generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 40
/
sweep.go
76 lines (60 loc) · 1.67 KB
/
sweep.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
package secrets
import (
"fmt"
"strings"
"github.com/harness/harness-go-sdk/harness/cd/graphql"
"github.com/harness/terraform-provider-harness/internal/sweep"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
)
func init() {
resource.AddTestSweepers("harness_encrypted_text", &resource.Sweeper{
Name: "harness_encrypted_text",
F: testSweepHarnessEncryptedText,
Dependencies: []string{
"harness_cloudprovider_aws",
"harness_git_connector",
"harness_ssh_credential",
"harness_winrm_credential",
},
})
resource.AddTestSweepers("harness_ssh_credential", &resource.Sweeper{
Name: "harness_ssh_credential",
F: testAccResourceSSHCredentialSweep,
})
}
func testSweepHarnessEncryptedText(r string) error {
c := sweep.SweeperClient
limit := 500
offset := 0
hasMore := true
for hasMore {
secrets, _, err := c.SecretClient.ListEncryptedTextSecrets(limit, offset)
if err != nil {
return err
}
for _, secret := range secrets {
if strings.HasPrefix(secret.Name, "Test") {
if err = c.SecretClient.DeleteSecret(secret.UUID, graphql.SecretTypes.EncryptedText); err != nil {
return err
}
}
}
hasMore = len(secrets) == limit
}
return nil
}
func testAccResourceSSHCredentialSweep(r string) error {
c := sweep.SweeperClient
creds, err := c.SecretClient.ListSSHCredentials()
if err != nil {
return fmt.Errorf("error retrieving SSH credentials: %s", err)
}
for _, cred := range creds {
if strings.HasPrefix(cred.Name, "Test") {
if err = c.SecretClient.DeleteSecret(cred.UUID, graphql.SecretTypes.SSHCredential); err != nil {
fmt.Printf("[ERROR] Failed to delete SSH credential: %s", err)
}
}
}
return nil
}