Skip to content

Commit 74546df

Browse files
authored
Fix missing secret_id property (IBM-Cloud#6400)
1 parent f8b0f72 commit 74546df

19 files changed

+69
-7
lines changed

ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -195,6 +195,11 @@ func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.Resou
195195
return tfErr.GetDiag()
196196
}
197197

198+
if err = d.Set("secret_id", arbitrarySecret.ID); err != nil {
199+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_id"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
200+
return tfErr.GetDiag()
201+
}
202+
198203
if err = d.Set("secret_group_id", arbitrarySecret.SecretGroupID); err != nil {
199204
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
200205
return tfErr.GetDiag()

ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_test.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -31,6 +31,7 @@ func TestAccIbmSmArbitrarySecretDataSourceBasic(t *testing.T) {
3131
resource.TestCheckResourceAttrSet("data.ibm_sm_arbitrary_secret.sm_arbitrary_secret", "versions_total"),
3232
resource.TestCheckResourceAttrSet("data.ibm_sm_arbitrary_secret.sm_arbitrary_secret_by_name", "name"),
3333
resource.TestCheckResourceAttrSet("data.ibm_sm_arbitrary_secret.sm_arbitrary_secret_by_name", "secret_group_name"),
34+
resource.TestCheckResourceAttrSet("data.ibm_sm_arbitrary_secret.sm_arbitrary_secret_by_name", "secret_id"),
3435
),
3536
},
3637
},

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_secret.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -301,6 +301,11 @@ func dataSourceIbmSmCustomCredentialsSecretRead(context context.Context, d *sche
301301
return tfErr.GetDiag()
302302
}
303303

304+
if err = d.Set("secret_id", customCredentialsSecret.ID); err != nil {
305+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_id"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
306+
return tfErr.GetDiag()
307+
}
308+
304309
if err = d.Set("secret_group_id", customCredentialsSecret.SecretGroupID); err != nil {
305310
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
306311
return tfErr.GetDiag()

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_secret_metadata_test.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ import (
1414
)
1515

1616
func TestAccIbmSmCustomCredentialsSecretMetadataDataSource(t *testing.T) {
17-
dataSourceName := "ibm_sm_custom_credentials_secret.sm_custom_credentials_secret"
17+
dataSourceName := "data.ibm_sm_custom_credentials_secret_metadata.sm_custom_credentials_secret"
1818
resource.Test(t, resource.TestCase{
1919
PreCheck: func() { acc.TestAccPreCheck(t) },
2020
Providers: acc.TestAccProviders,
@@ -44,7 +44,7 @@ func TestAccIbmSmCustomCredentialsSecretMetadataDataSource(t *testing.T) {
4444
func customCredentialsSecretMetadataDataSourceConfig() string {
4545
return customCredentialsSecretConfigAllArgs() +
4646
fmt.Sprintf(`
47-
data "ibm_sm_custom_credentials_secret_metadata" "sm_custom_credenbtials_secret" {
47+
data "ibm_sm_custom_credentials_secret_metadata" "sm_custom_credentials_secret" {
4848
instance_id = "%s"
4949
region = "%s"
5050
secret_id = ibm_sm_custom_credentials_secret.sm_custom_credentials_secret.secret_id

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_secret_test.go

Lines changed: 14 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -5,16 +5,15 @@ package secretsmanager_test
55

66
import (
77
"fmt"
8+
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
89
"strconv"
910
"testing"
1011

11-
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
12-
1312
acc "github.com/IBM-Cloud/terraform-provider-ibm/ibm/acctest"
1413
)
1514

1615
func TestAccIbmSmCustomCredentialsSecretDataSource(t *testing.T) {
17-
dataSourceName := "ibm_sm_custom_credentials_secret.sm_custom_credentials_secret"
16+
dataSourceName := "data.ibm_sm_custom_credentials_secret.sm_custom_credentials_secret"
1817
expectedStrCredential := customCredentialsStrParam + "_output"
1918
expectedBoolCredential := !customCredentialsBoolParam
2019
expectedIntCredential := customCredentialsIntParam + 1
@@ -41,6 +40,9 @@ func TestAccIbmSmCustomCredentialsSecretDataSource(t *testing.T) {
4140
resource.TestCheckResourceAttr(dataSourceName, "credentials_content.0.string_values.str_credential", expectedStrCredential),
4241
resource.TestCheckResourceAttr(dataSourceName, "credentials_content.0.integer_values.int_credential", strconv.Itoa(expectedIntCredential)),
4342
resource.TestCheckResourceAttr(dataSourceName, "credentials_content.0.boolean_values.bool_credential", strconv.FormatBool(expectedBoolCredential)),
43+
resource.TestCheckResourceAttrSet("data.ibm_sm_custom_credentials_secret.by_name", "name"),
44+
resource.TestCheckResourceAttrSet("data.ibm_sm_custom_credentials_secret.by_name", "secret_group_name"),
45+
resource.TestCheckResourceAttrSet("data.ibm_sm_custom_credentials_secret.by_name", "secret_id"),
4446
),
4547
},
4648
},
@@ -50,10 +52,17 @@ func TestAccIbmSmCustomCredentialsSecretDataSource(t *testing.T) {
5052
func customCredentialsSecretDataSourceConfig() string {
5153
return customCredentialsSecretConfigAllArgs() +
5254
fmt.Sprintf(`
53-
data "ibm_sm_custom_credentials_secret" "sm_custom_credenbtials_secret" {
55+
data "ibm_sm_custom_credentials_secret" "sm_custom_credentials_secret" {
5456
instance_id = "%s"
5557
region = "%s"
5658
secret_id = ibm_sm_custom_credentials_secret.sm_custom_credentials_secret.secret_id
5759
}
58-
`, acc.SecretsManagerInstanceID, acc.SecretsManagerInstanceRegion)
60+
61+
data "ibm_sm_custom_credentials_secret" "by_name" {
62+
instance_id = "%s"
63+
region = "%s"
64+
name = ibm_sm_custom_credentials_secret.sm_custom_credentials_secret.name
65+
secret_group_name = "default"
66+
}
67+
`, acc.SecretsManagerInstanceID, acc.SecretsManagerInstanceRegion, acc.SecretsManagerInstanceID, acc.SecretsManagerInstanceRegion)
5968
}

ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -266,6 +266,11 @@ func dataSourceIbmSmIamCredentialsSecretRead(context context.Context, d *schema.
266266
return tfErr.GetDiag()
267267
}
268268

269+
if err = d.Set("secret_id", iAMCredentialsSecret.ID); err != nil {
270+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_id"), fmt.Sprintf("(Data) %s", IAMCredentialsSecretResourceName), "read")
271+
return tfErr.GetDiag()
272+
}
273+
269274
if err = d.Set("secret_type", iAMCredentialsSecret.SecretType); err != nil {
270275
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s", IAMCredentialsSecretResourceName), "read")
271276
return tfErr.GetDiag()

ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_test.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -32,6 +32,7 @@ func TestAccIbmSmIamCredentialsSecretDataSourceBasic(t *testing.T) {
3232
resource.TestCheckResourceAttrSet("data.ibm_sm_iam_credentials_secret.sm_iam_credentials_secret", "versions_total"),
3333
resource.TestCheckResourceAttrSet("data.ibm_sm_iam_credentials_secret.sm_iam_credentials_secret", "ttl"),
3434
resource.TestCheckResourceAttrSet("data.ibm_sm_iam_credentials_secret.sm_iam_credentials_secret", "reuse_api_key"),
35+
resource.TestCheckResourceAttrSet("data.ibm_sm_iam_credentials_secret.sm_iam_credentials_secret_by_name", "secret_id"),
3536
),
3637
},
3738
},

ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -436,6 +436,11 @@ func dataSourceIbmSmImportedCertificateRead(context context.Context, d *schema.R
436436
return tfErr.GetDiag()
437437
}
438438

439+
if err = d.Set("secret_id", importedCertificate.ID); err != nil {
440+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_id"), fmt.Sprintf("(Data) %s", ImportedCertSecretResourceName), "read")
441+
return tfErr.GetDiag()
442+
}
443+
439444
if err = d.Set("secret_type", importedCertificate.SecretType); err != nil {
440445
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s", ImportedCertSecretResourceName), "read")
441446
return tfErr.GetDiag()

ibm/service/secretsmanager/data_source_ibm_sm_imported_certificate_test.go

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -39,6 +39,7 @@ func TestAccIbmSmImportedCertificateDataSourceBasic(t *testing.T) {
3939
resource.TestCheckResourceAttrSet("data.ibm_sm_imported_certificate.sm_imported_certificate", "certificate"),
4040
resource.TestCheckResourceAttrSet("data.ibm_sm_imported_certificate.sm_imported_certificate_by_name", "name"),
4141
resource.TestCheckResourceAttrSet("data.ibm_sm_imported_certificate.sm_imported_certificate_by_name", "secret_group_name"),
42+
resource.TestCheckResourceAttrSet("data.ibm_sm_imported_certificate.sm_imported_certificate_by_name", "secret_id"),
4243
),
4344
},
4445
},

ibm/service/secretsmanager/data_source_ibm_sm_kv_secret.go

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -195,6 +195,11 @@ func dataSourceIbmSmKvSecretRead(context context.Context, d *schema.ResourceData
195195
return tfErr.GetDiag()
196196
}
197197

198+
if err = d.Set("secret_id", kVSecret.ID); err != nil {
199+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_id"), fmt.Sprintf("(Data) %s", KvSecretResourceName), "read")
200+
return tfErr.GetDiag()
201+
}
202+
198203
if err = d.Set("secret_group_id", kVSecret.SecretGroupID); err != nil {
199204
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", KvSecretResourceName), "read")
200205
return tfErr.GetDiag()

0 commit comments

Comments
 (0)