-
Notifications
You must be signed in to change notification settings - Fork 9.2k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge pull request #9228 from ewbankkit/issue-7004.aws_api_gateway_v2…
…_authorizer New resource: aws_apigatewayv2_authorizer
- Loading branch information
Showing
5 changed files
with
701 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,234 @@ | ||
package aws | ||
|
||
import ( | ||
"fmt" | ||
"log" | ||
"strings" | ||
|
||
"github.com/aws/aws-sdk-go/aws" | ||
"github.com/aws/aws-sdk-go/service/apigatewayv2" | ||
"github.com/hashicorp/terraform-plugin-sdk/helper/schema" | ||
"github.com/hashicorp/terraform-plugin-sdk/helper/validation" | ||
) | ||
|
||
func resourceAwsApiGatewayV2Authorizer() *schema.Resource { | ||
return &schema.Resource{ | ||
Create: resourceAwsApiGatewayV2AuthorizerCreate, | ||
Read: resourceAwsApiGatewayV2AuthorizerRead, | ||
Update: resourceAwsApiGatewayV2AuthorizerUpdate, | ||
Delete: resourceAwsApiGatewayV2AuthorizerDelete, | ||
Importer: &schema.ResourceImporter{ | ||
State: resourceAwsApiGatewayV2AuthorizerImport, | ||
}, | ||
|
||
Schema: map[string]*schema.Schema{ | ||
"api_id": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ForceNew: true, | ||
}, | ||
"authorizer_credentials_arn": { | ||
Type: schema.TypeString, | ||
Optional: true, | ||
ValidateFunc: validateArn, | ||
}, | ||
"authorizer_type": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ValidateFunc: validation.StringInSlice([]string{ | ||
apigatewayv2.AuthorizerTypeJwt, | ||
apigatewayv2.AuthorizerTypeRequest, | ||
}, false), | ||
}, | ||
"authorizer_uri": { | ||
Type: schema.TypeString, | ||
Optional: true, | ||
ValidateFunc: validation.StringLenBetween(1, 2048), | ||
}, | ||
"identity_sources": { | ||
Type: schema.TypeSet, | ||
Required: true, | ||
MinItems: 1, | ||
Elem: &schema.Schema{Type: schema.TypeString}, | ||
}, | ||
"jwt_configuration": { | ||
Type: schema.TypeList, | ||
Optional: true, | ||
MinItems: 0, | ||
MaxItems: 1, | ||
Elem: &schema.Resource{ | ||
Schema: map[string]*schema.Schema{ | ||
"audience": { | ||
Type: schema.TypeSet, | ||
Optional: true, | ||
Elem: &schema.Schema{Type: schema.TypeString}, | ||
}, | ||
"issuer": { | ||
Type: schema.TypeString, | ||
Optional: true, | ||
}, | ||
}, | ||
}, | ||
}, | ||
"name": { | ||
Type: schema.TypeString, | ||
Required: true, | ||
ValidateFunc: validation.StringLenBetween(1, 128), | ||
}, | ||
}, | ||
} | ||
} | ||
|
||
func resourceAwsApiGatewayV2AuthorizerCreate(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).apigatewayv2conn | ||
|
||
req := &apigatewayv2.CreateAuthorizerInput{ | ||
ApiId: aws.String(d.Get("api_id").(string)), | ||
AuthorizerType: aws.String(d.Get("authorizer_type").(string)), | ||
IdentitySource: expandStringSet(d.Get("identity_sources").(*schema.Set)), | ||
Name: aws.String(d.Get("name").(string)), | ||
} | ||
if v, ok := d.GetOk("authorizer_credentials_arn"); ok { | ||
req.AuthorizerCredentialsArn = aws.String(v.(string)) | ||
} | ||
if v, ok := d.GetOk("authorizer_uri"); ok { | ||
req.AuthorizerUri = aws.String(v.(string)) | ||
} | ||
if v, ok := d.GetOk("jwt_configuration"); ok { | ||
req.JwtConfiguration = expandApiGateway2JwtConfiguration(v.([]interface{})) | ||
} | ||
|
||
log.Printf("[DEBUG] Creating API Gateway v2 authorizer: %s", req) | ||
resp, err := conn.CreateAuthorizer(req) | ||
if err != nil { | ||
return fmt.Errorf("error creating API Gateway v2 authorizer: %s", err) | ||
} | ||
|
||
d.SetId(aws.StringValue(resp.AuthorizerId)) | ||
|
||
return resourceAwsApiGatewayV2AuthorizerRead(d, meta) | ||
} | ||
|
||
func resourceAwsApiGatewayV2AuthorizerRead(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).apigatewayv2conn | ||
|
||
resp, err := conn.GetAuthorizer(&apigatewayv2.GetAuthorizerInput{ | ||
ApiId: aws.String(d.Get("api_id").(string)), | ||
AuthorizerId: aws.String(d.Id()), | ||
}) | ||
if isAWSErr(err, apigatewayv2.ErrCodeNotFoundException, "") { | ||
log.Printf("[WARN] API Gateway v2 authorizer (%s) not found, removing from state", d.Id()) | ||
d.SetId("") | ||
return nil | ||
} | ||
if err != nil { | ||
return fmt.Errorf("error reading API Gateway v2 authorizer: %s", err) | ||
} | ||
|
||
d.Set("authorizer_credentials_arn", resp.AuthorizerCredentialsArn) | ||
d.Set("authorizer_type", resp.AuthorizerType) | ||
d.Set("authorizer_uri", resp.AuthorizerUri) | ||
if err := d.Set("identity_sources", flattenStringSet(resp.IdentitySource)); err != nil { | ||
return fmt.Errorf("error setting identity_sources: %s", err) | ||
} | ||
if err := d.Set("jwt_configuration", flattenApiGateway2JwtConfiguration(resp.JwtConfiguration)); err != nil { | ||
return fmt.Errorf("error setting jwt_configuration: %s", err) | ||
} | ||
d.Set("name", resp.Name) | ||
|
||
return nil | ||
} | ||
|
||
func resourceAwsApiGatewayV2AuthorizerUpdate(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).apigatewayv2conn | ||
|
||
req := &apigatewayv2.UpdateAuthorizerInput{ | ||
ApiId: aws.String(d.Get("api_id").(string)), | ||
AuthorizerId: aws.String(d.Id()), | ||
} | ||
if d.HasChange("authorizer_credentials_arn") { | ||
req.AuthorizerCredentialsArn = aws.String(d.Get("authorizer_credentials_arn").(string)) | ||
} | ||
if d.HasChange("authorizer_type") { | ||
req.AuthorizerType = aws.String(d.Get("authorizer_type").(string)) | ||
} | ||
if d.HasChange("authorizer_uri") { | ||
req.AuthorizerUri = aws.String(d.Get("authorizer_uri").(string)) | ||
} | ||
if d.HasChange("identity_sources") { | ||
req.IdentitySource = expandStringSet(d.Get("identity_sources").(*schema.Set)) | ||
} | ||
if d.HasChange("name") { | ||
req.Name = aws.String(d.Get("name").(string)) | ||
} | ||
if d.HasChange("jwt_configuration") { | ||
req.JwtConfiguration = expandApiGateway2JwtConfiguration(d.Get("jwt_configuration").([]interface{})) | ||
} | ||
|
||
log.Printf("[DEBUG] Updating API Gateway v2 authorizer: %s", req) | ||
_, err := conn.UpdateAuthorizer(req) | ||
if err != nil { | ||
return fmt.Errorf("error updating API Gateway v2 authorizer: %s", err) | ||
} | ||
|
||
return resourceAwsApiGatewayV2AuthorizerRead(d, meta) | ||
} | ||
|
||
func resourceAwsApiGatewayV2AuthorizerDelete(d *schema.ResourceData, meta interface{}) error { | ||
conn := meta.(*AWSClient).apigatewayv2conn | ||
|
||
log.Printf("[DEBUG] Deleting API Gateway v2 authorizer (%s)", d.Id()) | ||
_, err := conn.DeleteAuthorizer(&apigatewayv2.DeleteAuthorizerInput{ | ||
ApiId: aws.String(d.Get("api_id").(string)), | ||
AuthorizerId: aws.String(d.Id()), | ||
}) | ||
if isAWSErr(err, apigatewayv2.ErrCodeNotFoundException, "") { | ||
return nil | ||
} | ||
if err != nil { | ||
return fmt.Errorf("error deleting API Gateway v2 authorizer: %s", err) | ||
} | ||
|
||
return nil | ||
} | ||
|
||
func resourceAwsApiGatewayV2AuthorizerImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) { | ||
parts := strings.Split(d.Id(), "/") | ||
if len(parts) != 2 { | ||
return []*schema.ResourceData{}, fmt.Errorf("Wrong format of resource: %s. Please follow 'api-id/authorizer-id'", d.Id()) | ||
} | ||
|
||
d.SetId(parts[1]) | ||
d.Set("api_id", parts[0]) | ||
|
||
return []*schema.ResourceData{d}, nil | ||
} | ||
|
||
func expandApiGateway2JwtConfiguration(vConfiguration []interface{}) *apigatewayv2.JWTConfiguration { | ||
configuration := &apigatewayv2.JWTConfiguration{} | ||
|
||
if len(vConfiguration) == 0 || vConfiguration[0] == nil { | ||
return configuration | ||
} | ||
mConfiguration := vConfiguration[0].(map[string]interface{}) | ||
|
||
if vAudience, ok := mConfiguration["audience"].(*schema.Set); ok && vAudience.Len() > 0 { | ||
configuration.Audience = expandStringSet(vAudience) | ||
} | ||
if vIssuer, ok := mConfiguration["issuer"].(string); ok && vIssuer != "" { | ||
configuration.Issuer = aws.String(vIssuer) | ||
} | ||
|
||
return configuration | ||
} | ||
|
||
func flattenApiGateway2JwtConfiguration(configuration *apigatewayv2.JWTConfiguration) []interface{} { | ||
if configuration == nil { | ||
return []interface{}{} | ||
} | ||
|
||
return []interface{}{map[string]interface{}{ | ||
"audience": flattenStringSet(configuration.Audience), | ||
"issuer": aws.StringValue(configuration.Issuer), | ||
}} | ||
} |
Oops, something went wrong.