github.com/nathanielks/terraform@v0.6.1-0.20170509030759-13e1a62319dc/builtin/providers/vault/data_source_generic_secret.go (about)

     1  package vault
     2  
     3  import (
     4  	"encoding/json"
     5  	"fmt"
     6  	"log"
     7  	"time"
     8  
     9  	"github.com/hashicorp/terraform/helper/schema"
    10  
    11  	"github.com/hashicorp/vault/api"
    12  )
    13  
    14  func genericSecretDataSource() *schema.Resource {
    15  	return &schema.Resource{
    16  		Read: genericSecretDataSourceRead,
    17  
    18  		Schema: map[string]*schema.Schema{
    19  			"path": &schema.Schema{
    20  				Type:        schema.TypeString,
    21  				Required:    true,
    22  				Description: "Full path from which a secret will be read.",
    23  			},
    24  
    25  			"data_json": &schema.Schema{
    26  				Type:        schema.TypeString,
    27  				Computed:    true,
    28  				Description: "JSON-encoded secret data read from Vault.",
    29  			},
    30  
    31  			"data": &schema.Schema{
    32  				Type:        schema.TypeMap,
    33  				Computed:    true,
    34  				Description: "Map of strings read from Vault.",
    35  			},
    36  
    37  			"lease_id": &schema.Schema{
    38  				Type:        schema.TypeString,
    39  				Computed:    true,
    40  				Description: "Lease identifier assigned by vault.",
    41  			},
    42  
    43  			"lease_duration": &schema.Schema{
    44  				Type:        schema.TypeInt,
    45  				Computed:    true,
    46  				Description: "Lease duration in seconds relative to the time in lease_start_time.",
    47  			},
    48  
    49  			"lease_start_time": &schema.Schema{
    50  				Type:        schema.TypeString,
    51  				Computed:    true,
    52  				Description: "Time at which the lease was read, using the clock of the system where Terraform was running",
    53  			},
    54  
    55  			"lease_renewable": &schema.Schema{
    56  				Type:        schema.TypeBool,
    57  				Computed:    true,
    58  				Description: "True if the duration of this lease can be extended through renewal.",
    59  			},
    60  		},
    61  	}
    62  }
    63  
    64  func genericSecretDataSourceRead(d *schema.ResourceData, meta interface{}) error {
    65  	client := meta.(*api.Client)
    66  
    67  	path := d.Get("path").(string)
    68  
    69  	log.Printf("[DEBUG] Reading %s from Vault", path)
    70  	secret, err := client.Logical().Read(path)
    71  	if err != nil {
    72  		return fmt.Errorf("error reading from Vault: %s", err)
    73  	}
    74  
    75  	d.SetId(secret.RequestID)
    76  
    77  	// Ignoring error because this value came from JSON in the
    78  	// first place so no reason why it should fail to re-encode.
    79  	jsonDataBytes, _ := json.Marshal(secret.Data)
    80  	d.Set("data_json", string(jsonDataBytes))
    81  
    82  	// Since our "data" map can only contain string values, we
    83  	// will take strings from Data and write them in as-is,
    84  	// and write everything else in as a JSON serialization of
    85  	// whatever value we get so that complex types can be
    86  	// passed around and processed elsewhere if desired.
    87  	dataMap := map[string]string{}
    88  	for k, v := range secret.Data {
    89  		if vs, ok := v.(string); ok {
    90  			dataMap[k] = vs
    91  		} else {
    92  			// Again ignoring error because we know this value
    93  			// came from JSON in the first place and so must be valid.
    94  			vBytes, _ := json.Marshal(v)
    95  			dataMap[k] = string(vBytes)
    96  		}
    97  	}
    98  	d.Set("data", dataMap)
    99  
   100  	d.Set("lease_id", secret.LeaseID)
   101  	d.Set("lease_duration", secret.LeaseDuration)
   102  	d.Set("lease_start_time", time.Now().Format("RFC3339"))
   103  	d.Set("lease_renewable", secret.Renewable)
   104  
   105  	return nil
   106  }