generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 41
/
file.go
118 lines (99 loc) · 4.02 KB
/
file.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
package secret
import (
"context"
"fmt"
"strings"
"github.com/antihax/optional"
"github.com/harness/harness-go-sdk/harness/nextgen"
"github.com/harness/terraform-provider-harness/helpers"
"github.com/harness/terraform-provider-harness/internal"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
)
func ResourceSecretFile() *schema.Resource {
resource := &schema.Resource{
Description: "Resource for creating a secret of type secret file in Harness.",
ReadContext: resourceSecretFileRead,
UpdateContext: resourceSecretFileCreateOrUpdate,
DeleteContext: resourceSecretDelete,
CreateContext: resourceSecretFileCreateOrUpdate,
Importer: helpers.MultiLevelResourceImporter,
Schema: map[string]*schema.Schema{
"secret_manager_identifier": {
Description: "Identifier of the Secret Manager used to manage the secret.",
Type: schema.TypeString,
Required: true,
},
"file_path": {
Description: "Path of the file containing secret value",
Type: schema.TypeString,
Required: true,
},
},
}
helpers.SetMultiLevelResourceSchema(resource.Schema)
return resource
}
func resourceSecretFileRead(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secret, err := resourceSecretReadBase(ctx, d, meta, nextgen.SecretTypes.SecretFile)
if err != nil {
return err
}
if err := readSecretFile(d, secret); err != nil {
return diag.FromErr(err)
}
return nil
}
func resourceSecretFileCreateOrUpdate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
c, ctx := meta.(*internal.Session).GetPlatformClientWithContext(ctx)
id := d.Id()
var err error
var resp nextgen.ResponseDtoSecretResponse
tags := d.Get("tags").(*schema.Set)
no_of_tags := tags.Len()
var tags_string = buildTag(no_of_tags, tags)
if id == "" {
resp, _, err = c.SecretsApi.PostSecretFileV2(ctx, c.AccountId, &nextgen.SecretsApiPostSecretFileV2Opts{
OrgIdentifier: buildField(d, "org_id"),
ProjectIdentifier: buildField(d, "project_id"),
Spec: optional.NewString(fmt.Sprintf(`{"secret":{"type":"SecretFile","name":"%[1]s","identifier":"%[2]s","description":"%[3]s","tags":%[4]s,"spec":{"secretManagerIdentifier":"%[5]s"}}}`, d.Get("name"), d.Get("identifier"), d.Get("description"), strings.Join(tags_string, ","), d.Get("secret_manager_identifier"))),
File: optional.NewInterface(d.Get("file_path").(string)),
})
} else {
resp, _, err = c.SecretsApi.PutSecretFileV2(ctx, c.AccountId, id, &nextgen.SecretsApiPutSecretFileV2Opts{
OrgIdentifier: buildField(d, "org_id"),
ProjectIdentifier: buildField(d, "project_id"),
Spec: optional.NewString(fmt.Sprintf(`{"secret":{"type":"SecretFile","name":"%[1]s","identifier":"%[2]s","description":"%[3]s","tags":%[4]s,"spec":{"secretManagerIdentifier":"%[5]s"}}}`, d.Get("name"), d.Get("identifier"), d.Get("description"), strings.Join(tags_string, ","), d.Get("secret_manager_identifier"))),
File: optional.NewInterface(d.Get("file_path").(string)),
})
}
if err != nil {
return diag.FromErr(err)
}
if err := readSecretFile(d, resp.Data.Secret); err != nil {
return diag.FromErr(err)
}
return nil
}
func buildTag(no_of_tags int, tags *schema.Set) []string {
var tags_string = make([]string, no_of_tags)
for i := 0; i < tags.Len(); i++ {
tag := fmt.Sprintf("%v", tags.List()[i])
split_tag := strings.Split(tag, ":")
key := split_tag[0]
value := split_tag[1]
tags_string[i] = fmt.Sprintf(`{"%[1]s":"%[2]s"}`, key, value)
}
return tags_string
}
func readSecretFile(d *schema.ResourceData, secret *nextgen.Secret) error {
d.Set("secret_manager_identifier", secret.File.SecretManagerIdentifier)
d.SetId(secret.Identifier)
d.Set("identifier", secret.Identifier)
d.Set("description", secret.Description)
d.Set("name", secret.Name)
d.Set("org_id", secret.OrgIdentifier)
d.Set("project_id", secret.ProjectIdentifier)
d.Set("tags", helpers.FlattenTags(secret.Tags))
return nil
}