| // Copyright (c) HashiCorp, Inc. |
| // SPDX-License-Identifier: MPL-2.0 |
| package secretmanager |
| |
| import ( |
| "fmt" |
| "strings" |
| |
| "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" |
| "github.com/hashicorp/terraform-provider-google-beta/google-beta/tpgresource" |
| transport_tpg "github.com/hashicorp/terraform-provider-google-beta/google-beta/transport" |
| ) |
| |
| func DataSourceSecretManagerSecrets() *schema.Resource { |
| |
| dsSchema := tpgresource.DatasourceSchemaFromResourceSchema(ResourceSecretManagerSecret().Schema) |
| |
| return &schema.Resource{ |
| Read: dataSourceSecretManagerSecretsRead, |
| Schema: map[string]*schema.Schema{ |
| "project": { |
| Type: schema.TypeString, |
| Optional: true, |
| Computed: true, |
| }, |
| "filter": { |
| Type: schema.TypeString, |
| Description: `Filter string, adhering to the rules in List-operation filtering (https://cloud.google.com/secret-manager/docs/filtering). |
| List only secrets matching the filter. If filter is empty, all secrets are listed.`, |
| Optional: true, |
| }, |
| "secrets": { |
| Type: schema.TypeList, |
| Computed: true, |
| Elem: &schema.Resource{ |
| Schema: dsSchema, |
| }, |
| }, |
| }, |
| } |
| } |
| |
| func dataSourceSecretManagerSecretsRead(d *schema.ResourceData, meta interface{}) error { |
| config := meta.(*transport_tpg.Config) |
| userAgent, err := tpgresource.GenerateUserAgentString(d, config.UserAgent) |
| if err != nil { |
| return err |
| } |
| |
| url, err := tpgresource.ReplaceVars(d, config, "{{SecretManagerBasePath}}projects/{{project}}/secrets") |
| if err != nil { |
| return err |
| } |
| |
| filter, has_filter := d.GetOk("filter") |
| |
| if has_filter { |
| url, err = transport_tpg.AddQueryParams(url, map[string]string{"filter": filter.(string)}) |
| if err != nil { |
| return err |
| } |
| } |
| |
| billingProject := "" |
| |
| project, err := tpgresource.GetProject(d, config) |
| if err != nil { |
| return fmt.Errorf("Error fetching project for Secret: %s", err) |
| } |
| billingProject = project |
| |
| // err == nil indicates that the billing_project value was found |
| if bp, err := tpgresource.GetBillingProject(d, config); err == nil { |
| billingProject = bp |
| } |
| |
| // To handle the pagination locally |
| allSecrets := make([]interface{}, 0) |
| token := "" |
| for paginate := true; paginate; { |
| if token != "" { |
| url, err = transport_tpg.AddQueryParams(url, map[string]string{"pageToken": token}) |
| if err != nil { |
| return err |
| } |
| } |
| secrets, err := transport_tpg.SendRequest(transport_tpg.SendRequestOptions{ |
| Config: config, |
| Method: "GET", |
| Project: billingProject, |
| RawURL: url, |
| UserAgent: userAgent, |
| }) |
| if err != nil { |
| return transport_tpg.HandleNotFoundError(err, d, fmt.Sprintf("SecretManagerSecrets %q", d.Id())) |
| } |
| secretsInterface := secrets["secrets"] |
| if secretsInterface == nil { |
| break |
| } |
| allSecrets = append(allSecrets, secretsInterface.([]interface{})...) |
| tokenInterface := secrets["nextPageToken"] |
| if tokenInterface == nil { |
| paginate = false |
| } else { |
| paginate = true |
| token = tokenInterface.(string) |
| } |
| } |
| |
| if err := d.Set("secrets", flattenSecretManagerSecretsSecrets(allSecrets, d, config)); err != nil { |
| return fmt.Errorf("error setting secrets: %s", err) |
| } |
| |
| if err := d.Set("project", project); err != nil { |
| return fmt.Errorf("error setting project: %s", err) |
| } |
| |
| if err := d.Set("filter", filter); err != nil { |
| return fmt.Errorf("error setting filter: %s", err) |
| } |
| |
| // Store the ID now |
| id, err := tpgresource.ReplaceVars(d, config, "projects/{{project}}/secrets") |
| if err != nil { |
| return fmt.Errorf("Error constructing id: %s", err) |
| } |
| if has_filter { |
| id += "/filter=" + filter.(string) |
| } |
| d.SetId(id) |
| |
| return nil |
| } |
| |
| func flattenSecretManagerSecretsSecrets(v interface{}, d *schema.ResourceData, config *transport_tpg.Config) interface{} { |
| if v == nil { |
| return v |
| } |
| l := v.([]interface{}) |
| transformed := make([]interface{}, 0, len(l)) |
| for _, raw := range l { |
| original := raw.(map[string]interface{}) |
| if len(original) < 1 { |
| // Do not include empty json objects coming back from the api |
| continue |
| } |
| transformed = append(transformed, map[string]interface{}{ |
| "replication": flattenSecretManagerSecretReplication(original["replication"], d, config), |
| "annotations": flattenSecretManagerSecretAnnotations(original["annotations"], d, config), |
| "expire_time": flattenSecretManagerSecretExpireTime(original["expireTime"], d, config), |
| "labels": flattenSecretManagerSecretLabels(original["labels"], d, config), |
| "rotation": flattenSecretManagerSecretRotation(original["rotation"], d, config), |
| "topics": flattenSecretManagerSecretTopics(original["topics"], d, config), |
| "version_aliases": flattenSecretManagerSecretVersionAliases(original["versionAliases"], d, config), |
| "create_time": flattenSecretManagerSecretCreateTime(original["createTime"], d, config), |
| "name": flattenSecretManagerSecretName(original["name"], d, config), |
| "project": getDataFromName(original["name"], 1), |
| "secret_id": getDataFromName(original["name"], 3), |
| }) |
| } |
| return transformed |
| } |
| |
| func getDataFromName(v interface{}, part int) string { |
| name := v.(string) |
| split := strings.Split(name, "/") |
| return split[part] |
| } |