Skip to content

Commit

Permalink
Add support for IAM policies on Security Command Center sources (hash…
Browse files Browse the repository at this point in the history
…icorp#6493) (hashicorp#12840)

* Add support for IAM policies on SCC sources

* Add tests

* rm beta

Signed-off-by: Modular Magician <magic-modules@google.com>

Signed-off-by: Modular Magician <magic-modules@google.com>
  • Loading branch information
modular-magician authored and brian-fogg-candid-health committed Oct 21, 2022
1 parent 0355f71 commit 17584b9
Show file tree
Hide file tree
Showing 6 changed files with 545 additions and 3 deletions.
3 changes: 3 additions & 0 deletions .changelog/6493.txt
@@ -0,0 +1,3 @@
```release-note:enhancement
Enable IAM resources for Security Command Center sources
```
182 changes: 182 additions & 0 deletions google/iam_scc_source.go
@@ -0,0 +1,182 @@
// ----------------------------------------------------------------------------
//
// *** AUTO GENERATED CODE *** Type: MMv1 ***
//
// ----------------------------------------------------------------------------
//
// This file is automatically generated by Magic Modules and manual
// changes will be clobbered when the file is regenerated.
//
// Please read more about how to change this file in
// .github/CONTRIBUTING.md.
//
// ----------------------------------------------------------------------------

package google

import (
"fmt"

"github.com/hashicorp/errwrap"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"google.golang.org/api/cloudresourcemanager/v1"
)

var SecurityCenterSourceIamSchema = map[string]*schema.Schema{
"organization": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"source": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
DiffSuppressFunc: compareSelfLinkOrResourceName,
},
}

type SecurityCenterSourceIamUpdater struct {
organization string
source string
d TerraformResourceData
Config *Config
}

func SecurityCenterSourceIamUpdaterProducer(d TerraformResourceData, config *Config) (ResourceIamUpdater, error) {
values := make(map[string]string)

if v, ok := d.GetOk("organization"); ok {
values["organization"] = v.(string)
}

if v, ok := d.GetOk("source"); ok {
values["source"] = v.(string)
}

// We may have gotten either a long or short name, so attempt to parse long name if possible
m, err := getImportIdQualifiers([]string{"organizations/(?P<organization>[^/]+)/sources/(?P<source>[^/]+)", "(?P<organization>[^/]+)/(?P<source>[^/]+)", "(?P<source>[^/]+)"}, d, config, d.Get("source").(string))
if err != nil {
return nil, err
}

for k, v := range m {
values[k] = v
}

u := &SecurityCenterSourceIamUpdater{
organization: values["organization"],
source: values["source"],
d: d,
Config: config,
}

if err := d.Set("organization", u.organization); err != nil {
return nil, fmt.Errorf("Error setting organization: %s", err)
}
if err := d.Set("source", u.GetResourceId()); err != nil {
return nil, fmt.Errorf("Error setting source: %s", err)
}

return u, nil
}

func SecurityCenterSourceIdParseFunc(d *schema.ResourceData, config *Config) error {
values := make(map[string]string)

m, err := getImportIdQualifiers([]string{"organizations/(?P<organization>[^/]+)/sources/(?P<source>[^/]+)", "(?P<organization>[^/]+)/(?P<source>[^/]+)", "(?P<source>[^/]+)"}, d, config, d.Id())
if err != nil {
return err
}

for k, v := range m {
values[k] = v
}

u := &SecurityCenterSourceIamUpdater{
organization: values["organization"],
source: values["source"],
d: d,
Config: config,
}
if err := d.Set("source", u.GetResourceId()); err != nil {
return fmt.Errorf("Error setting source: %s", err)
}
d.SetId(u.GetResourceId())
return nil
}

func (u *SecurityCenterSourceIamUpdater) GetResourceIamPolicy() (*cloudresourcemanager.Policy, error) {
url, err := u.qualifySourceUrl("getIamPolicy")
if err != nil {
return nil, err
}

var obj map[string]interface{}

userAgent, err := generateUserAgentString(u.d, u.Config.userAgent)
if err != nil {
return nil, err
}

policy, err := sendRequest(u.Config, "POST", "", url, userAgent, obj)
if err != nil {
return nil, errwrap.Wrapf(fmt.Sprintf("Error retrieving IAM policy for %s: {{err}}", u.DescribeResource()), err)
}

out := &cloudresourcemanager.Policy{}
err = Convert(policy, out)
if err != nil {
return nil, errwrap.Wrapf("Cannot convert a policy to a resource manager policy: {{err}}", err)
}

return out, nil
}

func (u *SecurityCenterSourceIamUpdater) SetResourceIamPolicy(policy *cloudresourcemanager.Policy) error {
json, err := ConvertToMap(policy)
if err != nil {
return err
}

obj := make(map[string]interface{})
obj["policy"] = json

url, err := u.qualifySourceUrl("setIamPolicy")
if err != nil {
return err
}

userAgent, err := generateUserAgentString(u.d, u.Config.userAgent)
if err != nil {
return err
}

_, err = sendRequestWithTimeout(u.Config, "POST", "", url, userAgent, obj, u.d.Timeout(schema.TimeoutCreate))
if err != nil {
return errwrap.Wrapf(fmt.Sprintf("Error setting IAM policy for %s: {{err}}", u.DescribeResource()), err)
}

return nil
}

func (u *SecurityCenterSourceIamUpdater) qualifySourceUrl(methodIdentifier string) (string, error) {
urlTemplate := fmt.Sprintf("{{SecurityCenterBasePath}}%s:%s", fmt.Sprintf("organizations/%s/sources/%s", u.organization, u.source), methodIdentifier)
url, err := replaceVars(u.d, u.Config, urlTemplate)
if err != nil {
return "", err
}
return url, nil
}

func (u *SecurityCenterSourceIamUpdater) GetResourceId() string {
return fmt.Sprintf("organizations/%s/sources/%s", u.organization, u.source)
}

func (u *SecurityCenterSourceIamUpdater) GetMutexKey() string {
return fmt.Sprintf("iam-securitycenter-source-%s", u.GetResourceId())
}

func (u *SecurityCenterSourceIamUpdater) DescribeResource() string {
return fmt.Sprintf("securitycenter source %q", u.GetResourceId())
}

0 comments on commit 17584b9

Please sign in to comment.