Skip to content

Commit

Permalink
AccessContextManager - Add dry run service perimeter resource (#10145) (
Browse files Browse the repository at this point in the history
#7115)

[upstream:5b99a9a281b329b84b6a12d3947dcd31896b0a30]

Signed-off-by: Modular Magician <[email protected]>
  • Loading branch information
modular-magician authored Mar 18, 2024
1 parent e26f951 commit 3353a81
Show file tree
Hide file tree
Showing 7 changed files with 1,490 additions and 738 deletions.
6 changes: 6 additions & 0 deletions .changelog/10145.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,6 @@
```release-note:enhancement
accesscontextmanager: support managing service perimeter dry run resources outside the perimeter via new resource `google_access_context_manager_service_perimeter_dry_run_resource`
```
```release-note:new-resource
`google_access_context_manager_service_perimeter_dry_run_resource`
```
1,443 changes: 722 additions & 721 deletions google-beta/provider/provider_mmv1_resources.go

Large diffs are not rendered by default.

Original file line number Diff line number Diff line change
Expand Up @@ -18,21 +18,22 @@ import (
// can exist, they need to be run serially
func TestAccAccessContextManager(t *testing.T) {
testCases := map[string]func(t *testing.T){
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
"access_policy": testAccAccessContextManagerAccessPolicy_basicTest,
"access_policy_scoped": testAccAccessContextManagerAccessPolicy_scopedTest,
"service_perimeter": testAccAccessContextManagerServicePerimeter_basicTest,
"service_perimeter_update": testAccAccessContextManagerServicePerimeter_updateTest,
"service_perimeter_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
"service_perimeter_dry_run_resource": testAccAccessContextManagerServicePerimeterResource_basicTest,
"access_level": testAccAccessContextManagerAccessLevel_basicTest,
"access_level_full": testAccAccessContextManagerAccessLevel_fullTest,
"access_level_custom": testAccAccessContextManagerAccessLevel_customTest,
"access_levels": testAccAccessContextManagerAccessLevels_basicTest,
"access_level_condition": testAccAccessContextManagerAccessLevelCondition_basicTest,
"service_perimeter_egress_policy": testAccAccessContextManagerServicePerimeterEgressPolicy_basicTest,
"service_perimeter_ingress_policy": testAccAccessContextManagerServicePerimeterIngressPolicy_basicTest,
"service_perimeters": testAccAccessContextManagerServicePerimeters_basicTest,
"gcp_user_access_binding": testAccAccessContextManagerGcpUserAccessBinding_basicTest,
"authorized_orgs_desc": testAccAccessContextManagerAuthorizedOrgsDesc_basicTest,
}

for name, tc := range testCases {
Expand Down
Loading

0 comments on commit 3353a81

Please sign in to comment.