Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
77 commits
Select commit Hold shift + click to select a range
317590f
SC addition
Nov 15, 2023
babc0f9
SC addition
Nov 15, 2023
8071667
SC addition
Nov 15, 2023
60abaf9
update function updated
Nov 19, 2023
8477dde
SC unit tests added
Nov 22, 2023
2f38ba5
Merge branch 'IBM-Cloud:master' into master
yonatanyell Nov 22, 2023
972a9b9
SC unit tests added
Nov 28, 2023
59c5e72
d
Dec 6, 2023
2ff98ad
tests fixes
Dec 6, 2023
b9e8416
Merge remote-tracking branch 'origin/master'
Dec 6, 2023
40ea122
tests fixes
Dec 6, 2023
f3a195f
update sdk
TatyanaBol Dec 11, 2023
8fa09ae
.secrets.baseline update
Dec 11, 2023
a6b779c
.secrets.baseline update
Dec 11, 2023
1f1e01a
Merge branch 'master' into master
yonatanyell Dec 11, 2023
cea9bd4
.secrets.baseline update
Dec 11, 2023
0d333f9
Merge remote-tracking branch 'origin/master'
Dec 11, 2023
ad75820
Update sm_service_credentials_secret_metadata.html.markdown
IdanAdar Dec 13, 2023
5ece471
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Dec 26, 2023
e91f429
bugs fixes
Dec 26, 2023
c44ff91
bugs fixes
Dec 26, 2023
74626d8
bugs fixes
Dec 26, 2023
bd730d7
Merge branch 'master' into master
yonatanyell Dec 28, 2023
fbf61c6
docs bugs fixes
Jan 3, 2024
fbc7294
Merge remote-tracking branch 'origin/master'
Jan 3, 2024
25f8094
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jan 3, 2024
e63a564
preferred_chain added for public cert lets encrypt configuration
Jan 15, 2024
daa771b
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jan 15, 2024
ef612d9
support for creating secret version for username password & version_c…
Jan 15, 2024
6e7b866
Merge remote-tracking branch 'origin/master'
Jan 15, 2024
3bb189a
support for creating secret version for username password & version_c…
Jan 15, 2024
47ea09c
support for creating secret version for username password & version_c…
Jan 17, 2024
27241e5
support for creating secret version for username password & version_c…
Jan 17, 2024
c1ca0e7
support for creating secret version for username password & version_c…
Jan 17, 2024
988d3df
support for creating secret version for username password & version_c…
Jan 17, 2024
fd3a343
Merge branch 'master' into master
yonatanyell Jan 21, 2024
61de984
preferred chain docs update
Jan 29, 2024
64e35ee
Merge remote-tracking branch 'origin/master'
Jan 29, 2024
4ca06c6
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Jan 29, 2024
5396f65
support for creating secret version for username password & version_c…
Jan 29, 2024
1ea2493
support for creating secret version for username password & version_c…
Jan 29, 2024
1a16c08
support for creating secret version for username password & version_c…
Jan 29, 2024
86af4c0
fix public cert bug
Jan 29, 2024
612ec12
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Mar 26, 2024
b16e9f3
update docs
Mar 27, 2024
4a901a7
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 6, 2024
446af33
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 15, 2024
b6b7929
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 20, 2024
a1b39ba
reordering bug in alt_names
May 20, 2024
3af4490
name regex fix in docs
May 22, 2024
6b01f8b
Merge branch 'IBM-Cloud:master' into master
yonatanyell May 22, 2024
edde88e
imported cert bug fix
May 27, 2024
c6f5e63
Merge branch 'master' into master
yonatanyell May 27, 2024
bcf6e76
crypto_key addition
Jul 21, 2024
85ab27f
crypto_key addition
Jul 29, 2024
34d9371
crypto_key addition
Aug 6, 2024
11133eb
Merge branch 'IBM-Cloud:master' into master
yonatanyell Aug 6, 2024
1f27098
crypto_key addition
Aug 6, 2024
6f8fe14
rejections fixes
Aug 12, 2024
4670c91
rejections fixes
Aug 13, 2024
c8972f5
rejections fixes
Aug 13, 2024
9b77d30
rejections fixes
Aug 13, 2024
7fe57d1
rejections fixes
Aug 13, 2024
5c6ca94
test label name changed
Aug 19, 2024
d1864d7
test label name changed
Aug 19, 2024
90e5cfb
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Aug 19, 2024
c572d55
error formating update
Sep 2, 2024
98f3c74
Merge branch 'IBM-Cloud:master' into master
yonatanyell Sep 2, 2024
eb913ca
go sdk version update
Sep 11, 2024
ec2478c
Merge remote-tracking branch 'origin/master'
Sep 11, 2024
02228a9
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Oct 28, 2024
7f9bdc6
Merge branch 'master' of github.com:yonatanyell/terraform-provider-ibm
Dec 9, 2024
7e847b8
update docs & descriptions for uuid
Dec 9, 2024
ee67658
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jun 17, 2025
860b06b
Merge branch 'IBM-Cloud:master' into master
yonatanyell Jul 14, 2025
3314267
update docs - nested JSONs and docs fixes
Jul 14, 2025
3fb224e
casting error handling - data sources
Jul 21, 2025
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 1 addition & 1 deletion examples/ibm-secrets-manager/README.md
Original file line number Diff line number Diff line change
Expand Up @@ -560,7 +560,7 @@ data "sm_en_registration" "sm_en_registration_instance" {
| certificate | The PEM-encoded contents of your certificate. | `string` | false |
| intermediate | (Optional) The PEM-encoded intermediate certificate to associate with the root certificate. | `string` | false |
| private_key | (Optional) The PEM-encoded private key to associate with the certificate. | `string` | false |
| custom_metadata | The secret metadata that a user can customize. | `map()` | false |
| version_custom_metadata | The custom metadata of the current secret version. | `map()` | false |
| rotation | Determines whether Secrets Manager rotates your secrets automatically. | `` | false |
| source_service | The properties required for creating the service credentials for the specified source service instance. | `` | false |
| data | The payload data of a key-value secret. | `map()` | false |
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -136,7 +136,11 @@ func dataSourceIbmSmArbitrarySecretRead(context context.Context, d *schema.Resou
return diagError
}

arbitrarySecret := secret.(*secretsmanagerv2.ArbitrarySecret)
arbitrarySecret, ok := secret.(*secretsmanagerv2.ArbitrarySecret)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an Arbitrary secret."), fmt.Sprintf("(Data) %s", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}
d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *arbitrarySecret.ID))

var err error
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -139,7 +139,11 @@ func dataSourceIbmSmArbitrarySecretMetadataRead(context context.Context, d *sche
return tfErr.GetDiag()
}

arbitrarySecretMetadata := arbitrarySecretMetadataIntf.(*secretsmanagerv2.ArbitrarySecretMetadata)
arbitrarySecretMetadata, ok := arbitrarySecretMetadataIntf.(*secretsmanagerv2.ArbitrarySecretMetadata)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an Arbitrary secret."), fmt.Sprintf("(Data) %s_metadata", ArbitrarySecretResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -157,7 +157,11 @@ func dataSourceIbmSmCustomCredentialsConfigurationRead(context context.Context,
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetConfigurationWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s", CustomCredentialsConfigResourceName), "read")
return tfErr.GetDiag()
}
config := configIntf.(*secretsmanagerv2.CustomCredentialsConfiguration)
config, ok := configIntf.(*secretsmanagerv2.CustomCredentialsConfiguration)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong configuration type: The provided configuration is not a Custom Credentials configuration."), fmt.Sprintf("(Data) %s", CustomCredentialsConfigResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *getConfigurationOptions.Name))

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -235,7 +235,11 @@ func dataSourceIbmSmCustomCredentialsSecretRead(context context.Context, d *sche
return diagError
}

customCredentialsSecret := secret.(*secretsmanagerv2.CustomCredentialsSecret)
customCredentialsSecret, ok := secret.(*secretsmanagerv2.CustomCredentialsSecret)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not a Custom Credentials secret."), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *customCredentialsSecret.ID))

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -219,27 +219,31 @@ func dataSourceIbmSmCustomCredentialsSecretMetadataRead(context context.Context,
return tfErr.GetDiag()
}

metadata := secretMetadataIntf.(*secretsmanagerv2.CustomCredentialsSecretMetadata)
metadata, ok := secretMetadataIntf.(*secretsmanagerv2.CustomCredentialsSecretMetadata)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not a Custom Credentials secret."), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))

if err = d.Set("region", region); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting region"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("created_by", metadata.CreatedBy); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_by"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("created_at", DateTimeToRFC3339(metadata.CreatedAt)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting created_at"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("crn", metadata.Crn); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting crn"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

Expand All @@ -250,110 +254,110 @@ func dataSourceIbmSmCustomCredentialsSecretMetadataRead(context context.Context,
}

if err = d.Set("custom_metadata", flex.Flatten(convertedMap)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}
if err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting custom_metadata"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}
}

if err = d.Set("description", metadata.Description); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting description"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("configuration", metadata.Configuration); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting configuration"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting configuration"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("downloaded", metadata.Downloaded); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting downloaded"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("locks_total", flex.IntValue(metadata.LocksTotal)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting locks_total"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("name", metadata.Name); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting name"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_group_id", metadata.SecretGroupID); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_group_id"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("secret_type", metadata.SecretType); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting secret_type"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state", flex.IntValue(metadata.State)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("state_description", metadata.StateDescription); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting state_description"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("ttl", metadata.TTL); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting ttl"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting ttl"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("updated_at", DateTimeToRFC3339(metadata.UpdatedAt)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting updated_at"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("versions_total", flex.IntValue(metadata.VersionsTotal)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting versions_total"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

rotation := []map[string]interface{}{}
if metadata.Rotation != nil {
modelMap, err := customCredentialsSecretRotationPolicyToMap(metadata.Rotation)
if err != nil {
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}
rotation = append(rotation, modelMap)
}
if err = d.Set("rotation", rotation); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting rotation"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting rotation"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

parameters := []map[string]interface{}{}
if metadata.Parameters != nil {
modelMap, err := customCredentialsSecretFieldsToMap(metadata.Parameters)
if err != nil {
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, "", fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}
parameters = append(parameters, modelMap)
}
if err = d.Set("parameters", parameters); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting parameters"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting parameters"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("expiration_date", DateTimeToRFC3339(metadata.ExpirationDate)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting expiration_date"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

if err = d.Set("next_rotation_date", DateTimeToRFC3339(metadata.NextRotationDate)); err != nil {
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting next_rotation_date"), fmt.Sprintf("(Data) %s", CustomCredentialsSecretResourceName), "read")
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("Error setting next_rotation_date"), fmt.Sprintf("(Data) %s_metadata", CustomCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -87,7 +87,12 @@ func dataSourceIbmSmIamCredentialsConfigurationRead(context context.Context, d *
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetConfigurationWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s", IAMCredentialsConfigResourceName), "read")
return tfErr.GetDiag()
}
iAMCredentialsConfiguration := iAMCredentialsConfigurationIntf.(*secretsmanagerv2.IAMCredentialsConfiguration)

iAMCredentialsConfiguration, ok := iAMCredentialsConfigurationIntf.(*secretsmanagerv2.IAMCredentialsConfiguration)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong configuration type: The provided configuration is not an IAM Credentials configuration."), fmt.Sprintf("(Data) %s", IAMCredentialsConfigResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *getConfigurationOptions.Name))

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,12 @@ func dataSourceIbmSmIamCredentialsSecretRead(context context.Context, d *schema.
return diagError
}

iAMCredentialsSecret := iAMCredentialsSecretIntf.(*secretsmanagerv2.IAMCredentialsSecret)
iAMCredentialsSecret, ok := iAMCredentialsSecretIntf.(*secretsmanagerv2.IAMCredentialsSecret)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an IAM Credentials secret."), fmt.Sprintf("(Data) %s", IAMCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, *iAMCredentialsSecret.ID))

var err error
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -205,7 +205,12 @@ func dataSourceIbmSmIamCredentialsSecretMetadataRead(context context.Context, d
tfErr := flex.TerraformErrorf(err, fmt.Sprintf("GetSecretMetadataWithContext failed %s\n%s", err, response), fmt.Sprintf("(Data) %s_metadata", IAMCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}
iAMCredentialsSecretMetadata := iAMCredentialsSecretMetadataIntf.(*secretsmanagerv2.IAMCredentialsSecretMetadata)

iAMCredentialsSecretMetadata, ok := iAMCredentialsSecretMetadataIntf.(*secretsmanagerv2.IAMCredentialsSecretMetadata)
if !ok {
tfErr := flex.TerraformErrorf(nil, fmt.Sprintf("Wrong secret type: The provided secret is not an IAM Credentials secret."), fmt.Sprintf("(Data) %s_metadata", IAMCredentialsSecretResourceName), "read")
return tfErr.GetDiag()
}

d.SetId(fmt.Sprintf("%s/%s/%s", region, instanceId, secretId))

Expand Down
Loading
Loading