mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-02 12:17:39 -06:00
cdd9464f9a
This is part of a general effort to move all of Terraform's non-library package surface under internal in order to reinforce that these are for internal use within Terraform only. If you were previously importing packages under this prefix into an external codebase, you could pin to an earlier release tag as an interim solution until you've make a plan to achieve the same functionality some other way.
67 lines
2.0 KiB
Go
67 lines
2.0 KiB
Go
package funcs
|
|
|
|
import (
|
|
"github.com/zclconf/go-cty/cty"
|
|
"github.com/zclconf/go-cty/cty/function"
|
|
)
|
|
|
|
// SensitiveFunc returns a value identical to its argument except that
|
|
// Terraform will consider it to be sensitive.
|
|
var SensitiveFunc = function.New(&function.Spec{
|
|
Params: []function.Parameter{
|
|
{
|
|
Name: "value",
|
|
Type: cty.DynamicPseudoType,
|
|
AllowUnknown: true,
|
|
AllowNull: true,
|
|
AllowMarked: true,
|
|
AllowDynamicType: true,
|
|
},
|
|
},
|
|
Type: func(args []cty.Value) (cty.Type, error) {
|
|
// This function only affects the value's marks, so the result
|
|
// type is always the same as the argument type.
|
|
return args[0].Type(), nil
|
|
},
|
|
Impl: func(args []cty.Value, retType cty.Type) (ret cty.Value, err error) {
|
|
val, _ := args[0].Unmark()
|
|
return val.Mark("sensitive"), nil
|
|
},
|
|
})
|
|
|
|
// NonsensitiveFunc takes a sensitive value and returns the same value without
|
|
// the sensitive marking, effectively exposing the value.
|
|
var NonsensitiveFunc = function.New(&function.Spec{
|
|
Params: []function.Parameter{
|
|
{
|
|
Name: "value",
|
|
Type: cty.DynamicPseudoType,
|
|
AllowUnknown: true,
|
|
AllowNull: true,
|
|
AllowMarked: true,
|
|
AllowDynamicType: true,
|
|
},
|
|
},
|
|
Type: func(args []cty.Value) (cty.Type, error) {
|
|
// This function only affects the value's marks, so the result
|
|
// type is always the same as the argument type.
|
|
return args[0].Type(), nil
|
|
},
|
|
Impl: func(args []cty.Value, retType cty.Type) (ret cty.Value, err error) {
|
|
if args[0].IsKnown() && !args[0].HasMark("sensitive") {
|
|
return cty.DynamicVal, function.NewArgErrorf(0, "the given value is not sensitive, so this call is redundant")
|
|
}
|
|
v, marks := args[0].Unmark()
|
|
delete(marks, "sensitive") // remove the sensitive marking
|
|
return v.WithMarks(marks), nil
|
|
},
|
|
})
|
|
|
|
func Sensitive(v cty.Value) (cty.Value, error) {
|
|
return SensitiveFunc.Call([]cty.Value{v})
|
|
}
|
|
|
|
func Nonsensitive(v cty.Value) (cty.Value, error) {
|
|
return NonsensitiveFunc.Call([]cty.Value{v})
|
|
}
|