terraform-provider-garage/garage/resource_key.go

223 lines
5.4 KiB
Go
Raw Permalink Normal View History

package garage
import (
"context"
garage "git.deuxfleurs.fr/garage-sdk/garage-admin-sdk-golang"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
)
func schemaKey() map[string]*schema.Schema {
return map[string]*schema.Schema{
// Properties
"name": {
Description: "The name of the key.",
Type: schema.TypeString,
Required: true,
},
"access_key_id": {
Type: schema.TypeString,
Computed: true,
Optional: true,
ForceNew: true,
},
"secret_access_key": {
Type: schema.TypeString,
Computed: true,
Optional: true,
Sensitive: true,
ForceNew: true,
},
"permissions": {
Type: schema.TypeMap,
Optional: true,
Elem: &schema.Schema{
Type: schema.TypeBool,
},
Default: map[string]bool{
"create_bucket": false,
},
},
}
}
func resourceKey() *schema.Resource {
return &schema.Resource{
Description: "This resource can be used to manage Garage keys.",
CreateContext: resourceKeyCreate,
ReadContext: resourceKeyRead,
UpdateContext: resourceKeyUpdate,
DeleteContext: resourceKeyDelete,
Schema: schemaKey(),
Importer: &schema.ResourceImporter{
StateContext: schema.ImportStatePassthroughContext,
},
}
}
func flattenKeyInfo(keyInfo *garage.KeyInfo) interface{} {
return map[string]interface{}{
"name": keyInfo.Name,
"access_key_id": keyInfo.AccessKeyId,
2023-11-23 02:13:45 +00:00
"secret_access_key": keyInfo.SecretAccessKey.Get(),
"permissions": map[string]interface{}{
"create_bucket": keyInfo.Permissions.CreateBucket,
},
}
}
func resourceKeyCreate(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
p := m.(*garageProvider)
var diags diag.Diagnostics
var name *string
name = nil
accessKeyID := ""
secretAccessKey := ""
if nameVal, ok := d.GetOk("name"); ok {
nameVal := nameVal.(string)
name = &nameVal
}
if accessKeyIDVal, ok := d.GetOk("access_key_id"); ok {
accessKeyID = accessKeyIDVal.(string)
}
if secretAccessKeyVal, ok := d.GetOk("access_key_id"); ok {
secretAccessKey = secretAccessKeyVal.(string)
}
var keyInfo *garage.KeyInfo
var resp *garage.KeyInfo
var err error
nullableName := garage.NewNullableString(name)
infoCtx := updateContext(ctx, p)
if accessKeyID != "" || secretAccessKey != "" {
importKeyRequest := *garage.NewImportKeyRequest(*nullableName, accessKeyID, secretAccessKey)
resp, _, err = p.client.KeyApi.ImportKey(infoCtx).ImportKeyRequest(importKeyRequest).Execute()
} else {
addKeyRequest := *garage.NewAddKeyRequest()
addKeyRequest.Name = *nullableName
resp, _, err = p.client.KeyApi.AddKey(infoCtx).AddKeyRequest(addKeyRequest).Execute()
}
if err != nil {
return diag.FromErr(err)
}
keyInfo = resp
d.SetId(*keyInfo.AccessKeyId)
if permissions, ok := d.GetOk("permissions"); ok {
permissions := permissions.(map[string]interface{})
allowCreateBucket := permissions["create_bucket"].(bool)
denyCreateBucket := !permissions["create_bucket"].(bool)
allow := garage.UpdateKeyRequestAllow{
CreateBucket: &allowCreateBucket,
}
deny := garage.UpdateKeyRequestDeny{
CreateBucket: &denyCreateBucket,
}
updateKeyRequest := garage.UpdateKeyRequest{
Allow: &allow,
Deny: &deny,
}
_, _, err := p.client.KeyApi.UpdateKey(updateContext(ctx, p)).Id(d.Id()).UpdateKeyRequest(updateKeyRequest).Execute()
if err != nil {
return diag.FromErr(err)
}
}
diags = resourceKeyRead(ctx, d, m)
return diags
}
func resourceKeyRead(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
p := m.(*garageProvider)
var diags diag.Diagnostics
accessKeyID := d.Id()
2023-11-23 02:13:45 +00:00
reqCtx := updateContext(ctx, p)
2023-11-23 02:13:45 +00:00
keyInfo, _, err := p.client.KeyApi.GetKey(reqCtx).ShowSecretKey("true").Id(accessKeyID).Execute()
if err != nil {
return diag.FromErr(err)
}
for key, value := range flattenKeyInfo(keyInfo).(map[string]interface{}) {
err := d.Set(key, value)
if err != nil {
return diag.FromErr(err)
}
}
return diags
}
func resourceKeyUpdate(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
p := m.(*garageProvider)
var diags diag.Diagnostics
var name *string
name = nil
var allow *garage.UpdateKeyRequestAllow
allow = nil
var deny *garage.UpdateKeyRequestDeny
deny = nil
if nameVal, ok := d.GetOk("name"); ok {
nameVal := nameVal.(string)
name = &nameVal
}
if permissions, ok := d.GetOk("permissions"); ok {
permissions := permissions.(map[string]interface{})
allowCreateBucket := permissions["create_bucket"].(bool)
denyCreateBucket := !permissions["create_bucket"].(bool)
allow = &garage.UpdateKeyRequestAllow{
CreateBucket: &allowCreateBucket,
}
deny = &garage.UpdateKeyRequestDeny{
CreateBucket: &denyCreateBucket,
}
}
updateKeyRequest := garage.UpdateKeyRequest{
Name: name,
Allow: allow,
Deny: deny,
}
_, _, err := p.client.KeyApi.UpdateKey(updateContext(ctx, p)).Id(d.Id()).UpdateKeyRequest(updateKeyRequest).Execute()
if err != nil {
return diag.FromErr(err)
}
diags = resourceKeyRead(ctx, d, m)
return diags
}
func resourceKeyDelete(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
p := m.(*garageProvider)
var diags diag.Diagnostics
accessKeyID := d.Id()
_, err := p.client.KeyApi.DeleteKey(updateContext(ctx, p)).Id(accessKeyID).Execute()
if err != nil {
return diag.FromErr(err)
}
return diags
}