Skip to content

Commit b897760

Browse files
yonatanyellYonathan-YellinAvi RibchinskyTatyanaBolIdanAdar
authored
Update docs - nested JSONs and docs fixes (IBM-Cloud#6356)
* SC addition * SC addition * SC addition * update function updated * SC unit tests added * SC unit tests added * d * tests fixes * tests fixes * update sdk * .secrets.baseline update * .secrets.baseline update * .secrets.baseline update * Update sm_service_credentials_secret_metadata.html.markdown * bugs fixes * bugs fixes * bugs fixes * docs bugs fixes * preferred_chain added for public cert lets encrypt configuration * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * preferred chain docs update * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * support for creating secret version for username password & version_custom_metadata for all * fix public cert bug * update docs * reordering bug in alt_names * name regex fix in docs * imported cert bug fix * crypto_key addition * crypto_key addition * crypto_key addition * crypto_key addition * rejections fixes * rejections fixes * rejections fixes * rejections fixes * rejections fixes * test label name changed * test label name changed * error formating update * go sdk version update * update docs & descriptions for uuid * update docs - nested JSONs and docs fixes * casting error handling - data sources --------- Co-authored-by: Yonathan-Yellin <[email protected]> Co-authored-by: Avi Ribchinsky <[email protected]> Co-authored-by: Tatyana <[email protected]> Co-authored-by: Idan Adar <[email protected]>
1 parent 664194e commit b897760

File tree

55 files changed

+238
-79
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

55 files changed

+238
-79
lines changed

examples/ibm-secrets-manager/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -560,7 +560,7 @@ data "sm_en_registration" "sm_en_registration_instance" {
560560
| certificate | The PEM-encoded contents of your certificate. | `string` | false |
561561
| intermediate | (Optional) The PEM-encoded intermediate certificate to associate with the root certificate. | `string` | false |
562562
| private_key | (Optional) The PEM-encoded private key to associate with the certificate. | `string` | false |
563-
| custom_metadata | The secret metadata that a user can customize. | `map()` | false |
563+
| version_custom_metadata | The custom metadata of the current secret version. | `map()` | false |
564564
| rotation | Determines whether Secrets Manager rotates your secrets automatically. | `` | false |
565565
| source_service | The properties required for creating the service credentials for the specified source service instance. | `` | false |
566566
| data | The payload data of a key-value secret. | `map()` | false |

ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -136,7 +136,11 @@ func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.Resou
136136
return diagError
137137
}
138138

139-
arbitrarySecret := secret.(*secretsmanagerv2.ArbitrarySecret)
139+
arbitrarySecret, ok := secret.(*secretsmanagerv2.ArbitrarySecret)
140+
if !ok {
141+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an Arbitrary secret."), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
142+
return tfErr.GetDiag()
143+
}
140144
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *arbitrarySecret.ID))
141145

142146
var err error

ibm/service/secretsmanager/data_source_ibm_sm_arbitrary_secret_metadata.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -139,7 +139,11 @@ func dataSourceIbmSmArbitrarySecretMetadataRead(context context.Context, d *sche
139139
return tfErr.GetDiag()
140140
}
141141

142-
arbitrarySecretMetadata := arbitrarySecretMetadataIntf.(*secretsmanagerv2.ArbitrarySecretMetadata)
142+
arbitrarySecretMetadata, ok := arbitrarySecretMetadataIntf.(*secretsmanagerv2.ArbitrarySecretMetadata)
143+
if !ok {
144+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an Arbitrary secret."), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
145+
return tfErr.GetDiag()
146+
}
143147

144148
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))
145149

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_configuration.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -157,7 +157,11 @@ func dataSourceIbmSmCustomCredentialsConfigurationRead(context context.Context,
157157
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetConfigurationWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s", CustomCredentialsConfigResourceName), "read")
158158
return tfErr.GetDiag()
159159
}
160-
config := configIntf.(*secretsmanagerv2.CustomCredentialsConfiguration)
160+
config, ok := configIntf.(*secretsmanagerv2.CustomCredentialsConfiguration)
161+
if !ok {
162+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong configuration type: The provided configuration is not a Custom Credentials configuration."), fmt.Sprintf("(Data) %s", CustomCredentialsConfigResourceName), "read")
163+
return tfErr.GetDiag()
164+
}
161165

162166
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *getConfigurationOptions.Name))
163167

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_secret.go

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -235,7 +235,11 @@ func dataSourceIbmSmCustomCredentialsSecretRead(context context.Context, d *sche
235235
return diagError
236236
}
237237

238-
customCredentialsSecret := secret.(*secretsmanagerv2.CustomCredentialsSecret)
238+
customCredentialsSecret, ok := secret.(*secretsmanagerv2.CustomCredentialsSecret)
239+
if !ok {
240+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not a Custom Credentials secret."), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
241+
return tfErr.GetDiag()
242+
}
239243

240244
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *customCredentialsSecret.ID))
241245

ibm/service/secretsmanager/data_source_ibm_sm_custom_credentials_secret_metadata.go

Lines changed: 29 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -219,27 +219,31 @@ func dataSourceIbmSmCustomCredentialsSecretMetadataRead(context context.Context,
219219
return tfErr.GetDiag()
220220
}
221221

222-
metadata := secretMetadataIntf.(*secretsmanagerv2.CustomCredentialsSecretMetadata)
222+
metadata, ok := secretMetadataIntf.(*secretsmanagerv2.CustomCredentialsSecretMetadata)
223+
if !ok {
224+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not a Custom Credentials secret."), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
225+
return tfErr.GetDiag()
226+
}
223227

224228
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))
225229

226230
if err = d.Set("region", region); err != nil {
227-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
231+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
228232
return tfErr.GetDiag()
229233
}
230234

231235
if err = d.Set("created_by", metadata.CreatedBy); err != nil {
232-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
236+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
233237
return tfErr.GetDiag()
234238
}
235239

236240
if err = d.Set("created_at", DateTimeToRFC3339(metadata.CreatedAt)); err != nil {
237-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
241+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
238242
return tfErr.GetDiag()
239243
}
240244

241245
if err = d.Set("crn", metadata.Crn); err != nil {
242-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
246+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
243247
return tfErr.GetDiag()
244248
}
245249

@@ -250,110 +254,110 @@ func dataSourceIbmSmCustomCredentialsSecretMetadataRead(context context.Context,
250254
}
251255

252256
if err = d.Set("custom_metadata", flex.Flatten(convertedMap)); err != nil {
253-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
257+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
254258
return tfErr.GetDiag()
255259
}
256260
if err != nil {
257-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
261+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
258262
return tfErr.GetDiag()
259263
}
260264
}
261265

262266
if err = d.Set("description", metadata.Description); err != nil {
263-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
267+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
264268
return tfErr.GetDiag()
265269
}
266270

267271
if err = d.Set("configuration", metadata.Configuration); err != nil {
268-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting configuration"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
272+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting configuration"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
269273
return tfErr.GetDiag()
270274
}
271275

272276
if err = d.Set("downloaded", metadata.Downloaded); err != nil {
273-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
277+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
274278
return tfErr.GetDiag()
275279
}
276280

277281
if err = d.Set("locks_total", flex.IntValue(metadata.LocksTotal)); err != nil {
278-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
282+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
279283
return tfErr.GetDiag()
280284
}
281285

282286
if err = d.Set("name", metadata.Name); err != nil {
283-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
287+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
284288
return tfErr.GetDiag()
285289
}
286290

287291
if err = d.Set("secret_group_id", metadata.SecretGroupID); err != nil {
288-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
292+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
289293
return tfErr.GetDiag()
290294
}
291295

292296
if err = d.Set("secret_type", metadata.SecretType); err != nil {
293-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
297+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
294298
return tfErr.GetDiag()
295299
}
296300

297301
if err = d.Set("state", flex.IntValue(metadata.State)); err != nil {
298-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
302+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
299303
return tfErr.GetDiag()
300304
}
301305

302306
if err = d.Set("state_description", metadata.StateDescription); err != nil {
303-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
307+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
304308
return tfErr.GetDiag()
305309
}
306310

307311
if err = d.Set("ttl", metadata.TTL); err != nil {
308-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting ttl"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
312+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting ttl"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
309313
return tfErr.GetDiag()
310314
}
311315

312316
if err = d.Set("updated_at", DateTimeToRFC3339(metadata.UpdatedAt)); err != nil {
313-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
317+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
314318
return tfErr.GetDiag()
315319
}
316320

317321
if err = d.Set("versions_total", flex.IntValue(metadata.VersionsTotal)); err != nil {
318-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
322+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
319323
return tfErr.GetDiag()
320324
}
321325

322326
rotation := []map[string]interface{}{}
323327
if metadata.Rotation != nil {
324328
modelMap, err := customCredentialsSecretRotationPolicyToMap(metadata.Rotation)
325329
if err != nil {
326-
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
330+
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
327331
return tfErr.GetDiag()
328332
}
329333
rotation = append(rotation, modelMap)
330334
}
331335
if err = d.Set("rotation", rotation); err != nil {
332-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting rotation"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
336+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting rotation"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
333337
return tfErr.GetDiag()
334338
}
335339

336340
parameters := []map[string]interface{}{}
337341
if metadata.Parameters != nil {
338342
modelMap, err := customCredentialsSecretFieldsToMap(metadata.Parameters)
339343
if err != nil {
340-
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
344+
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
341345
return tfErr.GetDiag()
342346
}
343347
parameters = append(parameters, modelMap)
344348
}
345349
if err = d.Set("parameters", parameters); err != nil {
346-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting parameters"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
350+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting parameters"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
347351
return tfErr.GetDiag()
348352
}
349353

350354
if err = d.Set("expiration_date", DateTimeToRFC3339(metadata.ExpirationDate)); err != nil {
351-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
355+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
352356
return tfErr.GetDiag()
353357
}
354358

355359
if err = d.Set("next_rotation_date", DateTimeToRFC3339(metadata.NextRotationDate)); err != nil {
356-
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting next_rotation_date"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
360+
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting next_rotation_date"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
357361
return tfErr.GetDiag()
358362
}
359363

ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_configuration.go

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -87,7 +87,12 @@ func dataSourceIbmSmIamCredentialsConfigurationRead(context context.Context, d *
8787
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetConfigurationWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s", IAMCredentialsConfigResourceName), "read")
8888
return tfErr.GetDiag()
8989
}
90-
iAMCredentialsConfiguration := iAMCredentialsConfigurationIntf.(*secretsmanagerv2.IAMCredentialsConfiguration)
90+
91+
iAMCredentialsConfiguration, ok := iAMCredentialsConfigurationIntf.(*secretsmanagerv2.IAMCredentialsConfiguration)
92+
if !ok {
93+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong configuration type: The provided configuration is not an IAM Credentials configuration."), fmt.Sprintf("(Data) %s", IAMCredentialsConfigResourceName), "read")
94+
return tfErr.GetDiag()
95+
}
9196

9297
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *getConfigurationOptions.Name))
9398

ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret.go

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -202,7 +202,12 @@ func dataSourceIbmSmIamCredentialsSecretRead(context context.Context, d *schema.
202202
return diagError
203203
}
204204

205-
iAMCredentialsSecret := iAMCredentialsSecretIntf.(*secretsmanagerv2.IAMCredentialsSecret)
205+
iAMCredentialsSecret, ok := iAMCredentialsSecretIntf.(*secretsmanagerv2.IAMCredentialsSecret)
206+
if !ok {
207+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an IAM Credentials secret."), fmt.Sprintf("(Data) %s", IAMCredentialsSecretResourceName), "read")
208+
return tfErr.GetDiag()
209+
}
210+
206211
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *iAMCredentialsSecret.ID))
207212

208213
var err error

ibm/service/secretsmanager/data_source_ibm_sm_iam_credentials_secret_metadata.go

Lines changed: 6 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -205,7 +205,12 @@ func dataSourceIbmSmIamCredentialsSecretMetadataRead(context context.Context, d
205205
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetSecretMetadataWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s_metadata", IAMCredentialsSecretResourceName), "read")
206206
return tfErr.GetDiag()
207207
}
208-
iAMCredentialsSecretMetadata := iAMCredentialsSecretMetadataIntf.(*secretsmanagerv2.IAMCredentialsSecretMetadata)
208+
209+
iAMCredentialsSecretMetadata, ok := iAMCredentialsSecretMetadataIntf.(*secretsmanagerv2.IAMCredentialsSecretMetadata)
210+
if !ok {
211+
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an IAM Credentials secret."), fmt.Sprintf("(Data) %s_metadata", IAMCredentialsSecretResourceName), "read")
212+
return tfErr.GetDiag()
213+
}
209214

210215
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))
211216

0 commit comments

Comments
 (0)