Skip to content

Commit

Permalink
Merge pull request #1 from pulumiverse/upgrade-terraform-provider-cpl…
Browse files Browse the repository at this point in the history
…n-to-v1.1.19

Upgrade terraform-provider-cpln to v1.1.19
  • Loading branch information
vavsab authored Feb 20, 2024
2 parents 7720674 + d592fa1 commit 9bfc4a0
Show file tree
Hide file tree
Showing 13 changed files with 72 additions and 14 deletions.
3 changes: 3 additions & 0 deletions provider/cmd/pulumi-resource-cpln/schema.json
Original file line number Diff line number Diff line change
Expand Up @@ -1054,6 +1054,9 @@
"type": "string",
"secret": true
},
"externalId": {
"type": "string"
},
"roleArn": {
"type": "string"
},
Expand Down
2 changes: 1 addition & 1 deletion provider/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,7 @@ require (
github.com/cheggaaa/pb v1.0.29 // indirect
github.com/cloudflare/circl v1.3.7 // indirect
github.com/containerd/console v1.0.4-0.20230313162750-1ae8d489ac81 // indirect
github.com/controlplane-com/terraform-provider-cpln v1.1.18 // indirect
github.com/controlplane-com/terraform-provider-cpln v1.1.19 // indirect
github.com/davecgh/go-spew v1.1.1 // indirect
github.com/dimchansky/utfbom v1.1.1 // indirect
github.com/djherbis/times v1.5.0 // indirect
Expand Down
6 changes: 2 additions & 4 deletions provider/go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -1076,10 +1076,8 @@ github.com/containers/ocicrypt v1.0.1/go.mod h1:MeJDzk1RJHv89LjsH0Sp5KTY3ZYkjXO/
github.com/containers/ocicrypt v1.1.0/go.mod h1:b8AOe0YR67uU8OqfVNcznfFpAzu3rdgUV4GP9qXPfu4=
github.com/containers/ocicrypt v1.1.1/go.mod h1:Dm55fwWm1YZAjYRaJ94z2mfZikIyIN4B0oB3dj3jFxY=
github.com/containers/ocicrypt v1.1.2/go.mod h1:Dm55fwWm1YZAjYRaJ94z2mfZikIyIN4B0oB3dj3jFxY=
github.com/controlplane-com/terraform-provider-cpln v1.1.17 h1:pPW3dvZRZRYSsXc0uSY2M9un2wtpDrSThrPvKpJTtBA=
github.com/controlplane-com/terraform-provider-cpln v1.1.17/go.mod h1:JPgpgfZ6qE0btGIYW5BrtqDHzFsE929JmDzTgYfRQkc=
github.com/controlplane-com/terraform-provider-cpln v1.1.18 h1:IT6EkrA6VHmQIfnVn79C57KAmwnE9EMXPu4xJn8KC+w=
github.com/controlplane-com/terraform-provider-cpln v1.1.18/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk=
github.com/controlplane-com/terraform-provider-cpln v1.1.19 h1:PTIMhx7Vjudg+sCfxULFhwl5JxJHUk1m2Ncuz2RRsEw=
github.com/controlplane-com/terraform-provider-cpln v1.1.19/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk=
github.com/coreos/bbolt v1.3.2/go.mod h1:iRUV2dpdMOn7Bo10OQBFzIJO9kkE559Wcmn+qkEiiKk=
github.com/coreos/etcd v3.3.10+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
github.com/coreos/etcd v3.3.13+incompatible/go.mod h1:uF7uidLiAD3TWHmW31ZFd/JWoc32PjwdhPthX9715RE=
Expand Down
2 changes: 1 addition & 1 deletion provider/shim/go.mod
Original file line number Diff line number Diff line change
Expand Up @@ -3,8 +3,8 @@ module github.com/controlplane-com/terraform-provider-cpln/shim
go 1.21

require (
github.com/controlplane-com/terraform-provider-cpln v1.1.19
github.com/hashicorp/terraform-plugin-sdk/v2 v2.31.0
github.com/controlplane-com/terraform-provider-cpln v1.1.18
)

require (
Expand Down
4 changes: 2 additions & 2 deletions provider/shim/go.sum
Original file line number Diff line number Diff line change
Expand Up @@ -9,8 +9,8 @@ github.com/apparentlymart/go-textseg/v15 v15.0.0 h1:uYvfpb3DyLSCGWnctWKGj857c6ew
github.com/apparentlymart/go-textseg/v15 v15.0.0/go.mod h1:K8XmNZdhEBkdlyDdvbmmsvpAG721bKi0joRfFdHIWJ4=
github.com/cloudflare/circl v1.3.7 h1:qlCDlTPz2n9fu58M0Nh1J/JzcFpfgkFHHX3O35r5vcU=
github.com/cloudflare/circl v1.3.7/go.mod h1:sRTcRWXGLrKw6yIGJ+l7amYJFfAXbZG0kBSc8r4zxgA=
github.com/controlplane-com/terraform-provider-cpln v1.1.17 h1:pPW3dvZRZRYSsXc0uSY2M9un2wtpDrSThrPvKpJTtBA=
github.com/controlplane-com/terraform-provider-cpln v1.1.17/go.mod h1:JPgpgfZ6qE0btGIYW5BrtqDHzFsE929JmDzTgYfRQkc=
github.com/controlplane-com/terraform-provider-cpln v1.1.19 h1:PTIMhx7Vjudg+sCfxULFhwl5JxJHUk1m2Ncuz2RRsEw=
github.com/controlplane-com/terraform-provider-cpln v1.1.19/go.mod h1:Omq2M175dtYzFK4e8UT79j6/+NrAwTVhK/bZh3POdZk=
github.com/davecgh/go-spew v1.1.0/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
github.com/davecgh/go-spew v1.1.1 h1:vj9j/u1bqnvCEfJOwUhtlOARqs3+rkHYY13jYWTU97c=
github.com/davecgh/go-spew v1.1.1/go.mod h1:J7Y8YcW2NihsgmVo/mv3lAwl/skON4iLHjSsI+c5H38=
Expand Down
3 changes: 3 additions & 0 deletions sdk/dotnet/Inputs/SecretAwsArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public Input<string>? AccessKey
}
}

[Input("externalId")]
public Input<string>? ExternalId { get; set; }

[Input("roleArn")]
public Input<string>? RoleArn { get; set; }

Expand Down
3 changes: 3 additions & 0 deletions sdk/dotnet/Inputs/SecretAwsGetArgs.cs
Original file line number Diff line number Diff line change
Expand Up @@ -25,6 +25,9 @@ public Input<string>? AccessKey
}
}

[Input("externalId")]
public Input<string>? ExternalId { get; set; }

[Input("roleArn")]
public Input<string>? RoleArn { get; set; }

Expand Down
4 changes: 4 additions & 0 deletions sdk/dotnet/Outputs/SecretAws.cs
Original file line number Diff line number Diff line change
Expand Up @@ -15,18 +15,22 @@ namespace Pulumiverse.Cpln.Outputs
public sealed class SecretAws
{
public readonly string AccessKey;
public readonly string? ExternalId;
public readonly string? RoleArn;
public readonly string SecretKey;

[OutputConstructor]
private SecretAws(
string accessKey,

string? externalId,

string? roleArn,

string secretKey)
{
AccessKey = accessKey;
ExternalId = externalId;
RoleArn = roleArn;
SecretKey = secretKey;
}
Expand Down
27 changes: 21 additions & 6 deletions sdk/go/cpln/pulumiTypes.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

1 change: 1 addition & 0 deletions sdk/nodejs/types/input.ts
Original file line number Diff line number Diff line change
Expand Up @@ -383,6 +383,7 @@ export interface PolicyTargetQuerySpecTerm {

export interface SecretAws {
accessKey: pulumi.Input<string>;
externalId?: pulumi.Input<string>;
roleArn?: pulumi.Input<string>;
secretKey: pulumi.Input<string>;
}
Expand Down
1 change: 1 addition & 0 deletions sdk/nodejs/types/output.ts
Original file line number Diff line number Diff line change
Expand Up @@ -387,6 +387,7 @@ export interface PolicyTargetQuerySpecTerm {

export interface SecretAws {
accessKey: string;
externalId?: string;
roleArn?: string;
secretKey: string;
}
Expand Down
16 changes: 16 additions & 0 deletions sdk/python/pulumiverse_cpln/_inputs.py
Original file line number Diff line number Diff line change
Expand Up @@ -3138,30 +3138,37 @@ class SecretAwsArgs:
def __init__(__self__, *,
access_key: pulumi.Input[str],
secret_key: pulumi.Input[str],
external_id: Optional[pulumi.Input[str]] = None,
role_arn: Optional[pulumi.Input[str]] = None):
SecretAwsArgs._configure(
lambda key, value: pulumi.set(__self__, key, value),
access_key=access_key,
secret_key=secret_key,
external_id=external_id,
role_arn=role_arn,
)
@staticmethod
def _configure(
_setter: Callable[[Any, Any], None],
access_key: pulumi.Input[str],
secret_key: pulumi.Input[str],
external_id: Optional[pulumi.Input[str]] = None,
role_arn: Optional[pulumi.Input[str]] = None,
opts: Optional[pulumi.ResourceOptions]=None,
**kwargs):
if 'accessKey' in kwargs:
access_key = kwargs['accessKey']
if 'secretKey' in kwargs:
secret_key = kwargs['secretKey']
if 'externalId' in kwargs:
external_id = kwargs['externalId']
if 'roleArn' in kwargs:
role_arn = kwargs['roleArn']

_setter("access_key", access_key)
_setter("secret_key", secret_key)
if external_id is not None:
_setter("external_id", external_id)
if role_arn is not None:
_setter("role_arn", role_arn)

Expand All @@ -3183,6 +3190,15 @@ def secret_key(self) -> pulumi.Input[str]:
def secret_key(self, value: pulumi.Input[str]):
pulumi.set(self, "secret_key", value)

@property
@pulumi.getter(name="externalId")
def external_id(self) -> Optional[pulumi.Input[str]]:
return pulumi.get(self, "external_id")

@external_id.setter
def external_id(self, value: Optional[pulumi.Input[str]]):
pulumi.set(self, "external_id", value)

@property
@pulumi.getter(name="roleArn")
def role_arn(self) -> Optional[pulumi.Input[str]]:
Expand Down
14 changes: 14 additions & 0 deletions sdk/python/pulumiverse_cpln/outputs.py
Original file line number Diff line number Diff line change
Expand Up @@ -3134,6 +3134,8 @@ def __key_warning(key: str):
suggest = "access_key"
elif key == "secretKey":
suggest = "secret_key"
elif key == "externalId":
suggest = "external_id"
elif key == "roleArn":
suggest = "role_arn"

Expand All @@ -3151,30 +3153,37 @@ def get(self, key: str, default = None) -> Any:
def __init__(__self__, *,
access_key: str,
secret_key: str,
external_id: Optional[str] = None,
role_arn: Optional[str] = None):
SecretAws._configure(
lambda key, value: pulumi.set(__self__, key, value),
access_key=access_key,
secret_key=secret_key,
external_id=external_id,
role_arn=role_arn,
)
@staticmethod
def _configure(
_setter: Callable[[Any, Any], None],
access_key: str,
secret_key: str,
external_id: Optional[str] = None,
role_arn: Optional[str] = None,
opts: Optional[pulumi.ResourceOptions]=None,
**kwargs):
if 'accessKey' in kwargs:
access_key = kwargs['accessKey']
if 'secretKey' in kwargs:
secret_key = kwargs['secretKey']
if 'externalId' in kwargs:
external_id = kwargs['externalId']
if 'roleArn' in kwargs:
role_arn = kwargs['roleArn']

_setter("access_key", access_key)
_setter("secret_key", secret_key)
if external_id is not None:
_setter("external_id", external_id)
if role_arn is not None:
_setter("role_arn", role_arn)

Expand All @@ -3188,6 +3197,11 @@ def access_key(self) -> str:
def secret_key(self) -> str:
return pulumi.get(self, "secret_key")

@property
@pulumi.getter(name="externalId")
def external_id(self) -> Optional[str]:
return pulumi.get(self, "external_id")

@property
@pulumi.getter(name="roleArn")
def role_arn(self) -> Optional[str]:
Expand Down

0 comments on commit 9bfc4a0

Please sign in to comment.