Documentation ¶
Index ¶
- Constants
- func New() datasource.DataSource
- type AccountRolePolicies
- type OcmPoliciesDataSource
- func (s *OcmPoliciesDataSource) Configure(ctx context.Context, req datasource.ConfigureRequest, ...)
- func (s *OcmPoliciesDataSource) Metadata(ctx context.Context, req datasource.MetadataRequest, ...)
- func (s *OcmPoliciesDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse)
- func (s *OcmPoliciesDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, ...)
- type OcmPoliciesState
- type OperatorRolePolicies
Constants ¶
View Source
const ( // Policy IDs from type operator roles CloudCred = "openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy" CloudNetwork = "openshift_cloud_network_config_controller_cloud_credentials_policy" ClusterCSI = "openshift_cluster_csi_drivers_ebs_cloud_credentials_policy" ImageRegistry = "openshift_image_registry_installer_cloud_credentials_policy" IngressOperator = "openshift_ingress_operator_cloud_credentials_policy" MachineAPI = "openshift_machine_api_aws_cloud_credentials_policy" // Policy IDs from type account roles Installer = "sts_installer_permission_policy" Support = "sts_support_permission_policy" SupportRhSreRole = "sts_support_rh_sre_role" InstanceWorker = "sts_instance_worker_permission_policy" InstanceControlPlane = "sts_instance_controlplane_permission_policy" )
Variables ¶
This section is empty.
Functions ¶
func New ¶
func New() datasource.DataSource
Types ¶
type AccountRolePolicies ¶
type AccountRolePolicies struct { Installer types.String `tfsdk:"sts_installer_permission_policy"` Support types.String `tfsdk:"sts_support_permission_policy"` SupportRhSreRole types.String `tfsdk:"sts_support_rh_sre_role"` InstanceWorker types.String `tfsdk:"sts_instance_worker_permission_policy"` InstanceControlPlane types.String `tfsdk:"sts_instance_controlplane_permission_policy"` }
type OcmPoliciesDataSource ¶
type OcmPoliciesDataSource struct {
// contains filtered or unexported fields
}
func (*OcmPoliciesDataSource) Configure ¶
func (s *OcmPoliciesDataSource) Configure(ctx context.Context, req datasource.ConfigureRequest, resp *datasource.ConfigureResponse)
func (*OcmPoliciesDataSource) Metadata ¶
func (s *OcmPoliciesDataSource) Metadata(ctx context.Context, req datasource.MetadataRequest, resp *datasource.MetadataResponse)
func (*OcmPoliciesDataSource) Read ¶
func (s *OcmPoliciesDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse)
func (*OcmPoliciesDataSource) Schema ¶
func (s *OcmPoliciesDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, resp *datasource.SchemaResponse)
type OcmPoliciesState ¶
type OcmPoliciesState struct { OperatorRolePolicies *OperatorRolePolicies `tfsdk:"operator_role_policies"` AccountRolePolicies *AccountRolePolicies `tfsdk:"account_role_policies"` }
type OperatorRolePolicies ¶
type OperatorRolePolicies struct { CloudCred types.String `tfsdk:"openshift_cloud_credential_operator_cloud_credential_operator_iam_ro_creds_policy"` CloudNetwork types.String `tfsdk:"openshift_cloud_network_config_controller_cloud_credentials_policy"` ClusterCSI types.String `tfsdk:"openshift_cluster_csi_drivers_ebs_cloud_credentials_policy"` ImageRegistry types.String `tfsdk:"openshift_image_registry_installer_cloud_credentials_policy"` IngressOperator types.String `tfsdk:"openshift_ingress_operator_cloud_credentials_policy"` MachineAPI types.String `tfsdk:"openshift_machine_api_aws_cloud_credentials_policy"` }
Click to show internal directories.
Click to hide internal directories.