Skip to content

Commit ef434e9

Browse files
authored
Merge branch 'main' into serverbackup-sdk-update
2 parents 426611f + e457a12 commit ef434e9

13 files changed

Lines changed: 160 additions & 158 deletions

File tree

.github/docs/contribution-guide/resource.go

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -263,7 +263,7 @@ func (r *barResource) Read(ctx context.Context, req resource.ReadRequest, resp *
263263
return
264264
}
265265

266-
readTimeout, diags := model.Timeouts.Create(ctx, core.DefaultOperationTimeout)
266+
readTimeout, diags := model.Timeouts.Read(ctx, core.DefaultOperationTimeout)
267267
resp.Diagnostics.Append(diags...)
268268
if resp.Diagnostics.HasError() {
269269
return
@@ -318,7 +318,7 @@ func (r *barResource) Delete(ctx context.Context, req resource.DeleteRequest, re
318318
}
319319

320320
waiterTimeout := wait.DeleteBarWaitHandler(ctx, r.client, projectId, region, barId).GetTimeout()
321-
deleteTimeout, diags := model.Timeouts.Create(ctx, waiterTimeout+core.DefaultTimeoutMargin)
321+
deleteTimeout, diags := model.Timeouts.Delete(ctx, waiterTimeout+core.DefaultTimeoutMargin)
322322
resp.Diagnostics.Append(diags...)
323323
if resp.Diagnostics.HasError() {
324324
return

go.mod

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,7 +13,7 @@ require (
1313
github.com/hashicorp/terraform-plugin-log v0.10.0
1414
github.com/hashicorp/terraform-plugin-testing v1.14.0
1515
github.com/stackitcloud/stackit-sdk-go/core v0.25.0
16-
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.0
16+
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.1
1717
github.com/stackitcloud/stackit-sdk-go/services/cdn v1.14.0
1818
github.com/stackitcloud/stackit-sdk-go/services/certificates v1.4.1
1919
github.com/stackitcloud/stackit-sdk-go/services/dns v0.19.1
@@ -24,7 +24,7 @@ require (
2424
github.com/stackitcloud/stackit-sdk-go/services/loadbalancer v1.12.0
2525
github.com/stackitcloud/stackit-sdk-go/services/logme v0.27.1
2626
github.com/stackitcloud/stackit-sdk-go/services/logs v0.7.1
27-
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.27.1
27+
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.28.1
2828
github.com/stackitcloud/stackit-sdk-go/services/modelserving v0.8.1
2929
github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v1.7.2
3030
github.com/stackitcloud/stackit-sdk-go/services/objectstorage v1.7.0
@@ -37,6 +37,8 @@ require (
3737
github.com/stackitcloud/stackit-sdk-go/services/scf v0.7.0
3838
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3
3939
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.6.0
40+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.17.0
41+
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.6.0
4042
github.com/stackitcloud/stackit-sdk-go/services/serverupdate v1.5.0
4143
github.com/stackitcloud/stackit-sdk-go/services/serviceaccount v0.12.0
4244
github.com/stackitcloud/stackit-sdk-go/services/serviceenablement v1.4.1

go.sum

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -670,8 +670,8 @@ github.com/ssgreg/nlreturn/v2 v2.2.1 h1:X4XDI7jstt3ySqGU86YGAURbxw3oTDPK9sPEi6YE
670670
github.com/ssgreg/nlreturn/v2 v2.2.1/go.mod h1:E/iiPB78hV7Szg2YfRgyIrk1AD6JVMTRkkxBiELzh2I=
671671
github.com/stackitcloud/stackit-sdk-go/core v0.25.0 h1:ra3VEk684MNoq741g+xbZrKjZzhyztq5liUAwwew4DY=
672672
github.com/stackitcloud/stackit-sdk-go/core v0.25.0/go.mod h1:WU1hhxnjXw2EV7CYa1nlEvNpMiRY6CvmIOaHuL3pOaA=
673-
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.0 h1:ibBsculyrtqb6GKkrP44V3A7HbW4NbzywehPAeiRlEU=
674-
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.0/go.mod h1:DlW5YgdOPqllDnxTL4Y3XAwrarfzHWkQfhDg5YIegXg=
673+
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.1 h1:hlos/aew02XKWtq1ss9EQh1UCzV1SXArYioew+WIv2M=
674+
github.com/stackitcloud/stackit-sdk-go/services/alb v0.14.1/go.mod h1:yYC61OsTtLZsrcq8l/JCI6MjvxLT4E2wMQj6LXc7prA=
675675
github.com/stackitcloud/stackit-sdk-go/services/authorization v0.12.0 h1:HxPgBu04j5tj6nfZ2r0l6v4VXC0/tYOGe4sA5Addra8=
676676
github.com/stackitcloud/stackit-sdk-go/services/authorization v0.12.0/go.mod h1:uYI9pHAA2g84jJN25ejFUxa0/JtfpPZqMDkctQ1BzJk=
677677
github.com/stackitcloud/stackit-sdk-go/services/cdn v1.14.0 h1:6pxndY7vzu4/L2dpgHaXw3x0b6FZKEVVZMhi7/i0rAo=
@@ -694,8 +694,8 @@ github.com/stackitcloud/stackit-sdk-go/services/logme v0.27.1 h1:6AaWxQNtOEvIvbt
694694
github.com/stackitcloud/stackit-sdk-go/services/logme v0.27.1/go.mod h1:qwpGNPgF7LmfodGPXcgv9uldeSSuFMNJkyD6QPqfiCI=
695695
github.com/stackitcloud/stackit-sdk-go/services/logs v0.7.1 h1:cuQA5dO8WSM0LBHR2FBpf+RgKH7/DE7+5NUPLxDpgPg=
696696
github.com/stackitcloud/stackit-sdk-go/services/logs v0.7.1/go.mod h1:di3QDHwOlpa99dXRuGLcuyDCi0A+zlMtgzYi2okQMr8=
697-
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.27.1 h1:YK2HxO+Nffe5BTt8jtWUyyES3sarjIH1GWlrqRaa4Ec=
698-
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.27.1/go.mod h1:/8x9gLPt1ZqcAtyVP3dwqKA9FtdHMn5pcy1TSS5iSSg=
697+
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.28.1 h1:ZcDYk4kjqZsw0zf4V4E3qIBemn1w2sS2xmq513tUlHA=
698+
github.com/stackitcloud/stackit-sdk-go/services/mariadb v0.28.1/go.mod h1:+vb1QGTPB1ot/se+MAkFUOxFAl7McSCJdjphtGWlzXc=
699699
github.com/stackitcloud/stackit-sdk-go/services/modelserving v0.8.1 h1:qBPfWK6Xpi7eYFAZCOR4H2wkJqZMRadfAbBdJ4Qrktk=
700700
github.com/stackitcloud/stackit-sdk-go/services/modelserving v0.8.1/go.mod h1:b8L6f68HZce01y+eZ1o7KTRAkgpWhggpvakAEwnxnCs=
701701
github.com/stackitcloud/stackit-sdk-go/services/mongodbflex v1.7.2 h1:ymhDgp6+RXBvmi9nugaVCi3MN0q2pC62SD+Nh5nTB84=
@@ -716,8 +716,8 @@ github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.20.0 h1:bT/qo
716716
github.com/stackitcloud/stackit-sdk-go/services/resourcemanager v0.20.0/go.mod h1:jiPIzF8lcm5Dx0TkDK2CBgeRBHSRUqwyX+z/zqo1bes=
717717
github.com/stackitcloud/stackit-sdk-go/services/scf v0.7.0 h1:ip9BODkeeDXB5Y2i5pfyIBX+VMmfUWlfIMvdQJitZyg=
718718
github.com/stackitcloud/stackit-sdk-go/services/scf v0.7.0/go.mod h1:JuJbNkydnm1OFGiRweiLyOUqR6prSOveJC14b1oG+Ok=
719-
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3 h1:3hZSg3z+4AXa5LbR2Vl38VmSA83ABItE63E53LuyWv8=
720-
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.14.3/go.mod h1:5unx5r0IgeFCtJDEgsWddtgKvYSw442FDNdhtfyJnQI=
719+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.17.0 h1:6gDKTxdPzabtJ4cPzNgCgsT2+z8v80DSCx476HqzaXk=
720+
github.com/stackitcloud/stackit-sdk-go/services/secretsmanager v0.17.0/go.mod h1:vSWUMTsMbtniEo1I+eCsjCOTODR4iproNAeqG3vr/4I=
721721
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.3.8 h1:LLyANBzE8sQa0/49tQBqq4sVLhNgwdqCeQm76srJHWw=
722722
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.3.8/go.mod h1:/bmg57XZu+bGczzcoumrukiGMPGzI2mOyTT4BVIQUBs=
723723
github.com/stackitcloud/stackit-sdk-go/services/serverbackup v1.6.0 h1:OGAaEbuoxTZnsWbtFmhkvdvCCV/RpYuE3ALQXmRyOOc=

stackit/internal/services/secretsmanager/instance/datasource.go

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -18,7 +18,7 @@ import (
1818
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/validate"
1919

2020
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
21-
"github.com/stackitcloud/stackit-sdk-go/services/secretsmanager"
21+
secretsmanager "github.com/stackitcloud/stackit-sdk-go/services/secretsmanager/v1api"
2222
)
2323

2424
// Ensure the implementation satisfies the expected interfaces.
@@ -146,7 +146,7 @@ func (r *instanceDataSource) Read(ctx context.Context, req datasource.ReadReques
146146
ctx = tflog.SetField(ctx, "project_id", projectId)
147147
ctx = tflog.SetField(ctx, "instance_id", instanceId)
148148

149-
instanceResp, err := r.client.GetInstance(ctx, projectId, instanceId).Execute()
149+
instanceResp, err := r.client.DefaultAPI.GetInstance(ctx, projectId, instanceId).Execute()
150150
if err != nil {
151151
utils.LogError(
152152
ctx,
@@ -164,7 +164,7 @@ func (r *instanceDataSource) Read(ctx context.Context, req datasource.ReadReques
164164

165165
ctx = core.LogResponse(ctx)
166166

167-
aclList, err := r.client.ListACLs(ctx, projectId, instanceId).Execute()
167+
aclList, err := r.client.DefaultAPI.ListACLs(ctx, projectId, instanceId).Execute()
168168
if err != nil {
169169
core.LogAndAddError(ctx, &resp.Diagnostics, "Error reading instance", fmt.Sprintf("Calling API for ACLs data: %v", err))
170170
return

stackit/internal/services/secretsmanager/instance/resource.go

Lines changed: 38 additions & 38 deletions
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ import (
2626
"github.com/hashicorp/terraform-plugin-framework/resource/schema/stringplanmodifier"
2727
"github.com/hashicorp/terraform-plugin-framework/types"
2828
"github.com/stackitcloud/stackit-sdk-go/core/oapierror"
29-
"github.com/stackitcloud/stackit-sdk-go/services/secretsmanager"
29+
secretsmanager "github.com/stackitcloud/stackit-sdk-go/services/secretsmanager/v1api"
3030
)
3131

3232
// Ensure the implementation satisfies the expected interfaces.
@@ -204,19 +204,19 @@ func (r *instanceResource) Create(ctx context.Context, req resource.CreateReques
204204
return
205205
}
206206
// Create new instance
207-
createResp, err := r.client.CreateInstance(ctx, projectId).CreateInstancePayload(*payload).Execute()
207+
createResp, err := r.client.DefaultAPI.CreateInstance(ctx, projectId).CreateInstancePayload(*payload).Execute()
208208
if err != nil {
209209
core.LogAndAddError(ctx, &resp.Diagnostics, "Error creating instance", fmt.Sprintf("Calling API: %v", err))
210210
return
211211
}
212212

213213
ctx = core.LogResponse(ctx)
214214

215-
if createResp.Id == nil {
215+
if createResp.Id == "" {
216216
core.LogAndAddError(ctx, &resp.Diagnostics, "Error creating instance", "Got empty instance id")
217217
return
218218
}
219-
instanceId := *createResp.Id
219+
instanceId := createResp.Id
220220
ctx = utils.SetAndLogStateFields(ctx, &resp.Diagnostics, &resp.State, map[string]any{
221221
"project_id": projectId,
222222
"instance_id": instanceId,
@@ -228,7 +228,7 @@ func (r *instanceResource) Create(ctx context.Context, req resource.CreateReques
228228
core.LogAndAddError(ctx, &resp.Diagnostics, "Error creating instance", fmt.Sprintf("Creating ACLs: %v", err))
229229
return
230230
}
231-
aclList, err := r.client.ListACLs(ctx, projectId, instanceId).Execute()
231+
aclList, err := r.client.DefaultAPI.ListACLs(ctx, projectId, instanceId).Execute()
232232
if err != nil {
233233
core.LogAndAddError(ctx, &resp.Diagnostics, "Error creating instance", fmt.Sprintf("Calling API for ACLs data: %v", err))
234234
return
@@ -266,7 +266,7 @@ func (r *instanceResource) Read(ctx context.Context, req resource.ReadRequest, r
266266
ctx = tflog.SetField(ctx, "project_id", projectId)
267267
ctx = tflog.SetField(ctx, "instance_id", instanceId)
268268

269-
instanceResp, err := r.client.GetInstance(ctx, projectId, instanceId).Execute()
269+
instanceResp, err := r.client.DefaultAPI.GetInstance(ctx, projectId, instanceId).Execute()
270270
if err != nil {
271271
oapiErr, ok := err.(*oapierror.GenericOpenAPIError) //nolint:errorlint //complaining that error.As should be used to catch wrapped errors, but this error should not be wrapped
272272
if ok && oapiErr.StatusCode == http.StatusNotFound {
@@ -279,7 +279,7 @@ func (r *instanceResource) Read(ctx context.Context, req resource.ReadRequest, r
279279

280280
ctx = core.LogResponse(ctx)
281281

282-
aclList, err := r.client.ListACLs(ctx, projectId, instanceId).Execute()
282+
aclList, err := r.client.DefaultAPI.ListACLs(ctx, projectId, instanceId).Execute()
283283
if err != nil {
284284
core.LogAndAddError(ctx, &resp.Diagnostics, "Error reading instance", fmt.Sprintf("Calling API for ACLs data: %v", err))
285285
return
@@ -324,7 +324,7 @@ func (r *instanceResource) Update(ctx context.Context, req resource.UpdateReques
324324
return
325325
}
326326
// Update instance
327-
err = r.client.UpdateInstance(ctx, projectId, instanceId).UpdateInstancePayload(*payload).Execute()
327+
err = r.client.DefaultAPI.UpdateInstance(ctx, projectId, instanceId).UpdateInstancePayload(*payload).Execute()
328328
if err != nil {
329329
core.LogAndAddError(ctx, &resp.Diagnostics, "Error updating instance", fmt.Sprintf("Calling API: %v", err))
330330
return
@@ -348,15 +348,15 @@ func (r *instanceResource) Update(ctx context.Context, req resource.UpdateReques
348348
return
349349
}
350350

351-
instanceResp, err := r.client.GetInstance(ctx, projectId, instanceId).Execute()
351+
instanceResp, err := r.client.DefaultAPI.GetInstance(ctx, projectId, instanceId).Execute()
352352
if err != nil {
353353
core.LogAndAddError(ctx, &resp.Diagnostics, "Error updating instance acl", fmt.Sprintf("Calling API: %v", err))
354354
return
355355
}
356356

357357
ctx = core.LogResponse(ctx)
358358

359-
aclList, err := r.client.ListACLs(ctx, projectId, instanceId).Execute()
359+
aclList, err := r.client.DefaultAPI.ListACLs(ctx, projectId, instanceId).Execute()
360360
if err != nil {
361361
core.LogAndAddError(ctx, &resp.Diagnostics, "Error updating instance", fmt.Sprintf("Calling API for ACLs data: %v", err))
362362
return
@@ -395,7 +395,7 @@ func (r *instanceResource) Delete(ctx context.Context, req resource.DeleteReques
395395
ctx = tflog.SetField(ctx, "instance_id", instanceId)
396396

397397
// Delete existing instance
398-
err := r.client.DeleteInstance(ctx, projectId, instanceId).Execute()
398+
err := r.client.DefaultAPI.DeleteInstance(ctx, projectId, instanceId).Execute()
399399
if err != nil {
400400
core.LogAndAddError(ctx, &resp.Diagnostics, "Error deleting instance", fmt.Sprintf("Calling API: %v", err))
401401
return
@@ -436,22 +436,22 @@ func mapFields(instance *secretsmanager.Instance, aclList *secretsmanager.ListAC
436436
var instanceId string
437437
if model.InstanceId.ValueString() != "" {
438438
instanceId = model.InstanceId.ValueString()
439-
} else if instance.Id != nil {
440-
instanceId = *instance.Id
439+
} else if instance.Id != "" {
440+
instanceId = instance.Id
441441
} else {
442442
return fmt.Errorf("instance id not present")
443443
}
444444

445445
model.Id = utils.BuildInternalTerraformId(model.ProjectId.ValueString(), instanceId)
446446
model.InstanceId = types.StringValue(instanceId)
447-
model.Name = types.StringPointerValue(instance.Name)
447+
model.Name = types.StringValue(instance.Name)
448448

449449
if instance.KmsKey != nil {
450450
model.KmsKey = &KmsKeyModel{
451-
KeyId: types.StringPointerValue(instance.KmsKey.KeyId),
452-
KeyRingId: types.StringPointerValue(instance.KmsKey.KeyRingId),
453-
KeyVersion: types.Int64PointerValue(instance.KmsKey.KeyVersion),
454-
ServiceAccountEmail: types.StringPointerValue(instance.KmsKey.ServiceAccountEmail),
451+
KeyId: types.StringValue(instance.KmsKey.KeyId),
452+
KeyRingId: types.StringValue(instance.KmsKey.KeyRingId),
453+
KeyVersion: types.Int64Value(instance.KmsKey.KeyVersion),
454+
ServiceAccountEmail: types.StringValue(instance.KmsKey.ServiceAccountEmail),
455455
}
456456
}
457457

@@ -467,14 +467,14 @@ func mapACLs(aclList *secretsmanager.ListACLsResponse, model *Model) error {
467467
if aclList == nil {
468468
return fmt.Errorf("nil ACL list")
469469
}
470-
if aclList.Acls == nil || len(*aclList.Acls) == 0 {
470+
if len(aclList.Acls) == 0 {
471471
model.ACLs = types.SetNull(types.StringType)
472472
return nil
473473
}
474474

475475
acls := []attr.Value{}
476-
for _, acl := range *aclList.Acls {
477-
acls = append(acls, types.StringValue(*acl.Cidr))
476+
for _, acl := range aclList.Acls {
477+
acls = append(acls, types.StringValue(acl.Cidr))
478478
}
479479
aclsList, diags := types.SetValue(types.StringType, acls)
480480
if diags.HasError() {
@@ -489,15 +489,15 @@ func toCreatePayload(model *Model) (*secretsmanager.CreateInstancePayload, error
489489
return nil, fmt.Errorf("nil model")
490490
}
491491
payload := &secretsmanager.CreateInstancePayload{
492-
Name: conversion.StringValueToPointer(model.Name),
492+
Name: model.Name.ValueString(),
493493
}
494494

495495
if model.KmsKey != nil {
496496
payload.KmsKey = &secretsmanager.KmsKeyPayload{
497-
KeyId: conversion.StringValueToPointer(model.KmsKey.KeyId),
498-
KeyRingId: conversion.StringValueToPointer(model.KmsKey.KeyRingId),
499-
KeyVersion: conversion.Int64ValueToPointer(model.KmsKey.KeyVersion),
500-
ServiceAccountEmail: conversion.StringValueToPointer(model.KmsKey.ServiceAccountEmail),
497+
KeyId: model.KmsKey.KeyId.ValueString(),
498+
KeyRingId: model.KmsKey.KeyRingId.ValueString(),
499+
KeyVersion: model.KmsKey.KeyVersion.ValueInt64(),
500+
ServiceAccountEmail: model.KmsKey.ServiceAccountEmail.ValueString(),
501501
}
502502
}
503503

@@ -510,15 +510,15 @@ func toUpdatePayload(model *Model) (*secretsmanager.UpdateInstancePayload, error
510510
}
511511

512512
payload := &secretsmanager.UpdateInstancePayload{
513-
Name: conversion.StringValueToPointer(model.Name),
513+
Name: model.Name.ValueString(),
514514
}
515515

516516
if model.KmsKey != nil {
517517
payload.KmsKey = &secretsmanager.KmsKeyPayload{
518-
KeyId: conversion.StringValueToPointer(model.KmsKey.KeyId),
519-
KeyRingId: conversion.StringValueToPointer(model.KmsKey.KeyRingId),
520-
KeyVersion: conversion.Int64ValueToPointer(model.KmsKey.KeyVersion),
521-
ServiceAccountEmail: conversion.StringValueToPointer(model.KmsKey.ServiceAccountEmail),
518+
KeyId: model.KmsKey.KeyId.ValueString(),
519+
KeyRingId: model.KmsKey.KeyRingId.ValueString(),
520+
KeyVersion: model.KmsKey.KeyVersion.ValueInt64(),
521+
ServiceAccountEmail: model.KmsKey.ServiceAccountEmail.ValueString(),
522522
}
523523
}
524524

@@ -528,7 +528,7 @@ func toUpdatePayload(model *Model) (*secretsmanager.UpdateInstancePayload, error
528528
// updateACLs creates and deletes ACLs so that the instance's ACLs are the ones in the model
529529
func updateACLs(ctx context.Context, projectId, instanceId string, acls []string, client *secretsmanager.APIClient) error {
530530
// Get ACLs current state
531-
currentACLsResp, err := client.ListACLs(ctx, projectId, instanceId).Execute()
531+
currentACLsResp, err := client.DefaultAPI.ListACLs(ctx, projectId, instanceId).Execute()
532532
if err != nil {
533533
return fmt.Errorf("fetching current ACLs: %w", err)
534534
}
@@ -544,29 +544,29 @@ func updateACLs(ctx context.Context, projectId, instanceId string, acls []string
544544
isInModel: true,
545545
}
546546
}
547-
for _, acl := range *currentACLsResp.Acls {
548-
cidr := *acl.Cidr
547+
for _, acl := range currentACLsResp.Acls {
548+
cidr := acl.Cidr
549549
if _, ok := aclsState[cidr]; !ok {
550550
aclsState[cidr] = &aclState{}
551551
}
552552
aclsState[cidr].isCreated = true
553-
aclsState[cidr].id = *acl.Id
553+
aclsState[cidr].id = acl.Id
554554
}
555555

556556
// Create/delete ACLs
557557
for cidr, state := range aclsState {
558558
if state.isInModel && !state.isCreated {
559559
payload := secretsmanager.CreateACLPayload{
560-
Cidr: new(cidr),
560+
Cidr: cidr,
561561
}
562-
_, err := client.CreateACL(ctx, projectId, instanceId).CreateACLPayload(payload).Execute()
562+
_, err := client.DefaultAPI.CreateACL(ctx, projectId, instanceId).CreateACLPayload(payload).Execute()
563563
if err != nil {
564564
return fmt.Errorf("creating ACL '%v': %w", cidr, err)
565565
}
566566
}
567567

568568
if !state.isInModel && state.isCreated {
569-
err := client.DeleteACL(ctx, projectId, instanceId, state.id).Execute()
569+
err := client.DefaultAPI.DeleteACL(ctx, projectId, instanceId, state.id).Execute()
570570
if err != nil {
571571
return fmt.Errorf("deleting ACL '%v': %w", cidr, err)
572572
}

0 commit comments

Comments
 (0)