Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SM New error formatting + crypto_key label name changes #5562

Merged
merged 70 commits into from
Sep 11, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
70 commits
Select commit Hold shift + click to select a range
317590f
SC addition
Nov 15, 2023
babc0f9
SC addition
Nov 15, 2023
8071667
SC addition
Nov 15, 2023
60abaf9
update function updated
Nov 19, 2023
8477dde
SC unit tests added
Nov 22, 2023
2f38ba5
Merge branch 'IBM-Cloud:master' into master
yonatanyell Nov 22, 2023
972a9b9
SC unit tests added
Nov 28, 2023
59c5e72
d
Dec 6, 2023
2ff98ad
tests fixes
Dec 6, 2023
b9e8416
Merge remote-tracking branch 'origin/master'
Dec 6, 2023
40ea122
tests fixes
Dec 6, 2023
f3a195f
update sdk
TatyanaBol Dec 11, 2023
8fa09ae
.secrets.baseline update
Dec 11, 2023
a6b779c
.secrets.baseline update
Dec 11, 2023
1f1e01a
Merge branch 'master' into master
yonatanyell Dec 11, 2023
cea9bd4
.secrets.baseline update
Dec 11, 2023
0d333f9
Merge remote-tracking branch 'origin/master'
Dec 11, 2023
ad75820
Update sm_service_credentials_secret_metadata.html.markdown
IdanAdar Dec 13, 2023
5ece471
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Dec 26, 2023
e91f429
bugs fixes
Dec 26, 2023
c44ff91
bugs fixes
Dec 26, 2023
74626d8
bugs fixes
Dec 26, 2023
bd730d7
Merge branch 'master' into master
yonatanyell Dec 28, 2023
fbf61c6
docs bugs fixes
Jan 3, 2024
fbc7294
Merge remote-tracking branch 'origin/master'
Jan 3, 2024
25f8094
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jan 3, 2024
e63a564
preferred_chain added for public cert lets encrypt configuration
Jan 15, 2024
daa771b
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jan 15, 2024
ef612d9
support for creating secret version for username password & version_c…
Jan 15, 2024
6e7b866
Merge remote-tracking branch 'origin/master'
Jan 15, 2024
3bb189a
support for creating secret version for username password & version_c…
Jan 15, 2024
47ea09c
support for creating secret version for username password & version_c…
Jan 17, 2024
27241e5
support for creating secret version for username password & version_c…
Jan 17, 2024
c1ca0e7
support for creating secret version for username password & version_c…
Jan 17, 2024
988d3df
support for creating secret version for username password & version_c…
Jan 17, 2024
fd3a343
Merge branch 'master' into master
yonatanyell Jan 21, 2024
61de984
preferred chain docs update
Jan 29, 2024
64e35ee
Merge remote-tracking branch 'origin/master'
Jan 29, 2024
4ca06c6
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Jan 29, 2024
5396f65
support for creating secret version for username password & version_c…
Jan 29, 2024
1ea2493
support for creating secret version for username password & version_c…
Jan 29, 2024
1a16c08
support for creating secret version for username password & version_c…
Jan 29, 2024
86af4c0
fix public cert bug
Jan 29, 2024
612ec12
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Mar 26, 2024
b16e9f3
update docs
Mar 27, 2024
4a901a7
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 6, 2024
446af33
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 15, 2024
b6b7929
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 20, 2024
a1b39ba
reordering bug in alt_names
May 20, 2024
3af4490
name regex fix in docs
May 22, 2024
6b01f8b
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 22, 2024
edde88e
imported cert bug fix
May 27, 2024
c6f5e63
Merge branch 'master' into master
yonatanyell May 27, 2024
bcf6e76
crypto_key addition
Jul 21, 2024
85ab27f
crypto_key addition
Jul 29, 2024
34d9371
crypto_key addition
Aug 6, 2024
11133eb
Merge branch 'IBM-Cloud:master' into master
yonatanyell Aug 6, 2024
1f27098
crypto_key addition
Aug 6, 2024
6f8fe14
rejections fixes
Aug 12, 2024
4670c91
rejections fixes
Aug 13, 2024
c8972f5
rejections fixes
Aug 13, 2024
9b77d30
rejections fixes
Aug 13, 2024
7fe57d1
rejections fixes
Aug 13, 2024
5c6ca94
test label name changed
Aug 19, 2024
d1864d7
test label name changed
Aug 19, 2024
90e5cfb
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Aug 19, 2024
c572d55
error formating update
Sep 2, 2024
98f3c74
Merge branch 'IBM-Cloud:master' into master
yonatanyell Sep 2, 2024
eb913ca
go sdk version update
Sep 11, 2024
ec2478c
Merge remote-tracking branch 'origin/master'
Sep 11, 2024
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -36,7 +36,7 @@ require (
github.com/IBM/sarama v1.41.2
github.com/IBM/scc-go-sdk/v5 v5.4.1
github.com/IBM/schematics-go-sdk v0.2.3
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.5
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.6
github.com/IBM/vmware-go-sdk v0.1.2
github.com/IBM/vpc-beta-go-sdk v0.6.0
github.com/IBM/vpc-go-sdk v0.57.0
Expand Down
2 changes: 2 additions & 0 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -187,6 +187,8 @@ github.com/IBM/schematics-go-sdk v0.2.3 h1:lgTt0Sbudii3cuSk1YSQgrtiZAXDbBABAoVj3
github.com/IBM/schematics-go-sdk v0.2.3/go.mod h1:Tw2OSAPdpC69AxcwoyqcYYaGTTW6YpERF9uNEU+BFRQ=
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.5 h1:VMc/Zd6RzB8j60CqZekkwYT2wQsCfrkGV2n01Gviuaw=
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.5/go.mod h1:5kUgJ1dG9cdiAcPDqVz46m362bPnoqZQSth24NiowSg=
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.6 h1:bF6bAdI4wDZSje6+Yx1mJxvirboxO+uMuKhzgfRCNxE=
github.com/IBM/secrets-manager-go-sdk/v2 v2.0.6/go.mod h1:XWYnbcc5vN1RnKwk/fCzfD8aZd7At/Y1/b6c+oDyliU=
github.com/IBM/vmware-go-sdk v0.1.2 h1:5lKWFyInWz9e2hwGsoFTEoLa1jYkD30SReN0fQ10w9M=
github.com/IBM/vmware-go-sdk v0.1.2/go.mod h1:2UGPBJju3jiv5VKKBBm9a5L6bzF/aJdKOKAzJ7HaOjA=
github.com/IBM/vpc-beta-go-sdk v0.6.0 h1:wfM3AcW3zOM3xsRtZ+EA6+sESlGUjQ6Yf4n5QQyz4uc=
Expand Down
57 changes: 37 additions & 20 deletions ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go
Original file line number Diff line number Diff line change
Expand Up @@ -131,8 +131,7 @@ func DataSourceIbmSmArbitrarySecret() *schema.Resource {
}

func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {

secret, region, instanceId, diagError := getSecretByIdOrByName(context, d, meta, ArbitrarySecretType)
secret, region, instanceId, diagError := getSecretByIdOrByName(context, d, meta, ArbitrarySecretType, ArbitrarySecretResourceName)
if diagError != nil {
return diagError
}
Expand All @@ -142,18 +141,22 @@ func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.Resou

var err error
if err = d.Set("region", region); err != nil {
return diag.FromErr(fmt.Errorf("Error setting region: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
if err = d.Set("created_by", arbitrarySecret.CreatedBy); err != nil {
return diag.FromErr(fmt.Errorf("Error setting created_by: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("created_at", DateTimeToRFC3339(arbitrarySecret.CreatedAt)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting created_at: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("crn", arbitrarySecret.Crn); err != nil {
return diag.FromErr(fmt.Errorf("Error setting crn: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if arbitrarySecret.CustomMetadata != nil {
Expand All @@ -163,59 +166,73 @@ func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.Resou
}

if err = d.Set("custom_metadata", flex.Flatten(convertedMap)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting custom_metadata: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
if err != nil {
return diag.FromErr(fmt.Errorf("Error setting custom_metadata %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
}

if err = d.Set("description", arbitrarySecret.Description); err != nil {
return diag.FromErr(fmt.Errorf("Error setting description: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("downloaded", arbitrarySecret.Downloaded); err != nil {
return diag.FromErr(fmt.Errorf("Error setting downloaded: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("locks_total", flex.IntValue(arbitrarySecret.LocksTotal)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting locks_total: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("name", arbitrarySecret.Name); err != nil {
return diag.FromErr(fmt.Errorf("Error setting name: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_group_id", arbitrarySecret.SecretGroupID); err != nil {
return diag.FromErr(fmt.Errorf("Error setting secret_group_id: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_type", arbitrarySecret.SecretType); err != nil {
return diag.FromErr(fmt.Errorf("Error setting secret_type: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state", flex.IntValue(arbitrarySecret.State)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting state: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state_description", arbitrarySecret.StateDescription); err != nil {
return diag.FromErr(fmt.Errorf("Error setting state_description: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("updated_at", DateTimeToRFC3339(arbitrarySecret.UpdatedAt)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting updated_at: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("versions_total", flex.IntValue(arbitrarySecret.VersionsTotal)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting versions_total: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("expiration_date", DateTimeToRFC3339(arbitrarySecret.ExpirationDate)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting expiration_date: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("payload", arbitrarySecret.Payload); err != nil {
return diag.FromErr(fmt.Errorf("Error setting payload: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting payload"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

return nil
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -119,7 +119,8 @@ func DataSourceIbmSmArbitrarySecretMetadata() *schema.Resource {
func dataSourceIbmSmArbitrarySecretMetadataRead(context context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secretsManagerClient, err := meta.(conns.ClientSession).SecretsManagerV2()
if err != nil {
return diag.FromErr(err)
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

region := getRegion(secretsManagerClient, d)
Expand All @@ -134,27 +135,32 @@ func dataSourceIbmSmArbitrarySecretMetadataRead(context context.Context, d *sche
arbitrarySecretMetadataIntf, response, err := secretsManagerClient.GetSecretMetadataWithContext(context, getSecretMetadataOptions)
if err != nil {
log.Printf("[DEBUG] GetSecretMetadataWithContext failed %s\n%s", err, response)
return diag.FromErr(fmt.Errorf("GetSecretMetadataWithContext failed %s\n%s", err, response))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetSecretMetadataWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

arbitrarySecretMetadata := arbitrarySecretMetadataIntf.(*secretsmanagerv2.ArbitrarySecretMetadata)

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))

if err = d.Set("created_by", arbitrarySecretMetadata.CreatedBy); err != nil {
return diag.FromErr(fmt.Errorf("Error setting created_by: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("region", region); err != nil {
return diag.FromErr(fmt.Errorf("Error setting region: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("created_at", DateTimeToRFC3339(arbitrarySecretMetadata.CreatedAt)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting created_at: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("crn", arbitrarySecretMetadata.Crn); err != nil {
return diag.FromErr(fmt.Errorf("Error setting crn: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if arbitrarySecretMetadata.CustomMetadata != nil {
Expand All @@ -164,55 +170,68 @@ func dataSourceIbmSmArbitrarySecretMetadataRead(context context.Context, d *sche
}

if err = d.Set("custom_metadata", flex.Flatten(convertedMap)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting custom_metadata: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
if err != nil {
return diag.FromErr(fmt.Errorf("Error setting custom_metadata %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
}

if err = d.Set("description", arbitrarySecretMetadata.Description); err != nil {
return diag.FromErr(fmt.Errorf("Error setting description: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("downloaded", arbitrarySecretMetadata.Downloaded); err != nil {
return diag.FromErr(fmt.Errorf("Error setting downloaded: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("locks_total", flex.IntValue(arbitrarySecretMetadata.LocksTotal)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting locks_total: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("name", arbitrarySecretMetadata.Name); err != nil {
return diag.FromErr(fmt.Errorf("Error setting name: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_group_id", arbitrarySecretMetadata.SecretGroupID); err != nil {
return diag.FromErr(fmt.Errorf("Error setting secret_group_id: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_type", arbitrarySecretMetadata.SecretType); err != nil {
return diag.FromErr(fmt.Errorf("Error setting secret_type: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state", flex.IntValue(arbitrarySecretMetadata.State)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting state: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state_description", arbitrarySecretMetadata.StateDescription); err != nil {
return diag.FromErr(fmt.Errorf("Error setting state_description: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("updated_at", DateTimeToRFC3339(arbitrarySecretMetadata.UpdatedAt)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting updated_at: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("versions_total", flex.IntValue(arbitrarySecretMetadata.VersionsTotal)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting versions_total: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("expiration_date", DateTimeToRFC3339(arbitrarySecretMetadata.ExpirationDate)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting expiration_date: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

return nil
Expand Down
19 changes: 13 additions & 6 deletions ibm/service/secretsmanager/data_source_ibm_sm_configurations.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ package secretsmanager
import (
"context"
"fmt"
"github.com/IBM-Cloud/terraform-provider-ibm/ibm/flex"
"log"
"time"

Expand Down Expand Up @@ -201,7 +202,8 @@ func DataSourceIbmSmConfigurations() *schema.Resource {
func dataSourceIbmSmConfigurationsRead(context context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secretsManagerClient, err := meta.(conns.ClientSession).SecretsManagerV2()
if err != nil {
return diag.FromErr(err)
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}

region := getRegion(secretsManagerClient, d)
Expand Down Expand Up @@ -231,13 +233,15 @@ func dataSourceIbmSmConfigurationsRead(context context.Context, d *schema.Resour
var pager *secretsmanagerv2.ConfigurationsPager
pager, err = secretsManagerClient.NewConfigurationsPager(listConfigurationsOptions)
if err != nil {
return diag.FromErr(err)
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}

allItems, err := pager.GetAll()
if err != nil {
log.Printf("[DEBUG] ConfigurationsPager.GetAll() failed %s", err)
return diag.FromErr(fmt.Errorf("ConfigurationsPager.GetAll() failed %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("ConfigurationsPager.GetAll() %s", err), fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(dataSourceIbmSmConfigurationsID(d))
Expand All @@ -246,16 +250,19 @@ func dataSourceIbmSmConfigurationsRead(context context.Context, d *schema.Resour
for _, modelItem := range allItems {
modelMap, err := dataSourceIbmSmConfigurationsConfigurationMetadataToMap(modelItem)
if err != nil {
return diag.FromErr(err)
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}
mapSlice = append(mapSlice, modelMap)
}

if err = d.Set("configurations", mapSlice); err != nil {
return diag.FromErr(fmt.Errorf("Error setting configurations %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting configurations"), fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}
if err = d.Set("total_count", len(mapSlice)); err != nil {
return diag.FromErr(fmt.Errorf("Error setting locks_total: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting total_count"), fmt.Sprintf("(Data) %s", ConfigurationsResourceName), "read")
return tfErr.GetDiag()
}

return nil
Expand Down
13 changes: 9 additions & 4 deletions ibm/service/secretsmanager/data_source_ibm_sm_en_registration.go
Original file line number Diff line number Diff line change
Expand Up @@ -6,6 +6,7 @@ package secretsmanager
import (
"context"
"fmt"
"github.com/IBM-Cloud/terraform-provider-ibm/ibm/flex"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"log"
Expand All @@ -31,7 +32,8 @@ func DataSourceIbmSmEnRegistration() *schema.Resource {
func dataSourceIbmSmEnRegistrationRead(context context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
secretsManagerClient, err := meta.(conns.ClientSession).SecretsManagerV2()
if err != nil {
return diag.FromErr(err)
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", EnRegistrationResourceName), "read")
return tfErr.GetDiag()
}

region := getRegion(secretsManagerClient, d)
Expand All @@ -43,16 +45,19 @@ func dataSourceIbmSmEnRegistrationRead(context context.Context, d *schema.Resour
notificationsRegistration, response, err := secretsManagerClient.GetNotificationsRegistrationWithContext(context, getNotificationsRegistrationOptions)
if err != nil {
log.Printf("[DEBUG] GetNotificationsRegistrationWithContext failed %s\n%s", err, response)
return diag.FromErr(fmt.Errorf("GetNotificationsRegistrationWithContext failed %s\n%s", err, response))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetNotificationsRegistrationWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s", EnRegistrationResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s", region, instanceId))

if err = d.Set("region", region); err != nil {
return diag.FromErr(fmt.Errorf("Error setting region: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s", EnRegistrationResourceName), "read")
return tfErr.GetDiag()
}
if err = d.Set("event_notifications_instance_crn", notificationsRegistration.EventNotificationsInstanceCrn); err != nil {
return diag.FromErr(fmt.Errorf("Error setting event_notifications_instance_crn: %s", err))
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting event_notifications_instance_crn"), fmt.Sprintf("(Data) %s", EnRegistrationResourceName), "read")
return tfErr.GetDiag()
}

return nil
Expand Down
Loading
Loading