Skip to content

Commit e75b053

Browse files
committed
feat(iam, secretsmanager): add secretsmanager IAM rolebinding resources
relates to STACKITTPR-497
1 parent 91ee2ce commit e75b053

File tree

21 files changed

+950
-51
lines changed

21 files changed

+950
-51
lines changed

.github/docs/contribution-guide/resource.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ import (
1515
"github.com/hashicorp/terraform-plugin-log/tflog"
1616
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/conversion"
1717
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/core"
18-
fooUtils "github.com/stackitcloud/terraform-provider-stackit/stackit/internal/services/foo/utils"
18+
fooUtils "github.com/stackitcloud/terraform-provider-stackit/stackit/internal/services/foo/rolebindings-testing"
1919
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/utils"
2020
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/validate"
2121

Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
# generated by https://github.com/hashicorp/terraform-plugin-docs
3+
page_title: "stackit_secretsmanager_instance_role_binding Resource - stackit"
4+
subcategory: ""
5+
description: |-
6+
TODO
7+
---
8+
9+
# stackit_secretsmanager_instance_role_binding (Resource)
10+
11+
TODO
12+
13+
## Example Usage
14+
15+
```terraform
16+
resource "stackit_secretsmanager_instance_role_binding" "role_binding" {
17+
resource_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
18+
role = "owner"
19+
subject = "john.doe@example.com"
20+
}
21+
```
22+
23+
<!-- schema generated by tfplugindocs -->
24+
## Schema
25+
26+
### Required
27+
28+
- `resource_id` (String) The identifier of the resource to apply this role binding to.
29+
- `role` (String) A valid role defined for the resource.
30+
- `subject` (String) Identifier of user, service account or client. Usually email address or name in case of clients.
31+
32+
### Optional
33+
34+
- `region` (String) The resource region. If not defined, the provider region is used.
35+
36+
### Read-Only
37+
38+
- `id` (String) Terraform's internal resource identifier. It is structured as "`region`,`resource_id`,`role`,`subject`".
Lines changed: 38 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,38 @@
1+
---
2+
# generated by https://github.com/hashicorp/terraform-plugin-docs
3+
page_title: "stackit_secretsmanager_secret_group_role_binding Resource - stackit"
4+
subcategory: ""
5+
description: |-
6+
TODO
7+
---
8+
9+
# stackit_secretsmanager_secret_group_role_binding (Resource)
10+
11+
TODO
12+
13+
## Example Usage
14+
15+
```terraform
16+
resource "stackit_secretsmanager_secret_group_role_binding" "role_binding" {
17+
resource_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
18+
role = "owner"
19+
subject = "john.doe@example.com"
20+
}
21+
```
22+
23+
<!-- schema generated by tfplugindocs -->
24+
## Schema
25+
26+
### Required
27+
28+
- `resource_id` (String) The identifier of the resource to apply this role binding to.
29+
- `role` (String) A valid role defined for the resource.
30+
- `subject` (String) Identifier of user, service account or client. Usually email address or name in case of clients.
31+
32+
### Optional
33+
34+
- `region` (String) The resource region. If not defined, the provider region is used.
35+
36+
### Read-Only
37+
38+
- `id` (String) Terraform's internal resource identifier. It is structured as "`region`,`resource_id`,`role`,`subject`".
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
resource "stackit_secretsmanager_instance_role_binding" "role_binding" {
2+
resource_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
3+
role = "owner"
4+
subject = "john.doe@example.com"
5+
}
Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,5 @@
1+
resource "stackit_secretsmanager_secret_group_role_binding" "role_binding" {
2+
resource_id = "xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx"
3+
role = "owner"
4+
subject = "john.doe@example.com"
5+
}

go.mod

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ require (
1212
github.com/hashicorp/terraform-plugin-go v0.30.0
1313
github.com/hashicorp/terraform-plugin-log v0.10.0
1414
github.com/hashicorp/terraform-plugin-testing v1.14.0
15-
github.com/stackitcloud/stackit-sdk-go/core v0.24.1
15+
github.com/stackitcloud/stackit-sdk-go/core v0.25.0
1616
github.com/stackitcloud/stackit-sdk-go/services/alb v0.12.1
1717
github.com/stackitcloud/stackit-sdk-go/services/cdn v1.13.0
1818
github.com/stackitcloud/stackit-sdk-go/services/certificates v1.4.1
@@ -35,7 +35,7 @@ require (
3535
github.com/stackitcloud/stackit-sdk-go/services/redis v0.27.3
3636
github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.20.0
3737
github.com/stackitcloud/stackit-sdk-go/services/scf v0.6.1
38-
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3
38+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.18.0
3939
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.3.8
4040
github.com/stackitcloud/stackit-sdk-go/services/serverupdate v1.5.0
4141
github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.12.0

go.sum

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -668,8 +668,8 @@ github.com/spf13/viper v1.12.0 h1:CZ7eSOd3kZoaYDLbXnmzgQI5RlciuXBMA+18HwHRfZQ=
668668
github.com/spf13/viper v1.12.0/go.mod h1:b6COn30jlNxbm/V2IqWiNWkJ+vZNiMNksliPCiuKtSI=
669669
github.com/ssgreg/nlreturn/v2 v2.2.1 h1:X4XDI7jstt3ySqGU86YGAURbxw3oTDPK9sPEi6YEwQ0=
670670
github.com/ssgreg/nlreturn/v2 v2.2.1/go.mod h1:E/iiPB78hV7Szg2YfRgyIrk1AD6JVMTRkkxBiELzh2I=
671-
github.com/stackitcloud/stackit-sdk-go/core v0.24.1 h1:IrG0XBlJivUpXC4Y6TE+6FeSxNPs1JQXsero0ivwh0o=
672-
github.com/stackitcloud/stackit-sdk-go/core v0.24.1/go.mod h1:osMglDby4csGZ5sIfhNyYq1bS1TxIdPY88+skE/kkmI=
671+
github.com/stackitcloud/stackit-sdk-go/core v0.25.0 h1:ra3VEk684MNoq741g+xbZrKjZzhyztq5liUAwwew4DY=
672+
github.com/stackitcloud/stackit-sdk-go/core v0.25.0/go.mod h1:WU1hhxnjXw2EV7CYa1nlEvNpMiRY6CvmIOaHuL3pOaA=
673673
github.com/stackitcloud/stackit-sdk-go/services/alb v0.12.1 h1:RKaxAymxlyxxE0Gta3yRuQWf07LnlcX+mfGnVB96NHA=
674674
github.com/stackitcloud/stackit-sdk-go/services/alb v0.12.1/go.mod h1:FHkV5L9vCQha+5MX+NdMdYjQIHXcLr95+bu1FN91QOM=
675675
github.com/stackitcloud/stackit-sdk-go/services/authorization v0.12.0 h1:HxPgBu04j5tj6nfZ2r0l6v4VXC0/tYOGe4sA5Addra8=
@@ -716,8 +716,8 @@ github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.20.0 h1:bT/qo
716716
github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.20.0/go.mod h1:jiPIzF8lcm5Dx0TkDK2CBgeRBHSRUqwyX+z/zqo1bes=
717717
github.com/stackitcloud/stackit-sdk-go/services/scf v0.6.1 h1:ayfCRRVTVwFGQMfjmXaDhiLyif53ibTu7zNhUTnNh2w=
718718
github.com/stackitcloud/stackit-sdk-go/services/scf v0.6.1/go.mod h1:26fU2pMiIxUZ+Az5ux3vMtaVVzhK6md+lvW0s+ONVU0=
719-
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3 h1:3hZSg3z+4AXa5LbR2Vl38VmSA83ABItE63E53LuyWv8=
720-
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3/go.mod h1:5unx5r0IgeFCtJDEgsWddtgKvYSw442FDNdhtfyJnQI=
719+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.18.0 h1:DCNhYm8VDErgHUEYpA6SGq1czoMp5CpOPkY1bbAnA3I=
720+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.18.0/go.mod h1:f7QqAUDHadDuBAKg9ZbiX7hHuVjoGGREUKk+yPKu85I=
721721
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.3.8 h1:LLyANBzE8sQa0/49tQBqq4sVLhNgwdqCeQm76srJHWw=
722722
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.3.8/go.mod h1:/bmg57XZu+bGczzcoumrukiGMPGzI2mOyTT4BVIQUBs=
723723
github.com/stackitcloud/stackit-sdk-go/services/serverupdate v1.5.0 h1:4MYNb3VQjVnVPfJ9xhDbSQgoSkxQZJ0tsv9N7O43/RI=

0 commit comments

Comments
 (0)