mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-16 03:32:54 -06:00
56c352a535
bool not string Fixes: #11010 Adds a test to show cover the use-case that the OP suggested caused the panic ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSDataSourceIAMServerCertificate_' ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/01/03 22:39:21 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSDataSourceIAMServerCertificate_ -timeout 120m === RUN TestAccAWSDataSourceIAMServerCertificate_basic --- PASS: TestAccAWSDataSourceIAMServerCertificate_basic (19.48s) === RUN TestAccAWSDataSourceIAMServerCertificate_matchNamePrefix --- PASS: TestAccAWSDataSourceIAMServerCertificate_matchNamePrefix (1.95s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 21.454s ```
135 lines
3.3 KiB
Go
135 lines
3.3 KiB
Go
package aws
|
|
|
|
import (
|
|
"fmt"
|
|
"sort"
|
|
"strings"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/service/iam"
|
|
"github.com/hashicorp/errwrap"
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
)
|
|
|
|
func dataSourceAwsIAMServerCertificate() *schema.Resource {
|
|
return &schema.Resource{
|
|
Read: dataSourceAwsIAMServerCertificateRead,
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"name": {
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
Computed: true,
|
|
ForceNew: true,
|
|
ConflictsWith: []string{"name_prefix"},
|
|
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
|
|
value := v.(string)
|
|
if len(value) > 128 {
|
|
errors = append(errors, fmt.Errorf(
|
|
"%q cannot be longer than 128 characters", k))
|
|
}
|
|
return
|
|
},
|
|
},
|
|
|
|
"name_prefix": {
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
|
|
value := v.(string)
|
|
if len(value) > 30 {
|
|
errors = append(errors, fmt.Errorf(
|
|
"%q cannot be longer than 30 characters, name is limited to 128", k))
|
|
}
|
|
return
|
|
},
|
|
},
|
|
|
|
"latest": {
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
Default: false,
|
|
},
|
|
|
|
"arn": {
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
|
|
"path": {
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
|
|
"expiration_date": {
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
type certificateByExpiration []*iam.ServerCertificateMetadata
|
|
|
|
func (m certificateByExpiration) Len() int {
|
|
return len(m)
|
|
}
|
|
|
|
func (m certificateByExpiration) Swap(i, j int) {
|
|
m[i], m[j] = m[j], m[i]
|
|
}
|
|
|
|
func (m certificateByExpiration) Less(i, j int) bool {
|
|
return m[i].Expiration.After(*m[j].Expiration)
|
|
}
|
|
|
|
func dataSourceAwsIAMServerCertificateRead(d *schema.ResourceData, meta interface{}) error {
|
|
iamconn := meta.(*AWSClient).iamconn
|
|
|
|
var matcher = func(cert *iam.ServerCertificateMetadata) bool {
|
|
return strings.HasPrefix(aws.StringValue(cert.ServerCertificateName), d.Get("name_prefix").(string))
|
|
}
|
|
if v, ok := d.GetOk("name"); ok {
|
|
matcher = func(cert *iam.ServerCertificateMetadata) bool {
|
|
return aws.StringValue(cert.ServerCertificateName) == v.(string)
|
|
}
|
|
}
|
|
|
|
var metadatas = []*iam.ServerCertificateMetadata{}
|
|
err := iamconn.ListServerCertificatesPages(&iam.ListServerCertificatesInput{}, func(p *iam.ListServerCertificatesOutput, lastPage bool) bool {
|
|
for _, cert := range p.ServerCertificateMetadataList {
|
|
if matcher(cert) {
|
|
metadatas = append(metadatas, cert)
|
|
}
|
|
}
|
|
return true
|
|
})
|
|
if err != nil {
|
|
return errwrap.Wrapf("Error describing certificates: {{err}}", err)
|
|
}
|
|
|
|
if len(metadatas) == 0 {
|
|
return fmt.Errorf("Search for AWS IAM server certificate returned no results")
|
|
}
|
|
if len(metadatas) > 1 {
|
|
if !d.Get("latest").(bool) {
|
|
return fmt.Errorf("Search for AWS IAM server certificate returned too many results")
|
|
}
|
|
|
|
sort.Sort(certificateByExpiration(metadatas))
|
|
}
|
|
|
|
metadata := metadatas[0]
|
|
d.SetId(*metadata.ServerCertificateId)
|
|
d.Set("arn", *metadata.Arn)
|
|
d.Set("path", *metadata.Path)
|
|
d.Set("name", *metadata.ServerCertificateName)
|
|
if metadata.Expiration != nil {
|
|
d.Set("expiration_date", metadata.Expiration.Format("2006-01-02T15:04:05"))
|
|
}
|
|
|
|
return nil
|
|
}
|