-
Notifications
You must be signed in to change notification settings - Fork 9.4k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #15482 from terraform-providers/f-aws_s3_bucket_ow…
…nership_controls New Resource: aws_s3_bucket_ownership_controls
- v5.89.0
- v5.88.0
- v5.87.0
- v5.86.1
- v5.86.0
- v5.85.0
- v5.84.0
- v5.83.1
- v5.83.0
- v5.82.2
- v5.82.1
- v5.82.0
- v5.81.0
- v5.80.0
- v5.79.0
- v5.78.0
- v5.77.0
- v5.76.0
- v5.75.1
- v5.75.0
- v5.74.0
- v5.73.0
- v5.72.1
- v5.72.0
- v5.71.0
- v5.70.0
- v5.69.0
- v5.68.0
- v5.67.0
- v5.66.0
- v5.65.0
- v5.64.0
- v5.63.1
- v5.63.0
- v5.62.0
- v5.61.0
- v5.60.0
- v5.59.0
- v5.58.0
- v5.57.0
- v5.56.1
- v5.56.0
- v5.55.0
- v5.54.1
- v5.54.0
- v5.53.0
- v5.52.0
- v5.51.1
- v5.51.0
- v5.50.0
- v5.49.0
- v5.48.0
- v5.47.0
- v5.46.0
- v5.45.0
- v5.44.0
- v5.43.0
- v5.42.0
- v5.41.0
- v5.40.0
- v5.39.1
- v5.39.0
- v5.38.0
- v5.37.0
- v5.36.0
- v5.35.0
- v5.34.0
- v5.33.0
- v5.32.1
- v5.32.0
- v5.31.0
- v5.30.0
- v5.29.0
- v5.28.0
- v5.27.0
- v5.26.0
- v5.25.0
- v5.24.0
- v5.23.1
- v5.23.0
- v5.22.0
- v5.21.0
- v5.20.1
- v5.20.0
- v5.19.0
- v5.18.1
- v5.18.0
- v5.17.0
- v5.16.2
- v5.16.1
- v5.16.0
- v5.15.0
- v5.14.0
- v5.13.1
- v5.13.0
- v5.12.0
- v5.11.0
- v5.10.0
- v5.9.0
- v5.8.0
- v5.7.0
- v5.6.2
- v5.6.1
- v5.6.0
- v5.5.0
- v5.4.0
- v5.3.0
- v5.2.0
- v5.1.0
- v5.0.1
- v5.0.0
- v4.67.0
- v4.66.1
- v4.66.0
- v4.65.0
- v4.64.0
- v4.63.0
- v4.62.0
- v4.61.0
- v4.60.0
- v4.59.0
- v4.58.0
- v4.57.1
- v4.57.0
- v4.56.0
- v4.55.0
- v4.54.0
- v4.53.0
- v4.52.0
- v4.51.0
- v4.50.0
- v4.49.0
- v4.48.0
- v4.47.0
- v4.46.0
- v4.45.0
- v4.44.0
- v4.43.0
- v4.42.0
- v4.41.0
- v4.40.0
- v4.39.0
- v4.38.0
- v4.37.0
- v4.36.1
- v4.36.0
- v4.35.0
- v4.34.0
- v4.33.0
- v4.32.0
- v4.31.0
- v4.30.0
- v4.29.0
- v4.28.0
- v4.27.0
- v4.26.0
- v4.25.0
- v4.24.0
- v4.23.0
- v4.22.0
- v4.21.0
- v4.20.1
- v4.20.0
- v4.19.0
- v4.18.0
- v4.17.1
- v4.17.0
- v4.16.0
- v4.15.1
- v4.15.0
- v4.14.0
- v4.13.0
- v4.12.1
- v4.12.0
- v4.11.0
- v4.10.0
- v4.9.0
- v4.8.0
- v4.7.0
- v4.6.0
- v4.5.0
- v4.4.0
- v4.3.0
- v4.2.0
- v4.1.0
- v4.0.0
- v3.76.1
- v3.76.0
- v3.75.2
- v3.75.1
- v3.75.0
- v3.74.3
- v3.74.2
- v3.74.1
- v3.74.0
- v3.73.0
- v3.72.0
- v3.71.0
- v3.70.0
- v3.69.0
- v3.68.0
- v3.67.0
- v3.66.0
- v3.65.0
- v3.64.3
- v3.64.2
- v3.64.1
- v3.64.0
- v3.63.0
- v3.62.0
- v3.61.0
- v3.60.0
- v3.59.0
- v3.58.0
- v3.57.0
- v3.56.0
- v3.55.0
- v3.54.0
- v3.53.0
- v3.52.0
- v3.51.0
- v3.50.0
- v3.49.0
- v3.48.0
- v3.47.0
- v3.46.0
- v3.45.0
- v3.44.0
- v3.43.0
- v3.42.0
- v3.41.0
- v3.40.0
- v3.39.0
- v3.38.0
- v3.37.0
- v3.36.0
- v3.35.0
- v3.34.0
- v3.33.0
- v3.32.0
- v3.31.0
- v3.30.0
- v3.29.1
- v3.29.0
- v3.28.0
- v3.27.0
- v3.26.18
- v3.26.17
- v3.26.16
- v3.26.10
- v3.26.5
- v3.26.3
- v3.26.2
- v3.26.1
- v3.26.0
- v3.25.0
- v3.24.1
- v3.24.0
- v3.23.0
- v3.22.0
- v3.21.0
- v3.20.0
- v3.19.0
- v3.18.0
- v3.17.0
- v3.16.0
- v3.15.0
- v3.14.1
- v3.14.0
- v3.13.0
- v3.12.0
- v3.11.0
- v3.10.0
Showing
4 changed files
with
476 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,223 @@ | ||
package aws | ||
|
||
import ( | ||
"fmt" | ||
"log" | ||
|
||
"github.com/aws/aws-sdk-go/aws" | ||
"github.com/aws/aws-sdk-go/service/s3" | ||
"github.com/hashicorp/aws-sdk-go-base/tfawserr" | ||
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" | ||
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation" | ||
) | ||
|
||
func resourceAwsS3BucketOwnershipControls() *schema.Resource { | ||
return &schema.Resource{ | ||
Create: resourceAwsS3BucketOwnershipControlsCreate, | ||
Read: resourceAwsS3BucketOwnershipControlsRead, | ||
Update: resourceAwsS3BucketOwnershipControlsUpdate, | ||
Delete: resourceAwsS3BucketOwnershipControlsDelete, | ||
|
||
Importer: &schema.ResourceImporter{ | ||
State: schema.ImportStatePassthrough, | ||
}, | ||
|
||
Schema: map[string]*schema.Schema{ | ||
"bucket": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ForceNew: true, | ||
ValidateFunc: validation.NoZeroValues, | ||
}, | ||
"rule": { | ||
Type: schema.TypeList, | ||
Required: true, | ||
MinItems: 1, | ||
MaxItems: 1, | ||
Elem: &schema.Resource{ | ||
Schema: map[string]*schema.Schema{ | ||
"object_ownership": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ValidateFunc: validation.StringInSlice(s3.ObjectOwnership_Values(), false), | ||
}, | ||
}, | ||
}, | ||
}, | ||
}, | ||
} | ||
} | ||
|
||
func resourceAwsS3BucketOwnershipControlsCreate(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).s3conn | ||
|
||
bucket := d.Get("bucket").(string) | ||
|
||
input := &s3.PutBucketOwnershipControlsInput{ | ||
Bucket: aws.String(bucket), | ||
OwnershipControls: &s3.OwnershipControls{ | ||
Rules: expandS3OwnershipControlsRules(d.Get("rule").([]interface{})), | ||
}, | ||
} | ||
|
||
_, err := conn.PutBucketOwnershipControls(input) | ||
|
||
if err != nil { | ||
return fmt.Errorf("error creating S3 Bucket (%s) Ownership Controls: %w", bucket, err) | ||
} | ||
|
||
d.SetId(bucket) | ||
|
||
return resourceAwsS3BucketOwnershipControlsRead(d, meta) | ||
} | ||
|
||
func resourceAwsS3BucketOwnershipControlsRead(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).s3conn | ||
|
||
input := &s3.GetBucketOwnershipControlsInput{ | ||
Bucket: aws.String(d.Id()), | ||
} | ||
|
||
output, err := conn.GetBucketOwnershipControls(input) | ||
|
||
if !d.IsNewResource() && tfawserr.ErrCodeEquals(err, s3.ErrCodeNoSuchBucket) { | ||
log.Printf("[WARN] S3 Bucket Ownership Controls (%s) not found, removing from state", d.Id()) | ||
d.SetId("") | ||
return nil | ||
} | ||
|
||
if !d.IsNewResource() && tfawserr.ErrCodeEquals(err, "OwnershipControlsNotFoundError") { | ||
log.Printf("[WARN] S3 Bucket Ownership Controls (%s) not found, removing from state", d.Id()) | ||
d.SetId("") | ||
return nil | ||
} | ||
|
||
if err != nil { | ||
return fmt.Errorf("error reading S3 Bucket (%s) Ownership Controls: %w", d.Id(), err) | ||
} | ||
|
||
if output == nil { | ||
return fmt.Errorf("error reading S3 Bucket (%s) Ownership Controls: empty response", d.Id()) | ||
} | ||
|
||
d.Set("bucket", d.Id()) | ||
|
||
if output.OwnershipControls == nil { | ||
d.Set("rule", nil) | ||
} else { | ||
if err := d.Set("rule", flattenS3OwnershipControlsRules(output.OwnershipControls.Rules)); err != nil { | ||
return fmt.Errorf("error setting rule: %w", err) | ||
} | ||
} | ||
|
||
return nil | ||
} | ||
|
||
func resourceAwsS3BucketOwnershipControlsUpdate(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).s3conn | ||
|
||
input := &s3.PutBucketOwnershipControlsInput{ | ||
Bucket: aws.String(d.Id()), | ||
OwnershipControls: &s3.OwnershipControls{ | ||
Rules: expandS3OwnershipControlsRules(d.Get("rule").([]interface{})), | ||
}, | ||
} | ||
|
||
_, err := conn.PutBucketOwnershipControls(input) | ||
|
||
if err != nil { | ||
return fmt.Errorf("error updating S3 Bucket (%s) Ownership Controls: %w", d.Id(), err) | ||
} | ||
|
||
return resourceAwsS3BucketOwnershipControlsRead(d, meta) | ||
} | ||
|
||
func resourceAwsS3BucketOwnershipControlsDelete(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).s3conn | ||
|
||
input := &s3.DeleteBucketOwnershipControlsInput{ | ||
Bucket: aws.String(d.Id()), | ||
} | ||
|
||
_, err := conn.DeleteBucketOwnershipControls(input) | ||
|
||
if tfawserr.ErrCodeEquals(err, s3.ErrCodeNoSuchBucket) { | ||
return nil | ||
} | ||
|
||
if tfawserr.ErrCodeEquals(err, "OwnershipControlsNotFoundError") { | ||
return nil | ||
} | ||
|
||
if err != nil { | ||
return fmt.Errorf("error deleting S3 Bucket (%s) Ownership Controls: %w", d.Id(), err) | ||
} | ||
|
||
return nil | ||
} | ||
|
||
func expandS3OwnershipControlsRules(tfList []interface{}) []*s3.OwnershipControlsRule { | ||
if len(tfList) == 0 || tfList[0] == nil { | ||
return nil | ||
} | ||
|
||
var apiObjects []*s3.OwnershipControlsRule | ||
|
||
for _, tfMapRaw := range tfList { | ||
tfMap, ok := tfMapRaw.(map[string]interface{}) | ||
|
||
if !ok { | ||
continue | ||
} | ||
|
||
apiObjects = append(apiObjects, expandS3OwnershipControlsRule(tfMap)) | ||
} | ||
|
||
return apiObjects | ||
} | ||
|
||
func expandS3OwnershipControlsRule(tfMap map[string]interface{}) *s3.OwnershipControlsRule { | ||
if tfMap == nil { | ||
return nil | ||
} | ||
|
||
apiObject := &s3.OwnershipControlsRule{} | ||
|
||
if v, ok := tfMap["object_ownership"].(string); ok && v != "" { | ||
apiObject.ObjectOwnership = aws.String(v) | ||
} | ||
|
||
return apiObject | ||
} | ||
|
||
func flattenS3OwnershipControlsRules(apiObjects []*s3.OwnershipControlsRule) []interface{} { | ||
if len(apiObjects) == 0 { | ||
return nil | ||
} | ||
|
||
var tfList []interface{} | ||
|
||
for _, apiObject := range apiObjects { | ||
if apiObject == nil { | ||
continue | ||
} | ||
|
||
tfList = append(tfList, flattenS3OwnershipControlsRule(apiObject)) | ||
} | ||
|
||
return tfList | ||
} | ||
|
||
func flattenS3OwnershipControlsRule(apiObject *s3.OwnershipControlsRule) map[string]interface{} { | ||
if apiObject == nil { | ||
return nil | ||
} | ||
|
||
tfMap := map[string]interface{}{} | ||
|
||
if v := apiObject.ObjectOwnership; v != nil { | ||
tfMap["object_ownership"] = aws.StringValue(v) | ||
} | ||
|
||
return tfMap | ||
} |
Oops, something went wrong.