the base request body.
type createServerTlsPolicyOperation struct {
response map[string]interface{}
}
func (op *createServerTlsPolicyOperation) FirstResponse() (map[string]interface{}, bool) {
return op.response, len(op.response) > 0
}
func (op *createServerTlsPolicyOperation) do(ctx context.Context, r *ServerTlsPolicy, c *Client) error {
c.Config.Logger.InfoWithContextf(ctx, "Attempting to create %v", r)
u, err := r.createURL(c.Config.BasePath)
if err != nil {
return err
}
req, err := r.marshal(c)
if err != nil {
return err
}
resp, err := dcl.SendRequest(ctx, c.Config, "POST", u, bytes.NewBuffer(req), c.Config.RetryProvider)
if err != nil {
return err
}
// wait for object to be created.
var o operations.StandardGCPOperation
if err := dcl.ParseResponse(resp.Response, &o); err != nil {
return err
}
if err := o.Wait(context.WithValue(ctx, dcl.DoNotLogRequestsKey, true), c.Config, r.basePath(), "GET"); err != nil {
c.Config.Logger.Warningf("Creation failed after waiting for operation: %v", err)
return err
}
c.Config.Logger.InfoWithContextf(ctx, "Successfully waited for operation")
op.response, _ = o.FirstResponse()
if _, err := c.GetServerTlsPolicy(ctx, r); err != nil {
c.Config.Logger.WarningWithContextf(ctx, "get returned error: %v", err)
return err
}
return nil
}
func (c *Client) getServerTlsPolicyRaw(ctx context.Context, r *ServerTlsPolicy) ([]byte, error) {
u, err := r.getURL(c.Config.BasePath)
if err != nil {
return nil, err
}
resp, err := dcl.SendRequest(ctx, c.Config, "GET", u, &bytes.Buffer{}, c.Config.RetryProvider)
if err != nil {
return nil, err
}
defer resp.Response.Body.Close()
b, err := ioutil.ReadAll(resp.Response.Body)
if err != nil {
return nil, err
}
return b, nil
}
func (c *Client) serverTlsPolicyDiffsForRawDesired(ctx context.Context, rawDesired *ServerTlsPolicy, opts ...dcl.ApplyOption) (initial, desired *ServerTlsPolicy, diffs []*dcl.FieldDiff, err error) {
c.Config.Logger.InfoWithContext(ctx, "Fetching initial state...")
// First, let us see if the user provided a state hint. If they did, we will start fetching based on that.
var fetchState *ServerTlsPolicy
if sh := dcl.FetchStateHint(opts); sh != nil {
if r, ok := sh.(*ServerTlsPolicy); !ok {
c.Config.Logger.WarningWithContextf(ctx, "Initial state hint was of the wrong type; expected ServerTlsPolicy, got %T", sh)
} else {
fetchState = r
}
}
if fetchState == nil {
fetchState = rawDesired
}
// 1.2: Retrieval of raw initial state from API
rawInitial, err := c.GetServerTlsPolicy(ctx, fetchState)
if rawInitial == nil {
if !dcl.IsNotFound(err) {
c.Config.Logger.WarningWithContextf(ctx, "Failed to retrieve whether a ServerTlsPolicy resource already exists: %s", err)
return nil, nil, nil, fmt.Errorf("failed to retrieve ServerTlsPolicy resource: %v", err)
}
c.Config.Logger.InfoWithContext(ctx, "Found that ServerTlsPolicy resource did not exist.")
// Perform canonicalization to pick up defaults.
desired, err = canonicalizeServerTlsPolicyDesiredState(rawDesired, rawInitial)
return nil, desired, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Found initial state for ServerTlsPolicy: %v", rawInitial)
c.Config.Logger.InfoWithContextf(ctx, "Initial desired state for ServerTlsPolicy: %v", rawDesired)
// The Get call applies postReadExtract and so the result may contain fields that are not part of API version.
if err := extractServerTlsPolicyFields(rawInitial); err != nil {
return nil, nil, nil, err
}
// 1.3: Canonicalize raw initial state into initial state.
initial, err = canonicalizeServerTlsPolicyInitialState(rawInitial, rawDesired)
if err != nil {
return nil, nil, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Canonicalized initial state for ServerTlsPolicy: %v", initial)
// 1.4: Canonicalize raw desired state into desired state.
desired, err = canonicalizeServerTlsPolicyDesiredState(rawDesired, rawInitial, opts...)
if err != nil {
return nil, nil, nil, err
}
c.Config.Logger.InfoWithContextf(ctx, "Canonicalized desired state for ServerTlsPolicy: %v", desired)
// 2.1: Comparison of initial and desired state.
diffs, err = diffServerTlsPolicy(c, desired, initial, opts...)
return initial, desired, diffs, err
}
func canonicalizeServerTlsPolicyInitialState(rawInitial, rawDesired *ServerTlsPolicy) (*ServerTlsPolicy, error) {
// TODO(magic-modules-eng): write canonicalizer once relevant traits are added.
return rawInitial, nil
}
/*
* Canonicalizers
*
* These are responsible for converting either a user-specified config or a
* GCP API response to a standard format that can be used for difference checking.
* */
func canonicalizeServerTlsPolicyDesiredState(rawDesired, rawInitial *ServerTlsPolicy, opts ...dcl.ApplyOption) (*ServerTlsPolicy, error) {
if rawInitial == nil {
// Since the initial state is empty, the desired state is all we have.
// We canonicalize the remaining nested objects with nil to pick up defaults.
rawDesired.ServerCertificate = canonicalizeServerTlsPolicyServerCertificate(rawDesired.ServerCertificate, nil, opts...)
rawDesired.MtlsPolicy = canonicalizeServerTlsPolicyMtlsPolicy(rawDesired.MtlsPolicy, nil, opts...)
return rawDesired, nil
}
canonicalDesired := &ServerTlsPolicy{}
if dcl.PartialSelfLinkToSelfLink(rawDesired.Name, rawInitial.Name) {
canonicalDesired.Name = rawInitial.Name
} else {
canonicalDesired.Name = rawDesired.Name
}
if dcl.StringCanonicalize(rawDesired.Description, rawInitial.Description) {
canonicalDesired.Description = rawInitial.Description
} else {
canonicalDesired.Description = rawDesired.Description
}
if dcl.IsZeroValue(rawDesired.Labels) || (dcl.IsEmptyValueIndirect(rawDesired.Labels) && dcl.IsEmptyValueIndirect(rawInitial.Labels)) {
// Desired and initial values are equivalent, so set canonical desired value to initial value.
canonicalDesired.Labels = rawInitial.Labels
} else {
canonicalDesired.Labels = rawDesired.Labels
}
if dcl.BoolCanonicalize(rawDesired.AllowOpen, rawInitial.AllowOpen) {
canonicalDesired.AllowOpen = rawInitial.AllowOpen
} else {
canonicalDesired.AllowOpen = rawDesired.AllowOpen
}
canonicalDesired.ServerCertificate = canonicalizeServerTlsPolicyServerCertificate(rawDesired.ServerCertificate, rawInitial.ServerCertificate, opts...)
canonicalDesired.MtlsPolicy = canonicalizeServerTlsPolicyMtlsPolicy(rawDesired.MtlsPolicy, rawInitial.MtlsPolicy, opts...)
if dcl.NameToSelfLink(rawDesired.Project, rawInitial.Project) {
canonicalDesired.Project = rawInitial.Project
} else {
canonicalDesired.Project = rawDesired.Project
}
if dcl.NameToSelfLink(rawDesired.Location, rawInitial.Location) {
canonicalDesired.Location = rawInitial.Location
} else {
canonicalDesired.Location = rawDesired.Location
}
return canonicalDesired, nil
}
func canonicalizeServerTlsPolicyNewState(c *Client, rawNew, rawDesired *ServerTlsPolicy) (*ServerTlsPolicy, error) {
if dcl.IsEmptyValueIndirect(rawNew.Name) && dcl.IsEmptyValueIndirect(rawDesired.Name) {
rawNew.Name = rawDesired.Name
} else {
if dcl.PartialSelfLinkToSelfLink(rawDesired.Name, rawNew.Name) {
rawNew.Name = rawDesired.Name
}
}
if dcl.IsEmptyValueIndirect(rawNew.Description) && dcl.IsEmptyValueIndirect(rawDesired.Description) {
rawNew.Description = rawDesired.Description
} else {
if dcl.StringCanonicalize(rawDesired.Description, rawNew.Description) {
rawNew.Description = rawDesired.Description
}
}
if dcl.IsEmptyValueIndirect(rawNew.CreateTime) && dcl.IsEmptyValueIndirect(rawDesired.CreateTime) {
rawNew.CreateTime = rawDesired.CreateTime
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.UpdateTime) && dcl.IsEmptyValueIndirect(rawDesired.UpdateTime) {
rawNew.UpdateTime = rawDesired.UpdateTime
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.Labels) && dcl.IsEmptyValueIndirect(rawDesired.Labels) {
rawNew.Labels = rawDesired.Labels
} else {
}
if dcl.IsEmptyValueIndirect(rawNew.AllowOpen) && dcl.IsEmptyValueIndirect(rawDesired.AllowOpen) {
rawNew.AllowOpen = rawDesired.AllowOpen
} else {
if dcl.BoolCanonicalize(rawDesired.AllowOpen, rawNew.AllowOpen) {
rawNew.AllowOpen = rawDesired.AllowOpen
}
}
if dcl.IsEmptyValueIndirect(rawNew.ServerCertificate) && dcl.IsEmptyValueIndirect(rawDesired.ServerCertificate) {
rawNew.ServerCertificate = rawDesired.ServerCertificate
} else {
rawNew.ServerCertificate = canonicalizeNewServerTlsPolicyServerCertificate(c, rawDesired.ServerCertificate, rawNew.ServerCertificate)
}
if dcl.IsEmptyValueIndirect(rawNew.MtlsPolicy) && dcl.IsEmptyValueIndirect(rawDesired.MtlsPolicy) {
rawNew.MtlsPolicy = rawDesired.MtlsPolicy
} else {
rawNew.MtlsPolicy = canonicalizeNewServerTlsPolicyMtlsPolicy(c, rawDesired.MtlsPolicy, rawNew.MtlsPolicy)
}
rawNew.Project = rawDesired.Project
rawNew.Location = rawDesired.Location
return rawNew, nil
}
func canonicalizeServerTlsPolicyServerCertificate(des, initial *ServerTlsPolicyServerCertificate, opts ...dcl.ApplyOption) *ServerTlsPolicyServerCertificate {
if des == nil {
return initial
}
if des.empty {
return des
}
if des.LocalFilepath != nil || (initial != nil && initial.LocalFilepath != nil) {
// Check if anything else is set.
if dcl.AnySet(des.GrpcEndpoint, des.CertificateProviderInstance) {
des.LocalFilepath = nil
if initial != nil {
initial.LocalFilepath = nil
}
}
}
if des.GrpcEndpoint != nil || (initial != nil && initial.GrpcEndpoint != nil) {
// Check if anything else is set.
if dcl.AnySet(des.LocalFilepath, des.CertificateProviderInstance) {
des.GrpcEndpoint = nil
if initial != nil {
initial.GrpcEndpoint = nil
}
}
}
if des.CertificateProviderInstance != nil || (initial != nil && initial.CertificateProviderInstance != nil) {
// Check if anything else is set.
if dcl.AnySet(des.LocalFilepath, des.GrpcEndpoint) {
des.CertificateProviderInstance = nil
if initial != nil {
initial.CertificateProviderInstance = nil
}
}
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyServerCertificate{}
cDes.LocalFilepath = canonicalizeServerTlsPolicyServerCertificateLocalFilepath(des.LocalFilepath, initial.LocalFilepath, opts...)
cDes.GrpcEndpoint = canonicalizeServerTlsPolicyServerCertificateGrpcEndpoint(des.GrpcEndpoint, initial.GrpcEndpoint, opts...)
cDes.CertificateProviderInstance = canonicalizeServerTlsPolicyServerCertificateCertificateProviderInstance(des.CertificateProviderInstance, initial.CertificateProviderInstance, opts...)
return cDes
}
func canonicalizeServerTlsPolicyServerCertificateSlice(des, initial []ServerTlsPolicyServerCertificate, opts ...dcl.ApplyOption) []ServerTlsPolicyServerCertificate {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyServerCertificate, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificate(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyServerCertificate, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificate(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyServerCertificate(c *Client, des, nw *ServerTlsPolicyServerCertificate) *ServerTlsPolicyServerCertificate {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyServerCertificate while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
nw.LocalFilepath = canonicalizeNewServerTlsPolicyServerCertificateLocalFilepath(c, des.LocalFilepath, nw.LocalFilepath)
nw.GrpcEndpoint = canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpoint(c, des.GrpcEndpoint, nw.GrpcEndpoint)
nw.CertificateProviderInstance = canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstance(c, des.CertificateProviderInstance, nw.CertificateProviderInstance)
return nw
}
func canonicalizeNewServerTlsPolicyServerCertificateSet(c *Client, des, nw []ServerTlsPolicyServerCertificate) []ServerTlsPolicyServerCertificate {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyServerCertificate
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyServerCertificateNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificate(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateSlice(c *Client, des, nw []ServerTlsPolicyServerCertificate) []ServerTlsPolicyServerCertificate {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyServerCertificate
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificate(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyServerCertificateLocalFilepath(des, initial *ServerTlsPolicyServerCertificateLocalFilepath, opts ...dcl.ApplyOption) *ServerTlsPolicyServerCertificateLocalFilepath {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyServerCertificateLocalFilepath{}
if dcl.StringCanonicalize(des.CertificatePath, initial.CertificatePath) || dcl.IsZeroValue(des.CertificatePath) {
cDes.CertificatePath = initial.CertificatePath
} else {
cDes.CertificatePath = des.CertificatePath
}
if dcl.StringCanonicalize(des.PrivateKeyPath, initial.PrivateKeyPath) || dcl.IsZeroValue(des.PrivateKeyPath) {
cDes.PrivateKeyPath = initial.PrivateKeyPath
} else {
cDes.PrivateKeyPath = des.PrivateKeyPath
}
return cDes
}
func canonicalizeServerTlsPolicyServerCertificateLocalFilepathSlice(des, initial []ServerTlsPolicyServerCertificateLocalFilepath, opts ...dcl.ApplyOption) []ServerTlsPolicyServerCertificateLocalFilepath {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyServerCertificateLocalFilepath, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateLocalFilepath(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyServerCertificateLocalFilepath, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateLocalFilepath(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateLocalFilepath(c *Client, des, nw *ServerTlsPolicyServerCertificateLocalFilepath) *ServerTlsPolicyServerCertificateLocalFilepath {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyServerCertificateLocalFilepath while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.CertificatePath, nw.CertificatePath) {
nw.CertificatePath = des.CertificatePath
}
if dcl.StringCanonicalize(des.PrivateKeyPath, nw.PrivateKeyPath) {
nw.PrivateKeyPath = des.PrivateKeyPath
}
return nw
}
func canonicalizeNewServerTlsPolicyServerCertificateLocalFilepathSet(c *Client, des, nw []ServerTlsPolicyServerCertificateLocalFilepath) []ServerTlsPolicyServerCertificateLocalFilepath {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyServerCertificateLocalFilepath
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyServerCertificateLocalFilepathNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateLocalFilepath(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateLocalFilepathSlice(c *Client, des, nw []ServerTlsPolicyServerCertificateLocalFilepath) []ServerTlsPolicyServerCertificateLocalFilepath {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyServerCertificateLocalFilepath
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateLocalFilepath(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyServerCertificateGrpcEndpoint(des, initial *ServerTlsPolicyServerCertificateGrpcEndpoint, opts ...dcl.ApplyOption) *ServerTlsPolicyServerCertificateGrpcEndpoint {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyServerCertificateGrpcEndpoint{}
if dcl.StringCanonicalize(des.TargetUri, initial.TargetUri) || dcl.IsZeroValue(des.TargetUri) {
cDes.TargetUri = initial.TargetUri
} else {
cDes.TargetUri = des.TargetUri
}
return cDes
}
func canonicalizeServerTlsPolicyServerCertificateGrpcEndpointSlice(des, initial []ServerTlsPolicyServerCertificateGrpcEndpoint, opts ...dcl.ApplyOption) []ServerTlsPolicyServerCertificateGrpcEndpoint {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyServerCertificateGrpcEndpoint, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateGrpcEndpoint(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyServerCertificateGrpcEndpoint, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateGrpcEndpoint(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpoint(c *Client, des, nw *ServerTlsPolicyServerCertificateGrpcEndpoint) *ServerTlsPolicyServerCertificateGrpcEndpoint {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyServerCertificateGrpcEndpoint while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.TargetUri, nw.TargetUri) {
nw.TargetUri = des.TargetUri
}
return nw
}
func canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpointSet(c *Client, des, nw []ServerTlsPolicyServerCertificateGrpcEndpoint) []ServerTlsPolicyServerCertificateGrpcEndpoint {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyServerCertificateGrpcEndpoint
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyServerCertificateGrpcEndpointNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpoint(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpointSlice(c *Client, des, nw []ServerTlsPolicyServerCertificateGrpcEndpoint) []ServerTlsPolicyServerCertificateGrpcEndpoint {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyServerCertificateGrpcEndpoint
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateGrpcEndpoint(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyServerCertificateCertificateProviderInstance(des, initial *ServerTlsPolicyServerCertificateCertificateProviderInstance, opts ...dcl.ApplyOption) *ServerTlsPolicyServerCertificateCertificateProviderInstance {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyServerCertificateCertificateProviderInstance{}
if dcl.StringCanonicalize(des.PluginInstance, initial.PluginInstance) || dcl.IsZeroValue(des.PluginInstance) {
cDes.PluginInstance = initial.PluginInstance
} else {
cDes.PluginInstance = des.PluginInstance
}
return cDes
}
func canonicalizeServerTlsPolicyServerCertificateCertificateProviderInstanceSlice(des, initial []ServerTlsPolicyServerCertificateCertificateProviderInstance, opts ...dcl.ApplyOption) []ServerTlsPolicyServerCertificateCertificateProviderInstance {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyServerCertificateCertificateProviderInstance, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateCertificateProviderInstance(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyServerCertificateCertificateProviderInstance, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyServerCertificateCertificateProviderInstance(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstance(c *Client, des, nw *ServerTlsPolicyServerCertificateCertificateProviderInstance) *ServerTlsPolicyServerCertificateCertificateProviderInstance {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyServerCertificateCertificateProviderInstance while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.PluginInstance, nw.PluginInstance) {
nw.PluginInstance = des.PluginInstance
}
return nw
}
func canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstanceSet(c *Client, des, nw []ServerTlsPolicyServerCertificateCertificateProviderInstance) []ServerTlsPolicyServerCertificateCertificateProviderInstance {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyServerCertificateCertificateProviderInstance
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyServerCertificateCertificateProviderInstanceNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstance(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstanceSlice(c *Client, des, nw []ServerTlsPolicyServerCertificateCertificateProviderInstance) []ServerTlsPolicyServerCertificateCertificateProviderInstance {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyServerCertificateCertificateProviderInstance
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyServerCertificateCertificateProviderInstance(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyMtlsPolicy(des, initial *ServerTlsPolicyMtlsPolicy, opts ...dcl.ApplyOption) *ServerTlsPolicyMtlsPolicy {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyMtlsPolicy{}
cDes.ClientValidationCa = canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaSlice(des.ClientValidationCa, initial.ClientValidationCa, opts...)
return cDes
}
func canonicalizeServerTlsPolicyMtlsPolicySlice(des, initial []ServerTlsPolicyMtlsPolicy, opts ...dcl.ApplyOption) []ServerTlsPolicyMtlsPolicy {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyMtlsPolicy, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicy(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyMtlsPolicy, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicy(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicy(c *Client, des, nw *ServerTlsPolicyMtlsPolicy) *ServerTlsPolicyMtlsPolicy {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyMtlsPolicy while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
nw.ClientValidationCa = canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaSlice(c, des.ClientValidationCa, nw.ClientValidationCa)
return nw
}
func canonicalizeNewServerTlsPolicyMtlsPolicySet(c *Client, des, nw []ServerTlsPolicyMtlsPolicy) []ServerTlsPolicyMtlsPolicy {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyMtlsPolicy
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyMtlsPolicyNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicy(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicySlice(c *Client, des, nw []ServerTlsPolicyMtlsPolicy) []ServerTlsPolicyMtlsPolicy {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyMtlsPolicy
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicy(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCa(des, initial *ServerTlsPolicyMtlsPolicyClientValidationCa, opts ...dcl.ApplyOption) *ServerTlsPolicyMtlsPolicyClientValidationCa {
if des == nil {
return initial
}
if des.empty {
return des
}
if des.CaCertPath != nil || (initial != nil && initial.CaCertPath != nil) {
// Check if anything else is set.
if dcl.AnySet(des.GrpcEndpoint, des.CertificateProviderInstance) {
des.CaCertPath = nil
if initial != nil {
initial.CaCertPath = nil
}
}
}
if des.GrpcEndpoint != nil || (initial != nil && initial.GrpcEndpoint != nil) {
// Check if anything else is set.
if dcl.AnySet(des.CaCertPath, des.CertificateProviderInstance) {
des.GrpcEndpoint = nil
if initial != nil {
initial.GrpcEndpoint = nil
}
}
}
if des.CertificateProviderInstance != nil || (initial != nil && initial.CertificateProviderInstance != nil) {
// Check if anything else is set.
if dcl.AnySet(des.CaCertPath, des.GrpcEndpoint) {
des.CertificateProviderInstance = nil
if initial != nil {
initial.CertificateProviderInstance = nil
}
}
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyMtlsPolicyClientValidationCa{}
if dcl.StringCanonicalize(des.CaCertPath, initial.CaCertPath) || dcl.IsZeroValue(des.CaCertPath) {
cDes.CaCertPath = initial.CaCertPath
} else {
cDes.CaCertPath = des.CaCertPath
}
cDes.GrpcEndpoint = canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(des.GrpcEndpoint, initial.GrpcEndpoint, opts...)
cDes.CertificateProviderInstance = canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(des.CertificateProviderInstance, initial.CertificateProviderInstance, opts...)
return cDes
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaSlice(des, initial []ServerTlsPolicyMtlsPolicyClientValidationCa, opts ...dcl.ApplyOption) []ServerTlsPolicyMtlsPolicyClientValidationCa {
if des == nil {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCa, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCa(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCa, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCa(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCa(c *Client, des, nw *ServerTlsPolicyMtlsPolicyClientValidationCa) *ServerTlsPolicyMtlsPolicyClientValidationCa {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyMtlsPolicyClientValidationCa while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.CaCertPath, nw.CaCertPath) {
nw.CaCertPath = des.CaCertPath
}
nw.GrpcEndpoint = canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, des.GrpcEndpoint, nw.GrpcEndpoint)
nw.CertificateProviderInstance = canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, des.CertificateProviderInstance, nw.CertificateProviderInstance)
return nw
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaSet(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCa) []ServerTlsPolicyMtlsPolicyClientValidationCa {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyMtlsPolicyClientValidationCa
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyMtlsPolicyClientValidationCaNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCa(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaSlice(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCa) []ServerTlsPolicyMtlsPolicyClientValidationCa {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyMtlsPolicyClientValidationCa
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCa(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(des, initial *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, opts ...dcl.ApplyOption) *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
if dcl.StringCanonicalize(des.TargetUri, initial.TargetUri) || dcl.IsZeroValue(des.TargetUri) {
cDes.TargetUri = initial.TargetUri
} else {
cDes.TargetUri = des.TargetUri
}
return cDes
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice(des, initial []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, opts ...dcl.ApplyOption) []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c *Client, des, nw *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.TargetUri, nw.TargetUri) {
nw.TargetUri = des.TargetUri
}
return nw
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSet(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, &d, &n))
}
return items
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(des, initial *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, opts ...dcl.ApplyOption) *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
if des == nil {
return initial
}
if des.empty {
return des
}
if initial == nil {
return des
}
cDes := &ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
if dcl.StringCanonicalize(des.PluginInstance, initial.PluginInstance) || dcl.IsZeroValue(des.PluginInstance) {
cDes.PluginInstance = initial.PluginInstance
} else {
cDes.PluginInstance = des.PluginInstance
}
return cDes
}
func canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice(des, initial []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, opts ...dcl.ApplyOption) []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
if dcl.IsEmptyValueIndirect(des) {
return initial
}
if len(des) != len(initial) {
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, 0, len(des))
for _, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(&d, nil, opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, 0, len(des))
for i, d := range des {
cd := canonicalizeServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(&d, &initial[i], opts...)
if cd != nil {
items = append(items, *cd)
}
}
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c *Client, des, nw *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
if nw == nil {
if dcl.IsEmptyValueIndirect(des) {
c.Config.Logger.Info("Found explicitly empty value for ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance while comparing non-nil desired to nil actual. Returning desired object.")
return des
}
return nil
}
if dcl.StringCanonicalize(des.PluginInstance, nw.PluginInstance) {
nw.PluginInstance = des.PluginInstance
}
return nw
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSet(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
// Find the elements in des that are also in nw and canonicalize them. Remove matched elements from nw.
var items []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance
for _, d := range des {
matchedIndex := -1
for i, n := range nw {
if diffs, _ := compareServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceNewStyle(&d, &n, dcl.FieldName{}); len(diffs) == 0 {
matchedIndex = i
break
}
}
if matchedIndex != -1 {
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, &d, &nw[matchedIndex]))
nw = append(nw[:matchedIndex], nw[matchedIndex+1:]...)
}
}
// Also include elements in nw that are not matched in des.
items = append(items, nw...)
return items
}
func canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice(c *Client, des, nw []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
if des == nil {
return nw
}
// Lengths are unequal. A diff will occur later, so we shouldn't canonicalize.
// Return the original array.
if len(des) != len(nw) {
return nw
}
var items []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance
for i, d := range des {
n := nw[i]
items = append(items, *canonicalizeNewServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, &d, &n))
}
return items
}
// The differ returns a list of diffs, along with a list of operations that should be taken
// to remedy them. Right now, it does not attempt to consolidate operations - if several
// fields can be fixed with a patch update, it will perform the patch several times.
// Diffs on some fields will be ignored if the `desired` state has an empty (nil)
// value. This empty value indicates that the user does not care about the state for
// the field. Empty fields on the actual object will cause diffs.
// TODO(magic-modules-eng): for efficiency in some resources, add batching.
func diffServerTlsPolicy(c *Client, desired, actual *ServerTlsPolicy, opts ...dcl.ApplyOption) ([]*dcl.FieldDiff, error) {
if desired == nil || actual == nil {
return nil, fmt.Errorf("nil resource passed to diff - always a programming error: %#v, %#v", desired, actual)
}
c.Config.Logger.Infof("Diff function called with desired state: %v", desired)
c.Config.Logger.Infof("Diff function called with actual state: %v", actual)
var fn dcl.FieldName
var newDiffs []*dcl.FieldDiff
// New style diffs.
if ds, err := dcl.Diff(desired.Name, actual.Name, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Name")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Description, actual.Description, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateServerTlsPolicyUpdateServerTlsPolicyOperation")}, fn.AddNest("Description")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.CreateTime, actual.CreateTime, dcl.DiffInfo{OutputOnly: true, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CreateTime")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.UpdateTime, actual.UpdateTime, dcl.DiffInfo{OutputOnly: true, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("UpdateTime")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Labels, actual.Labels, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateServerTlsPolicyUpdateServerTlsPolicyOperation")}, fn.AddNest("Labels")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.AllowOpen, actual.AllowOpen, dcl.DiffInfo{OperationSelector: dcl.TriggersOperation("updateServerTlsPolicyUpdateServerTlsPolicyOperation")}, fn.AddNest("AllowOpen")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.ServerCertificate, actual.ServerCertificate, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyServerCertificateNewStyle, EmptyObject: EmptyServerTlsPolicyServerCertificate, OperationSelector: dcl.TriggersOperation("updateServerTlsPolicyUpdateServerTlsPolicyOperation")}, fn.AddNest("ServerCertificate")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.MtlsPolicy, actual.MtlsPolicy, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyMtlsPolicyNewStyle, EmptyObject: EmptyServerTlsPolicyMtlsPolicy, OperationSelector: dcl.TriggersOperation("updateServerTlsPolicyUpdateServerTlsPolicyOperation")}, fn.AddNest("MtlsPolicy")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Project, actual.Project, dcl.DiffInfo{Type: "ReferenceType", OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Project")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if ds, err := dcl.Diff(desired.Location, actual.Location, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("Location")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
newDiffs = append(newDiffs, ds...)
}
if len(newDiffs) > 0 {
c.Config.Logger.Infof("Diff function found diffs: %v", newDiffs)
}
return newDiffs, nil
}
func compareServerTlsPolicyServerCertificateNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyServerCertificate)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyServerCertificate)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificate or *ServerTlsPolicyServerCertificate", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyServerCertificate)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyServerCertificate)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificate", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.LocalFilepath, actual.LocalFilepath, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyServerCertificateLocalFilepathNewStyle, EmptyObject: EmptyServerTlsPolicyServerCertificateLocalFilepath, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("LocalFilepath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.GrpcEndpoint, actual.GrpcEndpoint, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyServerCertificateGrpcEndpointNewStyle, EmptyObject: EmptyServerTlsPolicyServerCertificateGrpcEndpoint, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("GrpcEndpoint")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.CertificateProviderInstance, actual.CertificateProviderInstance, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyServerCertificateCertificateProviderInstanceNewStyle, EmptyObject: EmptyServerTlsPolicyServerCertificateCertificateProviderInstance, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificateProviderInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyServerCertificateLocalFilepathNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyServerCertificateLocalFilepath)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyServerCertificateLocalFilepath)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateLocalFilepath or *ServerTlsPolicyServerCertificateLocalFilepath", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyServerCertificateLocalFilepath)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyServerCertificateLocalFilepath)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateLocalFilepath", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.CertificatePath, actual.CertificatePath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificatePath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.PrivateKeyPath, actual.PrivateKeyPath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PrivateKeyPath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyServerCertificateGrpcEndpointNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyServerCertificateGrpcEndpoint)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyServerCertificateGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateGrpcEndpoint or *ServerTlsPolicyServerCertificateGrpcEndpoint", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyServerCertificateGrpcEndpoint)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyServerCertificateGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateGrpcEndpoint", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.TargetUri, actual.TargetUri, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("TargetUri")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyServerCertificateCertificateProviderInstanceNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyServerCertificateCertificateProviderInstance)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyServerCertificateCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateCertificateProviderInstance or *ServerTlsPolicyServerCertificateCertificateProviderInstance", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyServerCertificateCertificateProviderInstance)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyServerCertificateCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyServerCertificateCertificateProviderInstance", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.PluginInstance, actual.PluginInstance, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PluginInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyMtlsPolicyNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyMtlsPolicy)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyMtlsPolicy)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicy or *ServerTlsPolicyMtlsPolicy", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyMtlsPolicy)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyMtlsPolicy)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicy", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.ClientValidationCa, actual.ClientValidationCa, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyMtlsPolicyClientValidationCaNewStyle, EmptyObject: EmptyServerTlsPolicyMtlsPolicyClientValidationCa, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("ClientValidationCa")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyMtlsPolicyClientValidationCaNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyMtlsPolicyClientValidationCa)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyMtlsPolicyClientValidationCa)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCa or *ServerTlsPolicyMtlsPolicyClientValidationCa", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyMtlsPolicyClientValidationCa)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyMtlsPolicyClientValidationCa)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCa", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.CaCertPath, actual.CaCertPath, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CaCertPath")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.GrpcEndpoint, actual.GrpcEndpoint, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointNewStyle, EmptyObject: EmptyServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("GrpcEndpoint")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
if ds, err := dcl.Diff(desired.CertificateProviderInstance, actual.CertificateProviderInstance, dcl.DiffInfo{ObjectFunction: compareServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceNewStyle, EmptyObject: EmptyServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("CertificateProviderInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint or *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.TargetUri, actual.TargetUri, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("TargetUri")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
func compareServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceNewStyle(d, a interface{}, fn dcl.FieldName) ([]*dcl.FieldDiff, error) {
var diffs []*dcl.FieldDiff
desired, ok := d.(*ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance)
if !ok {
desiredNotPointer, ok := d.(ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance or *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance", d)
}
desired = &desiredNotPointer
}
actual, ok := a.(*ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance)
if !ok {
actualNotPointer, ok := a.(ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance)
if !ok {
return nil, fmt.Errorf("obj %v is not a ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance", a)
}
actual = &actualNotPointer
}
if ds, err := dcl.Diff(desired.PluginInstance, actual.PluginInstance, dcl.DiffInfo{OperationSelector: dcl.RequiresRecreate()}, fn.AddNest("PluginInstance")); len(ds) != 0 || err != nil {
if err != nil {
return nil, err
}
diffs = append(diffs, ds...)
}
return diffs, nil
}
// urlNormalized returns a copy of the resource struct with values normalized
// for URL substitutions. For instance, it converts long-form self-links to
// short-form so they can be substituted in.
func (r *ServerTlsPolicy) urlNormalized() *ServerTlsPolicy {
normalized := dcl.Copy(*r).(ServerTlsPolicy)
normalized.Name = dcl.SelfLinkToName(r.Name)
normalized.Description = dcl.SelfLinkToName(r.Description)
normalized.Project = dcl.SelfLinkToName(r.Project)
normalized.Location = dcl.SelfLinkToName(r.Location)
return &normalized
}
func (r *ServerTlsPolicy) updateURL(userBasePath, updateName string) (string, error) {
nr := r.urlNormalized()
if updateName == "UpdateServerTlsPolicy" {
fields := map[string]interface{}{
"project": dcl.ValueOrEmptyString(nr.Project),
"location": dcl.ValueOrEmptyString(nr.Location),
"name": dcl.ValueOrEmptyString(nr.Name),
}
return dcl.URL("projects/{{project}}/locations/{{location}}/serverTlsPolicies/{{name}}", nr.basePath(), userBasePath, fields), nil
}
return "", fmt.Errorf("unknown update name: %s", updateName)
}
// marshal encodes the ServerTlsPolicy resource into JSON for a Create request, and
// performs transformations from the resource schema to the API schema if
// necessary.
func (r *ServerTlsPolicy) marshal(c *Client) ([]byte, error) {
m, err := expandServerTlsPolicy(c, r)
if err != nil {
return nil, fmt.Errorf("error marshalling ServerTlsPolicy: %w", err)
}
return json.Marshal(m)
}
// unmarshalServerTlsPolicy decodes JSON responses into the ServerTlsPolicy resource schema.
func unmarshalServerTlsPolicy(b []byte, c *Client, res *ServerTlsPolicy) (*ServerTlsPolicy, error) {
var m map[string]interface{}
if err := json.Unmarshal(b, &m); err != nil {
return nil, err
}
return unmarshalMapServerTlsPolicy(m, c, res)
}
func unmarshalMapServerTlsPolicy(m map[string]interface{}, c *Client, res *ServerTlsPolicy) (*ServerTlsPolicy, error) {
flattened := flattenServerTlsPolicy(c, m, res)
if flattened == nil {
return nil, fmt.Errorf("attempted to flatten empty json object")
}
return flattened, nil
}
// expandServerTlsPolicy expands ServerTlsPolicy into a JSON request object.
func expandServerTlsPolicy(c *Client, f *ServerTlsPolicy) (map[string]interface{}, error) {
m := make(map[string]interface{})
res := f
_ = res
if v, err := dcl.DeriveField("projects/%s/locations/%s/serverTlsPolicies/%s", f.Name, dcl.SelfLinkToName(f.Project), dcl.SelfLinkToName(f.Location), dcl.SelfLinkToName(f.Name)); err != nil {
return nil, fmt.Errorf("error expanding Name into name: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["name"] = v
}
if v := f.Description; dcl.ValueShouldBeSent(v) {
m["description"] = v
}
if v := f.Labels; dcl.ValueShouldBeSent(v) {
m["labels"] = v
}
if v := f.AllowOpen; dcl.ValueShouldBeSent(v) {
m["allowOpen"] = v
}
if v, err := expandServerTlsPolicyServerCertificate(c, f.ServerCertificate, res); err != nil {
return nil, fmt.Errorf("error expanding ServerCertificate into serverCertificate: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["serverCertificate"] = v
}
if v, err := expandServerTlsPolicyMtlsPolicy(c, f.MtlsPolicy, res); err != nil {
return nil, fmt.Errorf("error expanding MtlsPolicy into mtlsPolicy: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["mtlsPolicy"] = v
}
if v, err := dcl.EmptyValue(); err != nil {
return nil, fmt.Errorf("error expanding Project into project: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["project"] = v
}
if v, err := dcl.EmptyValue(); err != nil {
return nil, fmt.Errorf("error expanding Location into location: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["location"] = v
}
return m, nil
}
// flattenServerTlsPolicy flattens ServerTlsPolicy from a JSON request object into the
// ServerTlsPolicy type.
func flattenServerTlsPolicy(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicy {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
if len(m) == 0 {
return nil
}
resultRes := &ServerTlsPolicy{}
resultRes.Name = dcl.FlattenString(m["name"])
resultRes.Description = dcl.FlattenString(m["description"])
resultRes.CreateTime = dcl.FlattenString(m["createTime"])
resultRes.UpdateTime = dcl.FlattenString(m["updateTime"])
resultRes.Labels = dcl.FlattenKeyValuePairs(m["labels"])
resultRes.AllowOpen = dcl.FlattenBool(m["allowOpen"])
resultRes.ServerCertificate = flattenServerTlsPolicyServerCertificate(c, m["serverCertificate"], res)
resultRes.MtlsPolicy = flattenServerTlsPolicyMtlsPolicy(c, m["mtlsPolicy"], res)
resultRes.Project = dcl.FlattenString(m["project"])
resultRes.Location = dcl.FlattenString(m["location"])
return resultRes
}
// expandServerTlsPolicyServerCertificateMap expands the contents of ServerTlsPolicyServerCertificate into a JSON
// request object.
func expandServerTlsPolicyServerCertificateMap(c *Client, f map[string]ServerTlsPolicyServerCertificate, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyServerCertificate(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyServerCertificateSlice expands the contents of ServerTlsPolicyServerCertificate into a JSON
// request object.
func expandServerTlsPolicyServerCertificateSlice(c *Client, f []ServerTlsPolicyServerCertificate, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyServerCertificate(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyServerCertificateMap flattens the contents of ServerTlsPolicyServerCertificate from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyServerCertificate {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyServerCertificate{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyServerCertificate{}
}
items := make(map[string]ServerTlsPolicyServerCertificate)
for k, item := range a {
items[k] = *flattenServerTlsPolicyServerCertificate(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyServerCertificateSlice flattens the contents of ServerTlsPolicyServerCertificate from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyServerCertificate {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyServerCertificate{}
}
if len(a) == 0 {
return []ServerTlsPolicyServerCertificate{}
}
items := make([]ServerTlsPolicyServerCertificate, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyServerCertificate(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyServerCertificate expands an instance of ServerTlsPolicyServerCertificate into a JSON
// request object.
func expandServerTlsPolicyServerCertificate(c *Client, f *ServerTlsPolicyServerCertificate, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v, err := expandServerTlsPolicyServerCertificateLocalFilepath(c, f.LocalFilepath, res); err != nil {
return nil, fmt.Errorf("error expanding LocalFilepath into localFilepath: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["localFilepath"] = v
}
if v, err := expandServerTlsPolicyServerCertificateGrpcEndpoint(c, f.GrpcEndpoint, res); err != nil {
return nil, fmt.Errorf("error expanding GrpcEndpoint into grpcEndpoint: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["grpcEndpoint"] = v
}
if v, err := expandServerTlsPolicyServerCertificateCertificateProviderInstance(c, f.CertificateProviderInstance, res); err != nil {
return nil, fmt.Errorf("error expanding CertificateProviderInstance into certificateProviderInstance: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["certificateProviderInstance"] = v
}
return m, nil
}
// flattenServerTlsPolicyServerCertificate flattens an instance of ServerTlsPolicyServerCertificate from a JSON
// response object.
func flattenServerTlsPolicyServerCertificate(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyServerCertificate {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyServerCertificate{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyServerCertificate
}
r.LocalFilepath = flattenServerTlsPolicyServerCertificateLocalFilepath(c, m["localFilepath"], res)
r.GrpcEndpoint = flattenServerTlsPolicyServerCertificateGrpcEndpoint(c, m["grpcEndpoint"], res)
r.CertificateProviderInstance = flattenServerTlsPolicyServerCertificateCertificateProviderInstance(c, m["certificateProviderInstance"], res)
return r
}
// expandServerTlsPolicyServerCertificateLocalFilepathMap expands the contents of ServerTlsPolicyServerCertificateLocalFilepath into a JSON
// request object.
func expandServerTlsPolicyServerCertificateLocalFilepathMap(c *Client, f map[string]ServerTlsPolicyServerCertificateLocalFilepath, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyServerCertificateLocalFilepath(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyServerCertificateLocalFilepathSlice expands the contents of ServerTlsPolicyServerCertificateLocalFilepath into a JSON
// request object.
func expandServerTlsPolicyServerCertificateLocalFilepathSlice(c *Client, f []ServerTlsPolicyServerCertificateLocalFilepath, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyServerCertificateLocalFilepath(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyServerCertificateLocalFilepathMap flattens the contents of ServerTlsPolicyServerCertificateLocalFilepath from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateLocalFilepathMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyServerCertificateLocalFilepath {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyServerCertificateLocalFilepath{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyServerCertificateLocalFilepath{}
}
items := make(map[string]ServerTlsPolicyServerCertificateLocalFilepath)
for k, item := range a {
items[k] = *flattenServerTlsPolicyServerCertificateLocalFilepath(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyServerCertificateLocalFilepathSlice flattens the contents of ServerTlsPolicyServerCertificateLocalFilepath from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateLocalFilepathSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyServerCertificateLocalFilepath {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyServerCertificateLocalFilepath{}
}
if len(a) == 0 {
return []ServerTlsPolicyServerCertificateLocalFilepath{}
}
items := make([]ServerTlsPolicyServerCertificateLocalFilepath, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyServerCertificateLocalFilepath(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyServerCertificateLocalFilepath expands an instance of ServerTlsPolicyServerCertificateLocalFilepath into a JSON
// request object.
func expandServerTlsPolicyServerCertificateLocalFilepath(c *Client, f *ServerTlsPolicyServerCertificateLocalFilepath, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.CertificatePath; !dcl.IsEmptyValueIndirect(v) {
m["certificatePath"] = v
}
if v := f.PrivateKeyPath; !dcl.IsEmptyValueIndirect(v) {
m["privateKeyPath"] = v
}
return m, nil
}
// flattenServerTlsPolicyServerCertificateLocalFilepath flattens an instance of ServerTlsPolicyServerCertificateLocalFilepath from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateLocalFilepath(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyServerCertificateLocalFilepath {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyServerCertificateLocalFilepath{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyServerCertificateLocalFilepath
}
r.CertificatePath = dcl.FlattenString(m["certificatePath"])
r.PrivateKeyPath = dcl.FlattenString(m["privateKeyPath"])
return r
}
// expandServerTlsPolicyServerCertificateGrpcEndpointMap expands the contents of ServerTlsPolicyServerCertificateGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyServerCertificateGrpcEndpointMap(c *Client, f map[string]ServerTlsPolicyServerCertificateGrpcEndpoint, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyServerCertificateGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyServerCertificateGrpcEndpointSlice expands the contents of ServerTlsPolicyServerCertificateGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyServerCertificateGrpcEndpointSlice(c *Client, f []ServerTlsPolicyServerCertificateGrpcEndpoint, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyServerCertificateGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyServerCertificateGrpcEndpointMap flattens the contents of ServerTlsPolicyServerCertificateGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateGrpcEndpointMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyServerCertificateGrpcEndpoint {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
items := make(map[string]ServerTlsPolicyServerCertificateGrpcEndpoint)
for k, item := range a {
items[k] = *flattenServerTlsPolicyServerCertificateGrpcEndpoint(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyServerCertificateGrpcEndpointSlice flattens the contents of ServerTlsPolicyServerCertificateGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateGrpcEndpointSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyServerCertificateGrpcEndpoint {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
if len(a) == 0 {
return []ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
items := make([]ServerTlsPolicyServerCertificateGrpcEndpoint, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyServerCertificateGrpcEndpoint(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyServerCertificateGrpcEndpoint expands an instance of ServerTlsPolicyServerCertificateGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyServerCertificateGrpcEndpoint(c *Client, f *ServerTlsPolicyServerCertificateGrpcEndpoint, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.TargetUri; !dcl.IsEmptyValueIndirect(v) {
m["targetUri"] = v
}
return m, nil
}
// flattenServerTlsPolicyServerCertificateGrpcEndpoint flattens an instance of ServerTlsPolicyServerCertificateGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateGrpcEndpoint(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyServerCertificateGrpcEndpoint {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyServerCertificateGrpcEndpoint{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyServerCertificateGrpcEndpoint
}
r.TargetUri = dcl.FlattenString(m["targetUri"])
return r
}
// expandServerTlsPolicyServerCertificateCertificateProviderInstanceMap expands the contents of ServerTlsPolicyServerCertificateCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyServerCertificateCertificateProviderInstanceMap(c *Client, f map[string]ServerTlsPolicyServerCertificateCertificateProviderInstance, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyServerCertificateCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyServerCertificateCertificateProviderInstanceSlice expands the contents of ServerTlsPolicyServerCertificateCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyServerCertificateCertificateProviderInstanceSlice(c *Client, f []ServerTlsPolicyServerCertificateCertificateProviderInstance, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyServerCertificateCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyServerCertificateCertificateProviderInstanceMap flattens the contents of ServerTlsPolicyServerCertificateCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateCertificateProviderInstanceMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyServerCertificateCertificateProviderInstance {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
items := make(map[string]ServerTlsPolicyServerCertificateCertificateProviderInstance)
for k, item := range a {
items[k] = *flattenServerTlsPolicyServerCertificateCertificateProviderInstance(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyServerCertificateCertificateProviderInstanceSlice flattens the contents of ServerTlsPolicyServerCertificateCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateCertificateProviderInstanceSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyServerCertificateCertificateProviderInstance {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
if len(a) == 0 {
return []ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
items := make([]ServerTlsPolicyServerCertificateCertificateProviderInstance, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyServerCertificateCertificateProviderInstance(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyServerCertificateCertificateProviderInstance expands an instance of ServerTlsPolicyServerCertificateCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyServerCertificateCertificateProviderInstance(c *Client, f *ServerTlsPolicyServerCertificateCertificateProviderInstance, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.PluginInstance; !dcl.IsEmptyValueIndirect(v) {
m["pluginInstance"] = v
}
return m, nil
}
// flattenServerTlsPolicyServerCertificateCertificateProviderInstance flattens an instance of ServerTlsPolicyServerCertificateCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyServerCertificateCertificateProviderInstance(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyServerCertificateCertificateProviderInstance {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyServerCertificateCertificateProviderInstance{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyServerCertificateCertificateProviderInstance
}
r.PluginInstance = dcl.FlattenString(m["pluginInstance"])
return r
}
// expandServerTlsPolicyMtlsPolicyMap expands the contents of ServerTlsPolicyMtlsPolicy into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyMap(c *Client, f map[string]ServerTlsPolicyMtlsPolicy, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyMtlsPolicy(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyMtlsPolicySlice expands the contents of ServerTlsPolicyMtlsPolicy into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicySlice(c *Client, f []ServerTlsPolicyMtlsPolicy, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyMtlsPolicy(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyMtlsPolicyMap flattens the contents of ServerTlsPolicyMtlsPolicy from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyMtlsPolicy {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyMtlsPolicy{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyMtlsPolicy{}
}
items := make(map[string]ServerTlsPolicyMtlsPolicy)
for k, item := range a {
items[k] = *flattenServerTlsPolicyMtlsPolicy(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyMtlsPolicySlice flattens the contents of ServerTlsPolicyMtlsPolicy from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicySlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyMtlsPolicy {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyMtlsPolicy{}
}
if len(a) == 0 {
return []ServerTlsPolicyMtlsPolicy{}
}
items := make([]ServerTlsPolicyMtlsPolicy, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyMtlsPolicy(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyMtlsPolicy expands an instance of ServerTlsPolicyMtlsPolicy into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicy(c *Client, f *ServerTlsPolicyMtlsPolicy, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v, err := expandServerTlsPolicyMtlsPolicyClientValidationCaSlice(c, f.ClientValidationCa, res); err != nil {
return nil, fmt.Errorf("error expanding ClientValidationCa into clientValidationCa: %w", err)
} else if v != nil {
m["clientValidationCa"] = v
}
return m, nil
}
// flattenServerTlsPolicyMtlsPolicy flattens an instance of ServerTlsPolicyMtlsPolicy from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicy(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyMtlsPolicy {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyMtlsPolicy{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyMtlsPolicy
}
r.ClientValidationCa = flattenServerTlsPolicyMtlsPolicyClientValidationCaSlice(c, m["clientValidationCa"], res)
return r
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaMap expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCa into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaMap(c *Client, f map[string]ServerTlsPolicyMtlsPolicyClientValidationCa, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCa(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaSlice expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCa into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaSlice(c *Client, f []ServerTlsPolicyMtlsPolicyClientValidationCa, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCa(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaMap flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCa from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyMtlsPolicyClientValidationCa {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCa{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCa{}
}
items := make(map[string]ServerTlsPolicyMtlsPolicyClientValidationCa)
for k, item := range a {
items[k] = *flattenServerTlsPolicyMtlsPolicyClientValidationCa(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaSlice flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCa from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyMtlsPolicyClientValidationCa {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyMtlsPolicyClientValidationCa{}
}
if len(a) == 0 {
return []ServerTlsPolicyMtlsPolicyClientValidationCa{}
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCa, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyMtlsPolicyClientValidationCa(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyMtlsPolicyClientValidationCa expands an instance of ServerTlsPolicyMtlsPolicyClientValidationCa into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCa(c *Client, f *ServerTlsPolicyMtlsPolicyClientValidationCa, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
m := make(map[string]interface{})
if v := f.CaCertPath; !dcl.IsEmptyValueIndirect(v) {
m["caCertPath"] = v
}
if v, err := expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, f.GrpcEndpoint, res); err != nil {
return nil, fmt.Errorf("error expanding GrpcEndpoint into grpcEndpoint: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["grpcEndpoint"] = v
}
if v, err := expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, f.CertificateProviderInstance, res); err != nil {
return nil, fmt.Errorf("error expanding CertificateProviderInstance into certificateProviderInstance: %w", err)
} else if !dcl.IsEmptyValueIndirect(v) {
m["certificateProviderInstance"] = v
}
return m, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCa flattens an instance of ServerTlsPolicyMtlsPolicyClientValidationCa from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCa(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyMtlsPolicyClientValidationCa {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyMtlsPolicyClientValidationCa{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyMtlsPolicyClientValidationCa
}
r.CaCertPath = dcl.FlattenString(m["caCertPath"])
r.GrpcEndpoint = flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, m["grpcEndpoint"], res)
r.CertificateProviderInstance = flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, m["certificateProviderInstance"], res)
return r
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointMap expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointMap(c *Client, f map[string]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice(c *Client, f []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointMap flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
items := make(map[string]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint)
for k, item := range a {
items[k] = *flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
if len(a) == 0 {
return []ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint expands an instance of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c *Client, f *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.TargetUri; !dcl.IsEmptyValueIndirect(v) {
m["targetUri"] = v
}
return m, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint flattens an instance of ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint
}
r.TargetUri = dcl.FlattenString(m["targetUri"])
return r
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceMap expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceMap(c *Client, f map[string]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, res *ServerTlsPolicy) (map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := make(map[string]interface{})
for k, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
if i != nil {
items[k] = i
}
}
return items, nil
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice expands the contents of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice(c *Client, f []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, res *ServerTlsPolicy) ([]map[string]interface{}, error) {
if f == nil {
return nil, nil
}
items := []map[string]interface{}{}
for _, item := range f {
i, err := expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, &item, res)
if err != nil {
return nil, err
}
items = append(items, i)
}
return items, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceMap flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceMap(c *Client, i interface{}, res *ServerTlsPolicy) map[string]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
a, ok := i.(map[string]interface{})
if !ok {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
if len(a) == 0 {
return map[string]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
items := make(map[string]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance)
for k, item := range a {
items[k] = *flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, item.(map[string]interface{}), res)
}
return items
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice flattens the contents of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceSlice(c *Client, i interface{}, res *ServerTlsPolicy) []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
a, ok := i.([]interface{})
if !ok {
return []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
if len(a) == 0 {
return []ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
items := make([]ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, 0, len(a))
for _, item := range a {
items = append(items, *flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c, item.(map[string]interface{}), res))
}
return items
}
// expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance expands an instance of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance into a JSON
// request object.
func expandServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c *Client, f *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance, res *ServerTlsPolicy) (map[string]interface{}, error) {
if dcl.IsEmptyValueIndirect(f) {
return nil, nil
}
m := make(map[string]interface{})
if v := f.PluginInstance; !dcl.IsEmptyValueIndirect(v) {
m["pluginInstance"] = v
}
return m, nil
}
// flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance flattens an instance of ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance from a JSON
// response object.
func flattenServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance(c *Client, i interface{}, res *ServerTlsPolicy) *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance {
m, ok := i.(map[string]interface{})
if !ok {
return nil
}
r := &ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
if dcl.IsEmptyValueIndirect(i) {
return EmptyServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance
}
r.PluginInstance = dcl.FlattenString(m["pluginInstance"])
return r
}
// This function returns a matcher that checks whether a serialized resource matches this resource
// in its parameters (as defined by the fields in a Get, which definitionally define resource
// identity). This is useful in extracting the element from a List call.
func (r *ServerTlsPolicy) matcher(c *Client) func([]byte) bool {
return func(b []byte) bool {
cr, err := unmarshalServerTlsPolicy(b, c, r)
if err != nil {
c.Config.Logger.Warning("failed to unmarshal provided resource in matcher.")
return false
}
nr := r.urlNormalized()
ncr := cr.urlNormalized()
c.Config.Logger.Infof("looking for %v\nin %v", nr, ncr)
if nr.Project == nil && ncr.Project == nil {
c.Config.Logger.Info("Both Project fields null - considering equal.")
} else if nr.Project == nil || ncr.Project == nil {
c.Config.Logger.Info("Only one Project field is null - considering unequal.")
return false
} else if *nr.Project != *ncr.Project {
return false
}
if nr.Location == nil && ncr.Location == nil {
c.Config.Logger.Info("Both Location fields null - considering equal.")
} else if nr.Location == nil || ncr.Location == nil {
c.Config.Logger.Info("Only one Location field is null - considering unequal.")
return false
} else if *nr.Location != *ncr.Location {
return false
}
if nr.Name == nil && ncr.Name == nil {
c.Config.Logger.Info("Both Name fields null - considering equal.")
} else if nr.Name == nil || ncr.Name == nil {
c.Config.Logger.Info("Only one Name field is null - considering unequal.")
return false
} else if *nr.Name != *ncr.Name {
return false
}
return true
}
}
type serverTlsPolicyDiff struct {
// The diff should include one or the other of RequiresRecreate or UpdateOp.
RequiresRecreate bool
UpdateOp serverTlsPolicyApiOperation
FieldName string // used for error logging
}
func convertFieldDiffsToServerTlsPolicyDiffs(config *dcl.Config, fds []*dcl.FieldDiff, opts []dcl.ApplyOption) ([]serverTlsPolicyDiff, error) {
opNamesToFieldDiffs := make(map[string][]*dcl.FieldDiff)
// Map each operation name to the field diffs associated with it.
for _, fd := range fds {
for _, ro := range fd.ResultingOperation {
if fieldDiffs, ok := opNamesToFieldDiffs[ro]; ok {
fieldDiffs = append(fieldDiffs, fd)
opNamesToFieldDiffs[ro] = fieldDiffs
} else {
config.Logger.Infof("%s required due to diff: %v", ro, fd)
opNamesToFieldDiffs[ro] = []*dcl.FieldDiff{fd}
}
}
}
var diffs []serverTlsPolicyDiff
// For each operation name, create a serverTlsPolicyDiff which contains the operation.
for opName, fieldDiffs := range opNamesToFieldDiffs {
// Use the first field diff's field name for logging required recreate error.
diff := serverTlsPolicyDiff{FieldName: fieldDiffs[0].FieldName}
if opName == "Recreate" {
diff.RequiresRecreate = true
} else {
apiOp, err := convertOpNameToServerTlsPolicyApiOperation(opName, fieldDiffs, opts...)
if err != nil {
return diffs, err
}
diff.UpdateOp = apiOp
}
diffs = append(diffs, diff)
}
return diffs, nil
}
func convertOpNameToServerTlsPolicyApiOperation(opName string, fieldDiffs []*dcl.FieldDiff, opts ...dcl.ApplyOption) (serverTlsPolicyApiOperation, error) {
switch opName {
case "updateServerTlsPolicyUpdateServerTlsPolicyOperation":
return &updateServerTlsPolicyUpdateServerTlsPolicyOperation{FieldDiffs: fieldDiffs}, nil
default:
return nil, fmt.Errorf("no such operation with name: %v", opName)
}
}
func extractServerTlsPolicyFields(r *ServerTlsPolicy) error {
vServerCertificate := r.ServerCertificate
if vServerCertificate == nil {
// note: explicitly not the empty object.
vServerCertificate = &ServerTlsPolicyServerCertificate{}
}
if err := extractServerTlsPolicyServerCertificateFields(r, vServerCertificate); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vServerCertificate) {
r.ServerCertificate = vServerCertificate
}
vMtlsPolicy := r.MtlsPolicy
if vMtlsPolicy == nil {
// note: explicitly not the empty object.
vMtlsPolicy = &ServerTlsPolicyMtlsPolicy{}
}
if err := extractServerTlsPolicyMtlsPolicyFields(r, vMtlsPolicy); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vMtlsPolicy) {
r.MtlsPolicy = vMtlsPolicy
}
return nil
}
func extractServerTlsPolicyServerCertificateFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificate) error {
vLocalFilepath := o.LocalFilepath
if vLocalFilepath == nil {
// note: explicitly not the empty object.
vLocalFilepath = &ServerTlsPolicyServerCertificateLocalFilepath{}
}
if err := extractServerTlsPolicyServerCertificateLocalFilepathFields(r, vLocalFilepath); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vLocalFilepath) {
o.LocalFilepath = vLocalFilepath
}
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
if err := extractServerTlsPolicyServerCertificateGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
if err := extractServerTlsPolicyServerCertificateCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func extractServerTlsPolicyServerCertificateLocalFilepathFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateLocalFilepath) error {
return nil
}
func extractServerTlsPolicyServerCertificateGrpcEndpointFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateGrpcEndpoint) error {
return nil
}
func extractServerTlsPolicyServerCertificateCertificateProviderInstanceFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateCertificateProviderInstance) error {
return nil
}
func extractServerTlsPolicyMtlsPolicyFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicy) error {
return nil
}
func extractServerTlsPolicyMtlsPolicyClientValidationCaFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCa) error {
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
if err := extractServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
if err := extractServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func extractServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) error {
return nil
}
func extractServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) error {
return nil
}
func postReadExtractServerTlsPolicyFields(r *ServerTlsPolicy) error {
vServerCertificate := r.ServerCertificate
if vServerCertificate == nil {
// note: explicitly not the empty object.
vServerCertificate = &ServerTlsPolicyServerCertificate{}
}
if err := postReadExtractServerTlsPolicyServerCertificateFields(r, vServerCertificate); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vServerCertificate) {
r.ServerCertificate = vServerCertificate
}
vMtlsPolicy := r.MtlsPolicy
if vMtlsPolicy == nil {
// note: explicitly not the empty object.
vMtlsPolicy = &ServerTlsPolicyMtlsPolicy{}
}
if err := postReadExtractServerTlsPolicyMtlsPolicyFields(r, vMtlsPolicy); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vMtlsPolicy) {
r.MtlsPolicy = vMtlsPolicy
}
return nil
}
func postReadExtractServerTlsPolicyServerCertificateFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificate) error {
vLocalFilepath := o.LocalFilepath
if vLocalFilepath == nil {
// note: explicitly not the empty object.
vLocalFilepath = &ServerTlsPolicyServerCertificateLocalFilepath{}
}
if err := extractServerTlsPolicyServerCertificateLocalFilepathFields(r, vLocalFilepath); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vLocalFilepath) {
o.LocalFilepath = vLocalFilepath
}
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ServerTlsPolicyServerCertificateGrpcEndpoint{}
}
if err := extractServerTlsPolicyServerCertificateGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ServerTlsPolicyServerCertificateCertificateProviderInstance{}
}
if err := extractServerTlsPolicyServerCertificateCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func postReadExtractServerTlsPolicyServerCertificateLocalFilepathFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateLocalFilepath) error {
return nil
}
func postReadExtractServerTlsPolicyServerCertificateGrpcEndpointFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateGrpcEndpoint) error {
return nil
}
func postReadExtractServerTlsPolicyServerCertificateCertificateProviderInstanceFields(r *ServerTlsPolicy, o *ServerTlsPolicyServerCertificateCertificateProviderInstance) error {
return nil
}
func postReadExtractServerTlsPolicyMtlsPolicyFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicy) error {
return nil
}
func postReadExtractServerTlsPolicyMtlsPolicyClientValidationCaFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCa) error {
vGrpcEndpoint := o.GrpcEndpoint
if vGrpcEndpoint == nil {
// note: explicitly not the empty object.
vGrpcEndpoint = &ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint{}
}
if err := extractServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointFields(r, vGrpcEndpoint); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vGrpcEndpoint) {
o.GrpcEndpoint = vGrpcEndpoint
}
vCertificateProviderInstance := o.CertificateProviderInstance
if vCertificateProviderInstance == nil {
// note: explicitly not the empty object.
vCertificateProviderInstance = &ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance{}
}
if err := extractServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceFields(r, vCertificateProviderInstance); err != nil {
return err
}
if !dcl.IsEmptyValueIndirect(vCertificateProviderInstance) {
o.CertificateProviderInstance = vCertificateProviderInstance
}
return nil
}
func postReadExtractServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpointFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCaGrpcEndpoint) error {
return nil
}
func postReadExtractServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstanceFields(r *ServerTlsPolicy, o *ServerTlsPolicyMtlsPolicyClientValidationCaCertificateProviderInstance) error {
return nil
}