Merge pull request #7611 from hashicorp/b-iam-policy-document-fixes

provider/aws: Fix data.aws_iam_policy_document IDs
This commit is contained in:
James Nugent 2016-07-13 12:21:11 -06:00 committed by GitHub
commit 30ff7df954
4 changed files with 25 additions and 16 deletions

View File

@ -24,20 +24,20 @@ func dataSourceAwsIamPolicyDocument() *schema.Resource {
Read: dataSourceAwsIamPolicyDocumentRead, Read: dataSourceAwsIamPolicyDocumentRead,
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
"id": &schema.Schema{ "policy_id": {
Type: schema.TypeString, Type: schema.TypeString,
Optional: true, Optional: true,
}, },
"statement": &schema.Schema{ "statement": {
Type: schema.TypeSet, Type: schema.TypeList,
Required: true, Required: true,
Elem: &schema.Resource{ Elem: &schema.Resource{
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
"id": &schema.Schema{ "sid": {
Type: schema.TypeString, Type: schema.TypeString,
Optional: true, Optional: true,
}, },
"effect": &schema.Schema{ "effect": {
Type: schema.TypeString, Type: schema.TypeString,
Optional: true, Optional: true,
Default: "Allow", Default: "Allow",
@ -48,20 +48,20 @@ func dataSourceAwsIamPolicyDocument() *schema.Resource {
"not_resources": setOfString, "not_resources": setOfString,
"principals": dataSourceAwsIamPolicyPrincipalSchema(), "principals": dataSourceAwsIamPolicyPrincipalSchema(),
"not_principals": dataSourceAwsIamPolicyPrincipalSchema(), "not_principals": dataSourceAwsIamPolicyPrincipalSchema(),
"condition": &schema.Schema{ "condition": {
Type: schema.TypeSet, Type: schema.TypeSet,
Optional: true, Optional: true,
Elem: &schema.Resource{ Elem: &schema.Resource{
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
"test": &schema.Schema{ "test": {
Type: schema.TypeString, Type: schema.TypeString,
Required: true, Required: true,
}, },
"variable": &schema.Schema{ "variable": {
Type: schema.TypeString, Type: schema.TypeString,
Required: true, Required: true,
}, },
"values": &schema.Schema{ "values": {
Type: schema.TypeSet, Type: schema.TypeSet,
Required: true, Required: true,
Elem: &schema.Schema{ Elem: &schema.Schema{
@ -74,7 +74,7 @@ func dataSourceAwsIamPolicyDocument() *schema.Resource {
}, },
}, },
}, },
"json": &schema.Schema{ "json": {
Type: schema.TypeString, Type: schema.TypeString,
Computed: true, Computed: true,
}, },
@ -87,11 +87,11 @@ func dataSourceAwsIamPolicyDocumentRead(d *schema.ResourceData, meta interface{}
Version: "2012-10-17", Version: "2012-10-17",
} }
if policyId, hasPolicyId := d.GetOk("id"); hasPolicyId { if policyId, hasPolicyId := d.GetOk("policy_id"); hasPolicyId {
doc.Id = policyId.(string) doc.Id = policyId.(string)
} }
var cfgStmts = d.Get("statement").(*schema.Set).List() var cfgStmts = d.Get("statement").([]interface{})
stmts := make([]*IAMPolicyStatement, len(cfgStmts)) stmts := make([]*IAMPolicyStatement, len(cfgStmts))
doc.Statements = stmts doc.Statements = stmts
for i, stmtI := range cfgStmts { for i, stmtI := range cfgStmts {
@ -100,6 +100,10 @@ func dataSourceAwsIamPolicyDocumentRead(d *schema.ResourceData, meta interface{}
Effect: cfgStmt["effect"].(string), Effect: cfgStmt["effect"].(string),
} }
if sid, ok := cfgStmt["sid"]; ok {
stmt.Sid = sid.(string)
}
if actions := cfgStmt["actions"].(*schema.Set).List(); len(actions) > 0 { if actions := cfgStmt["actions"].(*schema.Set).List(); len(actions) > 0 {
stmt.Actions = iamPolicyDecodeConfigStringList(actions) stmt.Actions = iamPolicyDecodeConfigStringList(actions)
} }

View File

@ -16,7 +16,7 @@ func TestAccAWSIAMPolicyDocument(t *testing.T) {
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ {
Config: testAccAWSIAMPolicyDocumentConfig, Config: testAccAWSIAMPolicyDocumentConfig,
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testAccCheckStateValue( testAccCheckStateValue(
@ -52,7 +52,9 @@ func testAccCheckStateValue(id, name, value string) resource.TestCheckFunc {
var testAccAWSIAMPolicyDocumentConfig = ` var testAccAWSIAMPolicyDocumentConfig = `
data "aws_iam_policy_document" "test" { data "aws_iam_policy_document" "test" {
policy_id = "policy_id"
statement { statement {
sid = "1"
actions = [ actions = [
"s3:ListAllMyBuckets", "s3:ListAllMyBuckets",
"s3:GetBucketLocation", "s3:GetBucketLocation",
@ -110,8 +112,10 @@ data "aws_iam_policy_document" "test" {
var testAccAWSIAMPolicyDocumentExpectedJSON = `{ var testAccAWSIAMPolicyDocumentExpectedJSON = `{
"Version": "2012-10-17", "Version": "2012-10-17",
"Id": "policy_id",
"Statement": [ "Statement": [
{ {
"Sid": "1",
"Effect": "Allow", "Effect": "Allow",
"Action": [ "Action": [
"s3:GetBucketLocation", "s3:GetBucketLocation",

View File

@ -5,8 +5,8 @@ import (
) )
type IAMPolicyDoc struct { type IAMPolicyDoc struct {
Id string `json:",omitempty"`
Version string `json:",omitempty"` Version string `json:",omitempty"`
Id string `json:",omitempty"`
Statements []*IAMPolicyStatement `json:"Statement"` Statements []*IAMPolicyStatement `json:"Statement"`
} }

View File

@ -17,6 +17,7 @@ such as the `aws_iam_policy` resource.
``` ```
data "aws_iam_policy_document" "example" { data "aws_iam_policy_document" "example" {
statement { statement {
sid = "1"
actions = [ actions = [
"s3:ListAllMyBuckets", "s3:ListAllMyBuckets",
"s3:GetBucketLocation", "s3:GetBucketLocation",
@ -71,14 +72,14 @@ valid to use literal JSON strings within your configuration, or to use the
The following arguments are supported: The following arguments are supported:
* `id` (Optional) - An ID for the policy document. * `policy_id` (Optional) - An ID for the policy document.
* `statement` (Required) - A nested configuration block (described below) * `statement` (Required) - A nested configuration block (described below)
configuring one *statement* to be included in the policy document. configuring one *statement* to be included in the policy document.
Each document configuration must have one or more `statement` blocks, which Each document configuration must have one or more `statement` blocks, which
each accept the following arguments: each accept the following arguments:
* `id` (Optional) - An ID for the policy statement. * `sid` (Optional) - An ID for the policy statement.
* `effect` (Optional) - Either "Allow" or "Deny", to specify whether this * `effect` (Optional) - Either "Allow" or "Deny", to specify whether this
statement allows or denies the given actions. The default is "Allow". statement allows or denies the given actions. The default is "Allow".
* `actions` (Optional) - A list of actions that this statement either allows * `actions` (Optional) - A list of actions that this statement either allows