Skip to content

Commit

Permalink
Add a new 'akeyless_target_windows' resource
Browse files Browse the repository at this point in the history
* Add a new 'akeyless_target_linked' resource

* Add a new 'akeyless_gateway_remote_access' resource

* Add a new 'akeyless_gateway_remote_access_rdp_recording' resource

* Added support for password type for 'akeyless_static_secret'

* Added support for many additional parameters for 'akeyless_pki_cert_issuer'

* Extended supported rule types for 'akeyless_role'
  • Loading branch information
eitan-kr authored Jan 7, 2025
1 parent 1ba9318 commit 9448fbd
Show file tree
Hide file tree
Showing 45 changed files with 2,196 additions and 75 deletions.
9 changes: 9 additions & 0 deletions akeyless/common/utils.go
Original file line number Diff line number Diff line change
Expand Up @@ -567,3 +567,12 @@ func ReadRotationEventInParam(expirationEvents []akeyless_api.NextAutoRotationEv
}
return expirationEventsList
}

var gatewayURL = os.Getenv("AKEYLESS_GATEWAY")

func IsLocalEnv() bool {
if gatewayURL == "http://localhost:8080/v2" || gatewayURL == "http://127.0.0.1:8080/v2" {
return true
}
return false
}
4 changes: 4 additions & 0 deletions akeyless/provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -74,6 +74,8 @@ func Provider() *schema.Provider {
"akeyless_gateway_log_forwarding_stdout": resourceGatewayUpdateLogForwardingStdout(),
"akeyless_gateway_log_forwarding_sumologic": resourceGatewayUpdateLogForwardingSumologic(),
"akeyless_gateway_log_forwarding_syslog": resourceGatewayUpdateLogForwardingSyslog(),
"akeyless_gateway_remote_access": resourceGatewayUpdateRemoteAccess(),
"akeyless_gateway_remote_access_rdp_recording": resourceGatewayUpdateRemoteAccessRdpRecording(),
"akeyless_producer_custom": resourceProducerCustom(),
"akeyless_producer_rdp": resourceProducerRdp(),
"akeyless_producer_mongo": resourceProducerMongo(),
Expand Down Expand Up @@ -138,9 +140,11 @@ func Provider() *schema.Provider {
"akeyless_target_gke": resourceGkeTarget(),
"akeyless_target_globalsign": resourceGlobalsignTarget(),
"akeyless_target_k8s": resourceK8sTarget(),
"akeyless_target_linked": resourceLinkedTarget(),
"akeyless_target_rabbit": resourceRabbitmqTarget(),
"akeyless_target_ssh": resourceSSHTarget(),
"akeyless_target_web": resourceWebTarget(),
"akeyless_target_windows": resourceWindowsTarget(),
"akeyless_target_zerossl": resourceZerosslTarget(),
"akeyless_k8s_auth_config": resourceK8sAuthConfig(),
"akeyless_associate_role_auth_method": resourceAssocRoleAm(),
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_artifactory_target.go
Original file line number Diff line number Diff line change
Expand Up @@ -85,9 +85,9 @@ func resourceArtifactoryTargetCreate(d *schema.ResourceData, m interface{}) erro
_, _, err := client.TargetCreateArtifactory(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Target: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Target: %v", err)
}

d.SetId(name)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_azure_ad.go
Original file line number Diff line number Diff line change
Expand Up @@ -208,9 +208,9 @@ func resourceAuthMethodAzureAdCreate(d *schema.ResourceData, m interface{}) erro
rOut, _, err := client.AuthMethodCreateAzureAD(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_gcp.go
Original file line number Diff line number Diff line change
Expand Up @@ -172,9 +172,9 @@ func resourceAuthMethodGcpCreate(d *schema.ResourceData, m interface{}) error {
rOut, _, err := client.AuthMethodCreateGcp(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_k8s.go
Original file line number Diff line number Diff line change
Expand Up @@ -161,9 +161,9 @@ func resourceAuthMethodK8sCreate(d *schema.ResourceData, m interface{}) error {
rOut, _, err := client.AuthMethodCreateK8s(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_oauth2.go
Original file line number Diff line number Diff line change
Expand Up @@ -149,9 +149,9 @@ func resourceAuthMethodOauth2Create(d *schema.ResourceData, m interface{}) error
rOut, _, err := client.AuthMethodCreateOauth2(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_oidc.go
Original file line number Diff line number Diff line change
Expand Up @@ -158,9 +158,9 @@ func resourceAuthMethodOidcCreate(d *schema.ResourceData, m interface{}) error {
rOut, _, err := client.AuthMethodCreateOIDC(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_saml.go
Original file line number Diff line number Diff line change
Expand Up @@ -135,9 +135,9 @@ func resourceAuthMethodSamlCreate(d *schema.ResourceData, m interface{}) error {
rOut, _, err := client.AuthMethodCreateSAML(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}

if rOut.AccessId != nil {
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_auth_method_universal_identity.go
Original file line number Diff line number Diff line change
Expand Up @@ -127,9 +127,9 @@ func resourceAuthMethodUniversalIdentityCreate(d *schema.ResourceData, m interfa
rOut, _, err := client.AuthMethodCreateUniversalIdentity(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Auth Method: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Auth Method: %v", err)
}
if rOut.AccessId != nil {
err = d.Set("access_id", *rOut.AccessId)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_aws_target.go
Original file line number Diff line number Diff line change
Expand Up @@ -99,9 +99,9 @@ func resourceAwsTargetCreate(d *schema.ResourceData, m interface{}) error {
_, _, err := client.TargetCreateAws(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Target: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Target: %v", err)
}

d.SetId(name)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_azure_target.go
Original file line number Diff line number Diff line change
Expand Up @@ -97,9 +97,9 @@ func resourceAzureTargetCreate(d *schema.ResourceData, m interface{}) error {
_, _, err := client.TargetCreateAzure(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Target: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Target: %v", err)
}

d.SetId(name)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_db_target.go
Original file line number Diff line number Diff line change
Expand Up @@ -191,9 +191,9 @@ func resourceDbTargetCreate(d *schema.ResourceData, m interface{}) error {
_, _, err := client.TargetCreateDB(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Target: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Target: %v", err)
}

d.SetId(name)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_eks_target.go
Original file line number Diff line number Diff line change
Expand Up @@ -118,9 +118,9 @@ func resourceEksTargetCreate(d *schema.ResourceData, m interface{}) error {
_, _, err := client.TargetCreateEks(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create Target: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create Target: %v", err)
}

d.SetId(name)
Expand Down
4 changes: 2 additions & 2 deletions akeyless/resource_gateway_create_k8s_auth_config.go
Original file line number Diff line number Diff line change
Expand Up @@ -163,9 +163,9 @@ func resourceK8sAuthConfigCreate(d *schema.ResourceData, m interface{}) error {
_, _, err := client.GatewayCreateK8SAuthConfig(ctx).Body(body).Execute()
if err != nil {
if errors.As(err, &apiErr) {
return fmt.Errorf("can't create Secret: %v", string(apiErr.Body()))
return fmt.Errorf("can't create K8S Auth Config: %v", string(apiErr.Body()))
}
return fmt.Errorf("can't create Secret: %v", err)
return fmt.Errorf("can't create K8S Auth Config: %v", err)
}

d.SetId(name)
Expand Down
Loading

0 comments on commit 9448fbd

Please sign in to comment.