Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add new resources to support AS2 #32203

Merged
merged 27 commits into from
Jun 28, 2023
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
27 commits
Select commit Hold shift + click to select a range
92e4d62
Add new resources to support AS2
Jun 24, 2023
bf213df
Fix Linting Issues
Jun 24, 2023
4e929c6
Fix SemGrep Errors
Jun 24, 2023
caaece1
Fix SemGrep Errors
Jun 24, 2023
56a6218
Fix code for new gen
Jun 24, 2023
354187e
Fix More Linting
Jun 24, 2023
38d2574
Merge branch 'main' into HEAD
ewbankkit Jun 27, 2023
4329792
Tweak CHANGELOG entry.
ewbankkit Jun 27, 2023
87a77c2
Correct CHANGELOG entry file name.
ewbankkit Jun 27, 2023
b5350c6
Merge branch 'main' into HEAD
ewbankkit Jun 28, 2023
1f4d548
r/aws_transfer_as2_certificate -> t/aws_transfer_certificate.
ewbankkit Jun 28, 2023
6eaf2ac
r/aws_transfer_as2_profile -> t/aws_transfer_profile.
ewbankkit Jun 28, 2023
e93af10
r/aws_transfer_as2_agreement -> t/aws_transfer_agreement.
ewbankkit Jun 28, 2023
76f1d4b
r/aws_transfer_as2_connector -> t/aws_transfer_connector.
ewbankkit Jun 28, 2023
5b8d92d
r/aws_transfer_certificate: 'description' can be updated.
ewbankkit Jun 28, 2023
2e8fd63
Add 'TestAccTransferCertificate_tags' and 'TestAccTransferCertificate…
ewbankkit Jun 28, 2023
d19fefc
r/aws_transfer_certificate: Use 'resource.ParallelTest'.
ewbankkit Jun 28, 2023
e053851
'FindAccessByServerIDAndExternalID' -> 'FindAccessByTwoPartKey'.
ewbankkit Jun 28, 2023
fa66638
r/aws_transfer_certificate: Correct acceptance test configuration fun…
ewbankkit Jun 28, 2023
928b260
Add 'TestAccTransferProfile_certificateIDs' and 'TestAccTransferProfi…
ewbankkit Jun 28, 2023
8b78745
r/aws_transfer_certificate: Don't use 'd.GetOk' for Required attribut…
ewbankkit Jun 28, 2023
50e1d9e
r/aws_transfer_profile: Don't use 'd.GetOk' for Required attributes i…
ewbankkit Jun 28, 2023
5b78d55
r/aws_transfer_certificate: Correct acceptance test configuration fun…
ewbankkit Jun 28, 2023
3f18082
r/aws_transfer_profile: Correct acceptance test configuration functio…
ewbankkit Jun 28, 2023
6c2c016
r/aws_transfer_agreement: 'serverid' -> 'server_id'.
ewbankkit Jun 28, 2023
08234ba
r/aws_transfer_agreement: Serialize acceptance tests.
ewbankkit Jun 28, 2023
3af44a0
Add 'TestAccTransferConnector_tags'.
ewbankkit Jun 28, 2023
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
15 changes: 15 additions & 0 deletions .changelog/32203.txt
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
```release-note:new-resource
aws_transfer_profile
```

```release-note:new-resource
aws_transfer_certificate
```

```release-note:new-resource
aws_transfer_agreement
```

```release-note:new-resource
aws_transfer_connector
```
2 changes: 1 addition & 1 deletion internal/service/transfer/access.go
Original file line number Diff line number Diff line change
Expand Up @@ -185,7 +185,7 @@ func resourceAccessRead(ctx context.Context, d *schema.ResourceData, meta interf
return sdkdiag.AppendErrorf(diags, "parsing Transfer Access ID: %s", err)
}

access, err := FindAccessByServerIDAndExternalID(ctx, conn, serverID, externalID)
access, err := FindAccessByTwoPartKey(ctx, conn, serverID, externalID)

if !d.IsNewResource() && tfresource.NotFound(err) {
log.Printf("[WARN] Transfer Access (%s) not found, removing from state", d.Id())
Expand Down
4 changes: 2 additions & 2 deletions internal/service/transfer/access_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -184,7 +184,7 @@ func testAccCheckAccessExists(ctx context.Context, n string, v *transfer.Describ

conn := acctest.Provider.Meta().(*conns.AWSClient).TransferConn(ctx)

output, err := tftransfer.FindAccessByServerIDAndExternalID(ctx, conn, serverID, externalID)
output, err := tftransfer.FindAccessByTwoPartKey(ctx, conn, serverID, externalID)

if err != nil {
return err
Expand All @@ -210,7 +210,7 @@ func testAccCheckAccessDestroy(ctx context.Context) resource.TestCheckFunc {
if err != nil {
return fmt.Errorf("error parsing Transfer Access ID: %w", err)
}
_, err = tftransfer.FindAccessByServerIDAndExternalID(ctx, conn, serverID, externalID)
_, err = tftransfer.FindAccessByTwoPartKey(ctx, conn, serverID, externalID)

if tfresource.NotFound(err) {
continue
Expand Down
207 changes: 207 additions & 0 deletions internal/service/transfer/agreement.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,207 @@
package transfer

import (
"context"
"log"

"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/transfer"
"github.com/hashicorp/aws-sdk-go-base/v2/awsv1shim/v2/tfawserr"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-provider-aws/internal/conns"
"github.com/hashicorp/terraform-provider-aws/internal/errs/sdkdiag"
tftags "github.com/hashicorp/terraform-provider-aws/internal/tags"
"github.com/hashicorp/terraform-provider-aws/internal/tfresource"
"github.com/hashicorp/terraform-provider-aws/internal/verify"
"github.com/hashicorp/terraform-provider-aws/names"
)

// @SDKResource("aws_transfer_agreement", name="Agreement")
// @Tags(identifierAttribute="agreement_id")
func ResourceAgreement() *schema.Resource {
return &schema.Resource{
CreateWithoutTimeout: resourceAgreementCreate,
ReadWithoutTimeout: resourceAgreementRead,
UpdateWithoutTimeout: resourceAgreementUpdate,
DeleteWithoutTimeout: resourceAgreementDelete,

Importer: &schema.ResourceImporter{
StateContext: schema.ImportStatePassthroughContext,
},

Schema: map[string]*schema.Schema{
"access_role": {
Type: schema.TypeString,
Required: true,
ValidateFunc: verify.ValidARN,
},
"agreement_id": {
Type: schema.TypeString,
Computed: true,
},
"base_directory": {
Type: schema.TypeString,
Required: true,
},
"description": {
Type: schema.TypeString,
Optional: true,
},
"local_profile_id": {
Type: schema.TypeString,
Required: true,
},
"partner_profile_id": {
Type: schema.TypeString,
Required: true,
},
"server_id": {
Type: schema.TypeString,
Required: true,
},
"status": {
Type: schema.TypeString,
Computed: true,
},
names.AttrTags: tftags.TagsSchema(),
names.AttrTagsAll: tftags.TagsSchemaComputed(),
},
CustomizeDiff: verify.SetTagsDiff,
}
}

func resourceAgreementCreate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
var diags diag.Diagnostics
conn := meta.(*conns.AWSClient).TransferConn(ctx)

serverID := d.Get("server_id").(string)
input := &transfer.CreateAgreementInput{
AccessRole: aws.String(d.Get("access_role").(string)),
BaseDirectory: aws.String(d.Get("base_directory").(string)),
LocalProfileId: aws.String(d.Get("local_profile_id").(string)),
PartnerProfileId: aws.String(d.Get("partner_profile_id").(string)),
ServerId: aws.String(serverID),
Tags: getTagsIn(ctx),
}

if v, ok := d.GetOk("description"); ok {
input.Description = aws.String(v.(string))
}

output, err := conn.CreateAgreementWithContext(ctx, input)

if err != nil {
return sdkdiag.AppendErrorf(diags, "creating Transfer Agreement: %s", err)
}

d.SetId(AgreementCreateResourceID(serverID, aws.StringValue(output.AgreementId)))

return append(diags, resourceAgreementRead(ctx, d, meta)...)
}

func resourceAgreementRead(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
var diags diag.Diagnostics
conn := meta.(*conns.AWSClient).TransferConn(ctx)

serverID, agreementID, err := AgreementParseResourceID(d.Id())
if err != nil {
return sdkdiag.AppendFromErr(diags, err)
}

output, err := FindAgreementByTwoPartKey(ctx, conn, serverID, agreementID)

if !d.IsNewResource() && tfresource.NotFound(err) {
log.Printf("[WARN] Transfer Agreement (%s) not found, removing from state", d.Id())
d.SetId("")
return diags
}

if err != nil {
return sdkdiag.AppendErrorf(diags, "reading Transfer Agreement (%s): %s", d.Id(), err)
}

d.Set("access_role", output.AccessRole)
d.Set("agreement_id", output.AgreementId)
d.Set("base_directory", output.BaseDirectory)
d.Set("description", output.Description)
d.Set("local_profile_id", output.LocalProfileId)
d.Set("partner_profile_id", output.PartnerProfileId)
d.Set("server_id", output.ServerId)
d.Set("status", output.Status)
setTagsOut(ctx, output.Tags)

return diags
}

func resourceAgreementUpdate(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
var diags diag.Diagnostics
conn := meta.(*conns.AWSClient).TransferConn(ctx)

serverID, agreementID, err := AgreementParseResourceID(d.Id())
if err != nil {
return sdkdiag.AppendFromErr(diags, err)
}

if d.HasChangesExcept("tags", "tags_all") {
input := &transfer.UpdateAgreementInput{
AgreementId: aws.String(agreementID),
ServerId: aws.String(serverID),
}

if d.HasChange("access_role") {
input.AccessRole = aws.String(d.Get("access_role").(string))
}

if d.HasChange("base_directory") {
input.BaseDirectory = aws.String(d.Get("base_directory").(string))
}

if d.HasChange("description") {
input.Description = aws.String(d.Get("description").(string))
}

if d.HasChange("local_profile_id") {
input.LocalProfileId = aws.String(d.Get("local_profile_id").(string))
}

if d.HasChange("partner_profile_id") {
input.PartnerProfileId = aws.String(d.Get("partner_profile_id").(string))
}

_, err := conn.UpdateAgreementWithContext(ctx, input)

if err != nil {
return sdkdiag.AppendErrorf(diags, "updating Transfer Agreement (%s): %s", d.Id(), err)
}
}

return append(diags, resourceAgreementRead(ctx, d, meta)...)
}

func resourceAgreementDelete(ctx context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
var diags diag.Diagnostics
conn := meta.(*conns.AWSClient).TransferConn(ctx)

serverID, agreementID, err := AgreementParseResourceID(d.Id())

if err != nil {
return sdkdiag.AppendFromErr(diags, err)
}

log.Printf("[DEBUG] Deleting Transfer Agreement: %s", d.Id())
_, err = conn.DeleteAgreementWithContext(ctx, &transfer.DeleteAgreementInput{
AgreementId: aws.String(agreementID),
ServerId: aws.String(serverID),
})

if tfawserr.ErrCodeEquals(err, transfer.ErrCodeResourceNotFoundException) {
return diags
}

if err != nil {
return sdkdiag.AppendErrorf(diags, "deleting Transfer Agreement (%s): %s", d.Id(), err)
}

return diags
}
Loading