Documentation ¶
Index ¶
- Constants
- func New() datasource.DataSource
- type AccountRolePolicies
- type OcmPoliciesDataSource
- func (s *OcmPoliciesDataSource) Configure(ctx context.Context, req datasource.ConfigureRequest, ...)
- func (s *OcmPoliciesDataSource) Metadata(ctx context.Context, req datasource.MetadataRequest, ...)
- func (s *OcmPoliciesDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse)
- func (s *OcmPoliciesDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, ...)
- type OcmPoliciesState
- type OperatorRolePolicies
Constants ¶
View Source
const ( // Policy IDs from type operator roles ImageRegistry = "openshift_hcp_image_registry_installer_cloud_credentials_policy" IngressOperator = "openshift_hcp_ingress_operator_cloud_credentials_policy" ClusterCSI = "openshift_hcp_cluster_csi_drivers_ebs_cloud_credentials_policy" CloudNetwork = "openshift_hcp_cloud_network_config_controller_cloud_credentials_policy" KubeControllerManagerKubeSystem = "openshift_hcp_kube_controller_manager_credentials_policy" CapaControllerManagerKubeSystem = "openshift_hcp_capa_controller_manager_credentials_policy" ControlPlaneOperatorKubeSystem = "openshift_hcp_control_plane_operator_credentials_policy" KmsProviderKubeSystem = "openshift_hcp_kms_provider_credentials_policy" // Policy IDs from type account roles Installer = "sts_hcp_installer_permission_policy" Support = "sts_hcp_support_permission_policy" SupportRhSreRole = "sts_support_rh_sre_role" InstanceWorker = "sts_hcp_instance_worker_permission_policy" )
Variables ¶
This section is empty.
Functions ¶
func New ¶
func New() datasource.DataSource
Types ¶
type AccountRolePolicies ¶
type AccountRolePolicies struct { Installer types.String `tfsdk:"sts_hcp_installer_permission_policy"` Support types.String `tfsdk:"sts_hcp_support_permission_policy"` SupportRhSreRole types.String `tfsdk:"sts_support_rh_sre_role"` InstanceWorker types.String `tfsdk:"sts_hcp_instance_worker_permission_policy"` }
type OcmPoliciesDataSource ¶
type OcmPoliciesDataSource struct {
// contains filtered or unexported fields
}
func (*OcmPoliciesDataSource) Configure ¶
func (s *OcmPoliciesDataSource) Configure(ctx context.Context, req datasource.ConfigureRequest, resp *datasource.ConfigureResponse)
func (*OcmPoliciesDataSource) Metadata ¶
func (s *OcmPoliciesDataSource) Metadata(ctx context.Context, req datasource.MetadataRequest, resp *datasource.MetadataResponse)
func (*OcmPoliciesDataSource) Read ¶
func (s *OcmPoliciesDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse)
func (*OcmPoliciesDataSource) Schema ¶
func (s *OcmPoliciesDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, resp *datasource.SchemaResponse)
type OcmPoliciesState ¶
type OcmPoliciesState struct { OperatorRolePolicies *OperatorRolePolicies `tfsdk:"operator_role_policies"` AccountRolePolicies *AccountRolePolicies `tfsdk:"account_role_policies"` }
type OperatorRolePolicies ¶
type OperatorRolePolicies struct { ImageRegistry types.String `tfsdk:"openshift_hcp_image_registry_installer_cloud_credentials_policy"` IngressOperator types.String `tfsdk:"openshift_hcp_ingress_operator_cloud_credentials_policy"` ClusterCSI types.String `tfsdk:"openshift_hcp_cluster_csi_drivers_ebs_cloud_credentials_policy"` CloudNetwork types.String `tfsdk:"openshift_hcp_cloud_network_config_controller_cloud_credentials_policy"` KubeControllerManagerKubeSystem types.String `tfsdk:"openshift_hcp_kube_controller_manager_credentials_policy"` CapaControllerManagerKubeSystem types.String `tfsdk:"openshift_hcp_capa_controller_manager_credentials_policy"` ControlPlaneOperatorKubeSystem types.String `tfsdk:"openshift_hcp_control_plane_operator_credentials_policy"` KmsProviderKubeSystem types.String `tfsdk:"openshift_hcp_kms_provider_credentials_policy"` }
Click to show internal directories.
Click to hide internal directories.