Skip to content

Commit

Permalink
merge in alks-error branch
Browse files Browse the repository at this point in the history
  • Loading branch information
elliottzack429 committed Oct 10, 2022
2 parents 52b6d97 + 895d5d0 commit df8a633
Show file tree
Hide file tree
Showing 13 changed files with 397 additions and 236 deletions.
10 changes: 5 additions & 5 deletions docs/guides/local_installation.md
Original file line number Diff line number Diff line change
Expand Up @@ -47,11 +47,11 @@ mkdir -p ~/.terraform.d/plugins &&
**One-liner download for macOS / Linux:**

```sh
mkdir -p ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.0/darwin_amd64 &&
curl -Ls https://api.github.com/repos/Cox-Automotive/terraform-provider-alks/releases | jq -r --arg release "v2.5.1" --arg arch "$(uname -s | tr A-Z a-z)" '.[] | select(.tag_name | contains($release)) | .assets[]| select(.browser_download_url | contains($arch)) | select(.browser_download_url | contains("amd64")) | .browser_download_url' |
xargs -n 1 curl -Lo ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.0/darwin_amd64/terraform-provider-alks.zip &&
pushd ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.0/darwin_amd64 &&
unzip ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.0/darwin_amd64/terraform-provider-alks.zip -d terraform-provider-alks-tmp &&
mkdir -p ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.1/darwin_amd64 &&
curl -Ls https://api.github.com/repos/Cox-Automotive/terraform-provider-alks/releases | jq -r --arg release "v2.6.1" --arg arch "$(uname -s | tr A-Z a-z)" '.[] | select(.tag_name | contains($release)) | .assets[]| select(.browser_download_url | contains($arch)) | select(.browser_download_url | contains("amd64")) | .browser_download_url' |
xargs -n 1 curl -Lo ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.1/darwin_amd64/terraform-provider-alks.zip &&
pushd ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.1/darwin_amd64 &&
unzip ~/.terraform.d/plugins/Cox-Automotive/engineering-enablement/alks/2.6.1/darwin_amd64/terraform-provider-alks.zip -d terraform-provider-alks-tmp &&
mv terraform-provider-alks-tmp/terraform-provider-alks* . &&
chmod +x terraform-provider-alks* &&
rm -rf terraform-provider-alks-tmp &&
Expand Down
12 changes: 6 additions & 6 deletions docs/index.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ Use the navigation to the left to read about the available resources.
# Configure the ALKS Terraform Provider
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
}
# Create an ALKS IAM role
Expand All @@ -35,7 +35,7 @@ Static credentials can be provided via an `access_key`, `secret_key` and `token`
```hcl
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
access_key = "accesskey"
secret_key = "secretkey"
token = "sessiontoken"
Expand All @@ -49,7 +49,7 @@ Terraform file:
```hcl
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
}
```

Expand All @@ -68,7 +68,7 @@ You can use an AWS credentials file to specify your credentials. The default loc
```hcl
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
shared_credentials_file = "/Users/my_user/.aws/credentials"
profile = "foo"
}
Expand All @@ -86,7 +86,7 @@ Your ALKS provider block can look just like this:
```hcl
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
}
```

Expand All @@ -95,7 +95,7 @@ Since Machine Identities work with Instance Profile Metadata directly, it can be
```hcl
provider "alks" {
url = "https://alks.foo.com/rest"
version = ">= 2.2.0"
version = ">= 2.6.0"
assume_role {
role_arn = "arn:aws:iam::112233445566:role/acct-managed/JenkinsPRODAccountTrust"
}
Expand Down
3 changes: 1 addition & 2 deletions go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@ module github.com/Cox-Automotive/terraform-provider-alks
go 1.18

require (
github.com/Cox-Automotive/alks-go v0.0.0-20221004204541-a25fb5c4f655
github.com/Cox-Automotive/alks-go v0.0.0-20221010204605-136b6e9b6530
github.com/aws/aws-sdk-go v1.31.15
github.com/hashicorp/terraform-plugin-sdk/v2 v2.21.0
github.com/mitchellh/go-homedir v1.1.0
Expand Down Expand Up @@ -58,4 +58,3 @@ require (
google.golang.org/protobuf v1.28.1 // indirect
)

replace github.com/Cox-Automotive/alks-go => /Users/Zachary.Elliott/code/alks-go
2 changes: 2 additions & 0 deletions go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,8 @@ github.com/Cox-Automotive/alks-go v0.0.0-20221003153830-68567ef62d72 h1:tubP3IYG
github.com/Cox-Automotive/alks-go v0.0.0-20221003153830-68567ef62d72/go.mod h1:jJNgXthl59Vt2tJHSC3WZ0vlopV9xqdclfQuLgwHjOw=
github.com/Cox-Automotive/alks-go v0.0.0-20221004204541-a25fb5c4f655 h1:akQkFItS/++rMakX7rbK70ouYTG0Q6vxUqxvfzBZ9Wg=
github.com/Cox-Automotive/alks-go v0.0.0-20221004204541-a25fb5c4f655/go.mod h1:jJNgXthl59Vt2tJHSC3WZ0vlopV9xqdclfQuLgwHjOw=
github.com/Cox-Automotive/alks-go v0.0.0-20221010204605-136b6e9b6530 h1:8j3NYoLnFy2PGw+UX47C8jC2j3CCkFeXqlaMfKu9Bh8=
github.com/Cox-Automotive/alks-go v0.0.0-20221010204605-136b6e9b6530/go.mod h1:jJNgXthl59Vt2tJHSC3WZ0vlopV9xqdclfQuLgwHjOw=
github.com/Microsoft/go-winio v0.4.14/go.mod h1:qXqCSQ3Xa7+6tgxaGTIe4Kpcdsi+P8jBhyzoq1bpyYA=
github.com/Microsoft/go-winio v0.4.16 h1:FtSW/jqD+l4ba5iPBj9CODVtgfYAD8w2wS923g/cFDk=
github.com/Microsoft/go-winio v0.4.16/go.mod h1:XB6nPKklQyQ7GC9LdcBEcBl8PF76WugXOPRXwdLnMv0=
Expand Down
27 changes: 12 additions & 15 deletions resource_alks_iamrole.go
Original file line number Diff line number Diff line change
Expand Up @@ -153,7 +153,7 @@ func resourceAlksIamRoleCreate(ctx context.Context, d *schema.ResourceData, meta

resp, err := client.CreateIamRole(options)
if err != nil {
return diag.FromErr(err)
return diag.FromErr(err.Err)
}

d.SetId(resp.RoleName)
Expand All @@ -174,7 +174,7 @@ func resourceAlksIamRoleDelete(ctx context.Context, d *schema.ResourceData, meta
}

if err := client.DeleteIamRole(d.Id()); err != nil {
return diag.FromErr(err)
return diag.FromErr(err.Err)
}

return nil
Expand All @@ -196,16 +196,13 @@ func resourceAlksIamRoleRead(ctx context.Context, d *schema.ResourceData, meta i
foundRole, err := client.GetIamRole(d.Id())

if err != nil {
// If 404 Role not found error, an error and a role with Exists field set to false will come back from alks-go
// We will log ther error and set id to "" and return nil, letting terraform decide how to handle role not found.
if foundRole != nil {
if foundRole.Exists != true {
log.Printf("[Error] %s", err)
d.SetId("")
return nil
}
//If error is 404, RoleNotFound, we log it and let terraform decide how to handle it.
//All other errors cause a failure
if err.StatusCode == 404 {
log.Printf("[Error] %s", err.Err)
d.SetId("")
return nil
}
d.SetId("")
return diag.FromErr(err)
}

Expand Down Expand Up @@ -286,13 +283,13 @@ func updateAlksAccess(d *schema.ResourceData, meta interface{}) error {
if alksAccess {
_, err := client.AddRoleMachineIdentity(roleArn)
if err != nil {
return err
return err.Err
}
} else {
// delete the machine identity
_, err := client.DeleteRoleMachineIdentity(roleArn)
if err != nil {
return err
return err.Err
}
}
return nil
Expand All @@ -311,7 +308,7 @@ func updateIamRoleTags(d *schema.ResourceData, meta interface{}) error {
foundRole, err := client.GetIamRole(d.Id())

if err != nil {
return err
return err.Err
}

existingTags := tagSliceToMap(foundRole.Tags)
Expand All @@ -327,7 +324,7 @@ func updateIamRoleTags(d *schema.ResourceData, meta interface{}) error {
}

if _, err := client.UpdateIamRole(&options); err != nil {
return err
return err.Err
}
return nil
}
Expand Down
4 changes: 2 additions & 2 deletions resource_alks_iamtrustrole.go
Original file line number Diff line number Diff line change
Expand Up @@ -101,7 +101,7 @@ func resourceAlksIamTrustRoleCreate(ctx context.Context, d *schema.ResourceData,

var resp *alks.IamRoleResponse
err := resource.RetryContext(ctx, 2*time.Minute, func() *resource.RetryError {
var err error
var err *alks.AlksError

options := &alks.CreateIamRoleOptions{
RoleName: &roleName,
Expand All @@ -114,7 +114,7 @@ func resourceAlksIamTrustRoleCreate(ctx context.Context, d *schema.ResourceData,
resp, err = client.CreateIamTrustRole(options)
if err != nil {
if strings.Contains(err.Error(), "Role already exists") || strings.Contains(err.Error(), "Instance profile exists") {
return resource.NonRetryableError(err)
return resource.NonRetryableError(err.Err)
}

// Amazon IAM utilizes an eventual consistency model:
Expand Down
28 changes: 28 additions & 0 deletions vendor/github.com/Cox-Automotive/alks-go/alks_error.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion vendor/github.com/Cox-Automotive/alks-go/api.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

8 changes: 4 additions & 4 deletions vendor/github.com/Cox-Automotive/alks-go/iam_ltk.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Loading

0 comments on commit df8a633

Please sign in to comment.