generated from hashicorp/terraform-provider-scaffolding
-
Notifications
You must be signed in to change notification settings - Fork 40
/
text.go
105 lines (86 loc) · 2.82 KB
/
text.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
package secret
import (
"context"
"github.com/harness/harness-go-sdk/harness/nextgen"
"github.com/harness/terraform-provider-harness/helpers"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
)
func ResourceSecretText() *schema.Resource {
resource := &schema.Resource{
Description: "Resource for creating secret of type secret text",
ReadContext: resourceSecretTextRead,
CreateContext: resourceSecretTextCreateOrUpdate,
UpdateContext: resourceSecretTextCreateOrUpdate,
DeleteContext: resourceSecretDelete,
Importer: helpers.MultiLevelResourceImporter,
Schema: map[string]*schema.Schema{
"secret_manager_identifier": {
Description: "Identifier of the Secret Manager used to manage the secret.",
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"value_type": {
Description: "This has details to specify if the secret value is Inline or Reference.",
Type: schema.TypeString,
Required: true,
ValidateFunc: validation.StringInSlice([]string{"Reference", "Inline"}, false),
},
"value": {
Description: "Value of the Secret",
Type: schema.TypeString,
Optional: true,
},
},
}
helpers.SetMultiLevelResourceSchema(resource.Schema)
return resource
}
func resourceSecretTextRead(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secret, err := resourceSecretReadBase(ctx, d, meta, nextgen.SecretTypes.SecretText)
if err != nil {
return err
}
if err := readSecretText(d, secret); err != nil {
return diag.FromErr(err)
}
return nil
}
func resourceSecretTextCreateOrUpdate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secret := buildSecretText(d)
newSecret, err := resourceSecretCreateOrUpdateBase(ctx, d, meta, secret)
if err != nil {
return err
}
if err := readSecretText(d, newSecret); err != nil {
return diag.FromErr(err)
}
return nil
}
func buildSecretText(d *schema.ResourceData) *nextgen.Secret {
secret := &nextgen.Secret{
Type_: nextgen.SecretTypes.SecretText,
Text: &nextgen.SecretTextSpec{},
}
if attr, ok := d.GetOk("secret_manager_identifier"); ok {
secret.Text.SecretManagerIdentifier = attr.(string)
}
if attr, ok := d.GetOk("value_type"); ok {
secret.Text.ValueType = nextgen.SecretTextValueType(attr.(string))
}
if attr, ok := d.GetOk("value"); ok {
secret.Text.Value = attr.(string)
}
return secret
}
func readSecretText(d *schema.ResourceData, secret *nextgen.Secret) error {
if secret == nil {
return nil
}
d.Set("secret_manager_identifier", secret.Text.SecretManagerIdentifier)
d.Set("value_type", secret.Text.ValueType)
d.Set("value", secret.Text.Value)
return nil
}