Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for value_from_key_vault in azurerm_api_management_named_value #12309

Merged
merged 24 commits into from
Jul 12, 2021
Merged
Show file tree
Hide file tree
Changes from 22 commits
Commits
Show all changes
24 commits
Select commit Hold shift + click to select a range
2cdcd9c
update
May 26, 2021
ba8f607
Merge branch 'master' of https://github.com/yupwei68/terraform-provid…
May 27, 2021
ad34b7b
Merge branch 'master' of https://github.com/terraform-providers/terra…
May 31, 2021
edf2cd8
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 1, 2021
420097a
revert
Jun 1, 2021
e3294fc
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 4, 2021
86da91a
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 7, 2021
09b9f8e
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 9, 2021
2f55300
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 10, 2021
c03c58d
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 10, 2021
57c031c
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 11, 2021
a6d7062
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 11, 2021
42b8b23
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 11, 2021
ef31b67
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 15, 2021
e054708
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 16, 2021
3f35b09
Merge branch 'master' of https://github.com/yupwei68/terraform-provid…
Jun 16, 2021
6dc973e
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 18, 2021
3363bb5
Merge branch 'master' of https://github.com/terraform-providers/terra…
Jun 21, 2021
62aede4
update
Jun 22, 2021
44df586
update
Jun 22, 2021
2bb54f7
update
Jun 22, 2021
927ec93
update
Jun 22, 2021
0dbea04
update
Jul 9, 2021
f249d8c
update
Jul 12, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
Expand Up @@ -11,6 +11,7 @@ import (
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/clients"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/services/apimanagement/parse"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/services/apimanagement/schemaz"
keyVaultValidate "github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/services/keyvault/validate"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/tf/pluginsdk"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/tf/validation"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/internal/timeouts"
Expand Down Expand Up @@ -46,11 +47,35 @@ func resourceApiManagementNamedValue() *pluginsdk.Resource {
ValidateFunc: validation.StringIsNotEmpty,
},

"key_vault": {
yupwei68 marked this conversation as resolved.
Show resolved Hide resolved
Type: pluginsdk.TypeList,
Optional: true,
MaxItems: 1,
ConflictsWith: []string{"value"},
yupwei68 marked this conversation as resolved.
Show resolved Hide resolved
ExactlyOneOf: []string{"value", "key_vault"},
Elem: &pluginsdk.Resource{
Schema: map[string]*pluginsdk.Schema{
"secret_id": {
Type: pluginsdk.TypeString,
Required: true,
ValidateFunc: keyVaultValidate.NestedItemId,
},
"identity_client_id": {
Type: pluginsdk.TypeString,
Required: true,
ValidateFunc: validation.IsUUID,
},
},
},
},

"value": {
Type: pluginsdk.TypeString,
Required: true,
Sensitive: true,
ValidateFunc: validation.StringIsNotEmpty,
Type: pluginsdk.TypeString,
Optional: true,
Sensitive: true,
ValidateFunc: validation.StringIsNotEmpty,
ConflictsWith: []string{"key_vault"},
yupwei68 marked this conversation as resolved.
Show resolved Hide resolved
ExactlyOneOf: []string{"value", "key_vault"},
},

"secret": {
Expand Down Expand Up @@ -96,10 +121,14 @@ func resourceApiManagementNamedValueCreateUpdate(d *pluginsdk.ResourceData, meta
NamedValueCreateContractProperties: &apimanagement.NamedValueCreateContractProperties{
DisplayName: utils.String(d.Get("display_name").(string)),
Secret: utils.Bool(d.Get("secret").(bool)),
Value: utils.String(d.Get("value").(string)),
KeyVault: expandApiManagementNamedValueKeyVault(d.Get("key_vault").([]interface{})),
},
}

if v, ok := d.GetOk("value"); ok {
parameters.NamedValueCreateContractProperties.Value = utils.String(v.(string))
}

if tags, ok := d.GetOk("tags"); ok {
parameters.NamedValueCreateContractProperties.Tags = utils.ExpandStringSlice(tags.([]interface{}))
}
Expand Down Expand Up @@ -160,6 +189,9 @@ func resourceApiManagementNamedValueRead(d *pluginsdk.ResourceData, meta interfa
if properties.Secret != nil && !*properties.Secret {
d.Set("value", properties.Value)
}
if err := d.Set("key_vault", flattenApiManagementNamedValueKeyVault(properties.KeyVault)); err != nil {
return fmt.Errorf("setting `key_vault`: %+v", err)
}
d.Set("tags", properties.Tags)
}

Expand Down Expand Up @@ -187,3 +219,37 @@ func resourceApiManagementNamedValueDelete(d *pluginsdk.ResourceData, meta inter

return nil
}

func expandApiManagementNamedValueKeyVault(inputs []interface{}) *apimanagement.KeyVaultContractCreateProperties {
if len(inputs) == 0 {
return nil
}
input := inputs[0].(map[string]interface{})

return &apimanagement.KeyVaultContractCreateProperties{
SecretIdentifier: utils.String(input["secret_id"].(string)),
IdentityClientID: utils.String(input["identity_client_id"].(string)),
}
}

func flattenApiManagementNamedValueKeyVault(input *apimanagement.KeyVaultContractProperties) []interface{} {
if input == nil {
return []interface{}{}
}

var secretId, clientId string
if input.SecretIdentifier != nil {
secretId = *input.SecretIdentifier
}

if input.IdentityClientID != nil {
clientId = *input.IdentityClientID
}

return []interface{}{
map[string]interface{}{
"secret_id": secretId,
"identity_client_id": clientId,
},
}
}
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,50 @@ func TestAccApiManagementNamedValue_basic(t *testing.T) {
})
}

func TestAccApiManagementNamedValue_keyVault(t *testing.T) {
data := acceptance.BuildTestData(t, "azurerm_api_management_named_value", "test")
r := ApiManagementNamedValueResource{}

data.ResourceTest(t, r, []acceptance.TestStep{
{
Config: r.keyVault(data),
Check: acceptance.ComposeTestCheckFunc(
check.That(data.ResourceName).ExistsInAzure(r),
),
},
data.ImportStep(),
})
}

func TestAccApiManagementNamedValue_keyVaultUpdate(t *testing.T) {
data := acceptance.BuildTestData(t, "azurerm_api_management_named_value", "test")
r := ApiManagementNamedValueResource{}

data.ResourceTest(t, r, []acceptance.TestStep{
{
Config: r.keyVault(data),
Check: acceptance.ComposeTestCheckFunc(
check.That(data.ResourceName).ExistsInAzure(r),
),
},
data.ImportStep(),
{
Config: r.keyVaultUpdate(data),
Check: acceptance.ComposeTestCheckFunc(
check.That(data.ResourceName).ExistsInAzure(r),
),
},
data.ImportStep(),
{
Config: r.keyVaultUpdateToValue(data),
Check: acceptance.ComposeTestCheckFunc(
check.That(data.ResourceName).ExistsInAzure(r),
),
},
data.ImportStep(),
})
}

func TestAccApiManagementNamedValue_update(t *testing.T) {
data := acceptance.BuildTestData(t, "azurerm_api_management_named_value", "test")
r := ApiManagementNamedValueResource{}
Expand Down Expand Up @@ -70,7 +114,7 @@ func (ApiManagementNamedValueResource) Exists(ctx context.Context, clients *clie
return utils.Bool(resp.ID != nil), nil
}

func (ApiManagementNamedValueResource) basic(data acceptance.TestData) string {
func (ApiManagementNamedValueResource) template(data acceptance.TestData) string {
return fmt.Sprintf(`
provider "azurerm" {
features {}
Expand All @@ -88,49 +132,203 @@ resource "azurerm_api_management" "test" {
publisher_name = "pub1"
publisher_email = "[email protected]"

sku_name = "Developer_1"
sku_name = "Consumption_0"
}
`, data.RandomInteger, data.Locations.Primary, data.RandomInteger)
}

func (r ApiManagementNamedValueResource) basic(data acceptance.TestData) string {
return fmt.Sprintf(`
%s

resource "azurerm_api_management_named_value" "test" {
name = "acctestAMProperty-%d"
resource_group_name = azurerm_api_management.test.resource_group_name
resource_group_name = azurerm_resource_group.test.name
api_management_name = azurerm_api_management.test.name
display_name = "TestProperty%d"
value = "Test Value"
tags = ["tag1", "tag2"]
}
`, data.RandomInteger, data.Locations.Primary, data.RandomInteger, data.RandomInteger, data.RandomInteger)
`, r.template(data), data.RandomInteger, data.RandomInteger)
}

func (r ApiManagementNamedValueResource) update(data acceptance.TestData) string {
return fmt.Sprintf(`
%s

resource "azurerm_api_management_named_value" "test" {
name = "acctestAMProperty-%d"
resource_group_name = azurerm_resource_group.test.name
api_management_name = azurerm_api_management.test.name
display_name = "TestProperty2%d"
value = "Test Value2"
secret = true
tags = ["tag3", "tag4"]
}
`, r.template(data), data.RandomInteger, data.RandomInteger)
}

func (ApiManagementNamedValueResource) update(data acceptance.TestData) string {
func (r ApiManagementNamedValueResource) keyVaultTemplate(data acceptance.TestData) string {
return fmt.Sprintf(`
provider "azurerm" {
features {}
features {
key_vault {
purge_soft_delete_on_destroy = true
}
}
}

resource "azurerm_resource_group" "test" {
name = "acctestRG-%d"
location = "%s"
name = "acctestRG-Apim-%[1]d"
location = "%[2]s"
}

resource "azurerm_user_assigned_identity" "test" {
name = "acctestUAI-%[1]d"
location = azurerm_resource_group.test.location
resource_group_name = azurerm_resource_group.test.name
}

resource "azurerm_api_management" "test" {
name = "acctestAM-%d"
name = "acctestAM-%[1]d"
location = azurerm_resource_group.test.location
resource_group_name = azurerm_resource_group.test.name
publisher_name = "pub1"
publisher_email = "[email protected]"

sku_name = "Developer_1"
sku_name = "Consumption_0"

identity {
type = "UserAssigned"
identity_ids = [
azurerm_user_assigned_identity.test.id,
]
}
}

data "azurerm_client_config" "current" {}

resource "azurerm_key_vault" "test" {
name = "acctestKV-%[3]s"
location = azurerm_resource_group.test.location
resource_group_name = azurerm_resource_group.test.name
tenant_id = data.azurerm_client_config.current.tenant_id
sku_name = "standard"
}

resource "azurerm_key_vault_access_policy" "test" {
key_vault_id = azurerm_key_vault.test.id
tenant_id = data.azurerm_client_config.current.tenant_id
object_id = data.azurerm_client_config.current.object_id
certificate_permissions = [
"Create",
"Delete",
"Deleteissuers",
"Get",
"Getissuers",
"Import",
"List",
"Listissuers",
"Managecontacts",
"Manageissuers",
"Setissuers",
"Update",
"Purge",
]
secret_permissions = [
"Get",
"Delete",
"List",
"Purge",
"Recover",
"Set",
]
}

resource "azurerm_key_vault_access_policy" "test2" {
key_vault_id = azurerm_key_vault.test.id
tenant_id = azurerm_user_assigned_identity.test.tenant_id
object_id = azurerm_user_assigned_identity.test.principal_id
secret_permissions = [
"Get",
"List",
]
}

resource "azurerm_key_vault_secret" "test" {
name = "secret-%[3]s"
value = "rick-and-morty"
key_vault_id = azurerm_key_vault.test.id

depends_on = [azurerm_key_vault_access_policy.test]
}

resource "azurerm_key_vault_secret" "test2" {
name = "secret2-%[3]s"
value = "rick-and-morty2"
key_vault_id = azurerm_key_vault.test.id

depends_on = [azurerm_key_vault_access_policy.test]
}

`, data.RandomInteger, data.Locations.Primary, data.RandomString)
}

func (r ApiManagementNamedValueResource) keyVault(data acceptance.TestData) string {
return fmt.Sprintf(`
%[1]s

resource "azurerm_api_management_named_value" "test" {
name = "acctestAMProperty-%d"
resource_group_name = azurerm_api_management.test.resource_group_name
name = "acctestAMProperty-%[2]d"
resource_group_name = azurerm_resource_group.test.name
api_management_name = azurerm_api_management.test.name
display_name = "TestProperty2%d"
value = "Test Value2"
display_name = "TestKeyVault%[2]d"
secret = true
tags = ["tag3", "tag4"]
key_vault {
secret_id = azurerm_key_vault_secret.test.id
identity_client_id = azurerm_user_assigned_identity.test.client_id
}

tags = ["tag1", "tag2"]

depends_on = [azurerm_key_vault_access_policy.test2]
}
`, r.keyVaultTemplate(data), data.RandomInteger)
}

func (r ApiManagementNamedValueResource) keyVaultUpdate(data acceptance.TestData) string {
return fmt.Sprintf(`
%[1]s

resource "azurerm_api_management_named_value" "test" {
name = "acctestAMProperty-%[2]d"
resource_group_name = azurerm_resource_group.test.name
api_management_name = azurerm_api_management.test.name
display_name = "TestKeyVault%[2]d"
secret = true
key_vault {
secret_id = azurerm_key_vault_secret.test2.id
identity_client_id = azurerm_user_assigned_identity.test.client_id
}
tags = ["tag3", "tag4"]

depends_on = [azurerm_key_vault_access_policy.test2]
}
`, r.keyVaultTemplate(data), data.RandomInteger)
}

func (r ApiManagementNamedValueResource) keyVaultUpdateToValue(data acceptance.TestData) string {
return fmt.Sprintf(`
%[1]s

resource "azurerm_api_management_named_value" "test" {
name = "acctestAMProperty-%[2]d"
resource_group_name = azurerm_resource_group.test.name
api_management_name = azurerm_api_management.test.name
display_name = "TestKeyVault%[2]d"
secret = false
value = "Key Vault to Value"
tags = ["tag5", "tag6"]
}
`, data.RandomInteger, data.Locations.Primary, data.RandomInteger, data.RandomInteger, data.RandomInteger)
`, r.keyVaultTemplate(data), data.RandomInteger)
}
Loading