diff --git a/cyral/internal/repository/constants.go b/cyral/internal/repository/constants.go index 851bd085..9a863592 100644 --- a/cyral/internal/repository/constants.go +++ b/cyral/internal/repository/constants.go @@ -26,6 +26,11 @@ const ( RepoMongoDBServerTypeKey = "server_type" RepoMongoDBSRVRecordName = "srv_record_name" RepoMongoDBFlavorKey = "flavor" + // Redshift settings keys + RepoRedshiftSettingsKey = "redshift_settings" + RepoRedshiftClusterIdentifier = "cluster_identifier" + RepoRedshiftWorkgroupName = "workgroup_name" + RepoRedshiftAWSRegion = "aws_region" ) const ( diff --git a/cyral/internal/repository/model.go b/cyral/internal/repository/model.go index 494bec6b..01fdf2f7 100644 --- a/cyral/internal/repository/model.go +++ b/cyral/internal/repository/model.go @@ -11,15 +11,16 @@ type Labels []string type RepoNodes []*RepoNode type RepoInfo struct { - ID string `json:"id"` - Name string `json:"name"` - Type string `json:"type"` - Host string `json:"repoHost"` - Port uint32 `json:"repoPort"` - ConnParams *ConnParams `json:"connParams"` - Labels Labels `json:"labels"` - RepoNodes RepoNodes `json:"repoNodes,omitempty"` - MongoDBSettings *MongoDBSettings `json:"mongoDbSettings,omitempty"` + ID string `json:"id"` + Name string `json:"name"` + Type string `json:"type"` + Host string `json:"repoHost"` + Port uint32 `json:"repoPort"` + ConnParams *ConnParams `json:"connParams"` + Labels Labels `json:"labels"` + RepoNodes RepoNodes `json:"repoNodes,omitempty"` + MongoDBSettings *MongoDBSettings `json:"mongoDbSettings,omitempty"` + RedshiftSettings *RedshiftSettings `json:"redshiftSettings,omitempty"` } type ConnParams struct { @@ -38,6 +39,12 @@ type MongoDBSettings struct { Flavor string `json:"flavor,omitempty"` } +type RedshiftSettings struct { + ClusterIdentifier string `json:"clusterIdentifier,omitempty"` + WorkgroupName string `json:"workgroupName,omitempty"` + AWSRegion string `json:"awsRegion,omitempty"` +} + type RepoNode struct { Name string `json:"name"` Host string `json:"host"` @@ -60,6 +67,7 @@ func (res *RepoInfo) WriteToSchema(d *schema.ResourceData) error { d.Set(RepoConnDrainingKey, res.ConnParams.AsInterface()) d.Set(RepoNodesKey, res.RepoNodes.AsInterface()) d.Set(RepoMongoDBSettingsKey, res.MongoDBSettings.AsInterface()) + d.Set(RepoRedshiftSettingsKey, res.RedshiftSettings.AsInterface()) return nil } @@ -77,7 +85,18 @@ func (r *RepoInfo) ReadFromSchema(d *schema.ResourceData) error { return fmt.Errorf("'%s' block is only allowed when '%s=%s'", RepoMongoDBSettingsKey, utils.TypeKey, MongoDB) } m, err := mongoDBSettingsFromInterface(mongoDBSettings) + if err != nil { + return err + } r.MongoDBSettings = m + + var redshiftSettings = d.Get(RepoRedshiftSettingsKey).(*schema.Set).List() + if r.Type != Redshift && len(redshiftSettings) > 0 { + return fmt.Errorf("'%s' block is only allowed when '%s=%s'", RepoRedshiftSettingsKey, utils.TypeKey, Redshift) + } + redshift, err := redshiftSettingsFromInterface(redshiftSettings) + r.RedshiftSettings = redshift + return err } @@ -156,6 +175,18 @@ func repoNodesFromInterface(i []interface{}) RepoNodes { return repoNodes } +func (r *RedshiftSettings) AsInterface() []interface{} { + if r == nil { + return nil + } + + return []interface{}{map[string]interface{}{ + RepoRedshiftClusterIdentifier: r.ClusterIdentifier, + RepoRedshiftWorkgroupName: r.WorkgroupName, + RepoRedshiftAWSRegion: r.AWSRegion, + }} +} + func (m *MongoDBSettings) AsInterface() []interface{} { if m == nil { return nil @@ -169,6 +200,22 @@ func (m *MongoDBSettings) AsInterface() []interface{} { }} } +func redshiftSettingsFromInterface(i []interface{}) (*RedshiftSettings, error) { + if len(i) == 0 { + return nil, nil + } + + var clusterIdentifier = i[0].(map[string]interface{})[RepoRedshiftClusterIdentifier].(string) + var workgroupName = i[0].(map[string]interface{})[RepoRedshiftWorkgroupName].(string) + var awsRegion = i[0].(map[string]interface{})[RepoRedshiftAWSRegion].(string) + + return &RedshiftSettings{ + ClusterIdentifier: clusterIdentifier, + WorkgroupName: workgroupName, + AWSRegion: awsRegion, + }, nil +} + func mongoDBSettingsFromInterface(i []interface{}) (*MongoDBSettings, error) { if len(i) == 0 { return nil, nil diff --git a/cyral/internal/repository/resource.go b/cyral/internal/repository/resource.go index 37a3ac4c..c7cba459 100644 --- a/cyral/internal/repository/resource.go +++ b/cyral/internal/repository/resource.go @@ -171,6 +171,31 @@ func resourceSchema() *schema.Resource { }, }, }, + RepoRedshiftSettingsKey: { + Description: "Parameters related to Redshift repositories.", + Type: schema.TypeSet, + Optional: true, + MaxItems: 1, + Elem: &schema.Resource{ + Schema: map[string]*schema.Schema{ + RepoRedshiftClusterIdentifier: { + Description: "Name of the provisioned cluster.", + Type: schema.TypeString, + Optional: true, + }, + RepoRedshiftWorkgroupName: { + Description: "Workgroup name for serverless cluster.", + Type: schema.TypeString, + Optional: true, + }, + RepoRedshiftAWSRegion: { + Description: "Code of the AWS region where the Redshift instance is deployed.", + Type: schema.TypeString, + Optional: true, + }, + }, + }, + }, }, Importer: &schema.ResourceImporter{ StateContext: schema.ImportStatePassthroughContext, diff --git a/cyral/internal/repository/resource_test.go b/cyral/internal/repository/resource_test.go index db71fb0a..c046cadc 100644 --- a/cyral/internal/repository/resource_test.go +++ b/cyral/internal/repository/resource_test.go @@ -140,6 +140,21 @@ var ( Flavor: "documentdb", }, } + + withRedshiftSettings = repository.RepoInfo{ + Name: utils.AccTestName(utils.RepositoryResourceName, "repo-with-redshift-settings"), + Type: "redshift", + RepoNodes: repository.RepoNodes{ + { + Host: "redshift.local", + Port: 3333, + }, + }, + RedshiftSettings: &repository.RedshiftSettings{ + ClusterIdentifier: "myCluster", + AWSRegion: "us-east-1", + }, + } ) func TestAccRepositoryResource(t *testing.T) { @@ -153,11 +168,13 @@ func TestAccRepositoryResource(t *testing.T) { connDrainingConfig, "conn_draining_test") allDynamic := setupRepositoryTest( allRepoNodesAreDynamic, "all_repo_nodes_are_dynamic") + redshift := setupRepositoryTest( + withRedshiftSettings, "with_redshift_settings") multiNode := setupRepositoryTest( mixedMultipleNodesConfig, "multi_node_test") - // Should use name of the last resource created. + // Must use name of the last resource created. importTest := resource.TestStep{ ImportState: true, ImportStateVerify: true, @@ -171,6 +188,7 @@ func TestAccRepositoryResource(t *testing.T) { update, connDrainingEmpty, connDraining, + redshift, allDynamic, multiNode, importTest, @@ -256,6 +274,23 @@ func repoCheckFuctions(repo repository.RepoInfo, resName string) resource.TestCh }...) } + if repo.RedshiftSettings != nil { + checkFuncs = append(checkFuncs, []resource.TestCheckFunc{ + resource.TestCheckResourceAttr(resourceFullName, + "redshift_settings.0.cluster_identifier", + repo.RedshiftSettings.ClusterIdentifier, + ), + resource.TestCheckResourceAttr(resourceFullName, + "redshift_settings.0.workgroup_name", + repo.RedshiftSettings.WorkgroupName, + ), + resource.TestCheckResourceAttr(resourceFullName, + "redshift_settings.0.aws_region", + repo.RedshiftSettings.AWSRegion, + ), + }...) + } + return resource.ComposeTestCheckFunc(checkFuncs...) } @@ -307,6 +342,35 @@ func repoAsConfig(repo repository.RepoInfo, resName string) string { ) } + if repo.RedshiftSettings != nil { + clusterIdentifier := "null" + workgroupName := "null" + awsRegion := "null" + + if repo.RedshiftSettings.ClusterIdentifier != "" { + clusterIdentifier = fmt.Sprintf(`"%s"`, repo.RedshiftSettings.ClusterIdentifier) + } + + if repo.RedshiftSettings.WorkgroupName != "" { + workgroupName = fmt.Sprintf(`"%s"`, repo.RedshiftSettings.WorkgroupName) + } + + if repo.RedshiftSettings.AWSRegion != "" { + awsRegion = fmt.Sprintf(`"%s"`, repo.RedshiftSettings.AWSRegion) + } + + config += fmt.Sprintf(` + redshift_settings { + cluster_identifier = %s + workgroup_name = %s + aws_region = %s + }`, + clusterIdentifier, + workgroupName, + awsRegion, + ) + } + for _, node := range repo.RepoNodes { name, host := "null", "null" if node.Name != "" { diff --git a/cyral/internal/repository/useraccount/model.go b/cyral/internal/repository/useraccount/model.go index 5b58c991..1d6cfdb4 100644 --- a/cyral/internal/repository/useraccount/model.go +++ b/cyral/internal/repository/useraccount/model.go @@ -20,7 +20,8 @@ type AuthScheme struct { } type AuthSchemeAWSIAM struct { - RoleARN string `json:"roleARN,omitempty"` + RoleARN string `json:"roleARN,omitempty"` + AuthenticateAsIAMRole bool `json:"authenticateAsIAMRole,omitempty"` } type AuthSchemeAWSSecretsManager struct { @@ -118,7 +119,8 @@ func (resource *UserAccountResource) WriteToSchema(d *schema.ResourceData) error map[string]interface{}{ "aws_iam": []interface{}{ map[string]interface{}{ - "role_arn": resource.AuthScheme.AWSIAM.RoleARN, + "role_arn": resource.AuthScheme.AWSIAM.RoleARN, + "authenticate_as_iam_role": resource.AuthScheme.AWSIAM.AuthenticateAsIAMRole, }, }, }, @@ -259,7 +261,8 @@ func (userAccount *UserAccountResource) ReadFromSchema(d *schema.ResourceData) e case "aws_iam": userAccount.AuthScheme = &AuthScheme{ AWSIAM: &AuthSchemeAWSIAM{ - RoleARN: m["role_arn"].(string), + RoleARN: m["role_arn"].(string), + AuthenticateAsIAMRole: m["authenticate_as_iam_role"].(bool), }, } case "aws_secrets_manager": diff --git a/cyral/internal/repository/useraccount/resource.go b/cyral/internal/repository/useraccount/resource.go index 67bfcf2a..eae869f2 100644 --- a/cyral/internal/repository/useraccount/resource.go +++ b/cyral/internal/repository/useraccount/resource.go @@ -212,6 +212,12 @@ func resourceSchema() *schema.Resource { Type: schema.TypeString, Required: true, }, + "authenticate_as_iam_role": { + Description: "Indicates whether to access as an AWS IAM role (`true`)" + + "or a native database user (`false`). Defaults to `false`.", + Type: schema.TypeBool, + Optional: true, + }, }, }, }, diff --git a/cyral/internal/repository/useraccount/resource_test.go b/cyral/internal/repository/useraccount/resource_test.go index 22f1b77e..8aeb329c 100644 --- a/cyral/internal/repository/useraccount/resource_test.go +++ b/cyral/internal/repository/useraccount/resource_test.go @@ -97,7 +97,8 @@ func TestAccRepositoryUserAccountResource(t *testing.T) { Name: "aws-iam-useracc", AuthScheme: &useraccount.AuthScheme{ AWSIAM: &useraccount.AuthSchemeAWSIAM{ - RoleARN: "role-arn-1", + RoleARN: "role-arn-1", + AuthenticateAsIAMRole: true, }, }, } @@ -286,7 +287,11 @@ func setupRepositoryUserAccountCheck(resName string, userAccount useraccount.Use checkFuncs = append(checkFuncs, resource.TestCheckResourceAttr(resFullName, authSchemeScope+"aws_iam.0.role_arn", - authScheme.AWSIAM.RoleARN)) + authScheme.AWSIAM.RoleARN), + resource.TestCheckResourceAttr(resFullName, + authSchemeScope+"aws_iam.0.authenticate_as_iam_role", + strconv.FormatBool(authScheme.AWSIAM.AuthenticateAsIAMRole)), + ) case authScheme.AWSSecretsManager != nil: checkFuncs = append(checkFuncs, resource.TestCheckResourceAttr(resFullName, @@ -348,7 +353,10 @@ func setupRepositoryUserAccountConfig(resName string, userAccount useraccount.Us authSchemeStr = fmt.Sprintf(` aws_iam { role_arn = "%s" - }`, authScheme.AWSIAM.RoleARN) + authenticate_as_iam_role = %t + }`, + authScheme.AWSIAM.RoleARN, + authScheme.AWSIAM.AuthenticateAsIAMRole) case authScheme.AWSSecretsManager != nil: authSchemeStr = fmt.Sprintf(` aws_secrets_manager { diff --git a/docs/resources/repository.md b/docs/resources/repository.md index e03a63dd..ccd151cc 100644 --- a/docs/resources/repository.md +++ b/docs/resources/repository.md @@ -112,6 +112,7 @@ resource "cyral_repository" "multi_node_mongo_repo" { - `connection_draining` (Block Set, Max: 1) Parameters related to connection draining. (see [below for nested schema](#nestedblock--connection_draining)) - `labels` (List of String) Labels enable you to categorize your repository. - `mongodb_settings` (Block Set, Max: 1) Parameters related to MongoDB repositories. (see [below for nested schema](#nestedblock--mongodb_settings)) +- `redshift_settings` (Block Set, Max: 1) Parameters related to Redshift repositories. (see [below for nested schema](#nestedblock--redshift_settings)) ### Read-Only @@ -175,3 +176,13 @@ Optional: - `replica_set_name` (String) Name of the replica set, if applicable. - `srv_record_name` (String) Name of a DNS SRV record which contains cluster topology details. If specified, then all `repo_node` blocks must be declared dynamic (see [`dynamic`](#dynamic)). Only supported for `server_type="sharded"` or `server_type="replicaset". + + + +### Nested Schema for `redshift_settings` + +Optional: + +- `aws_region` (String) Code of the AWS region where the Redshift instance is deployed. +- `cluster_identifier` (String) Name of the provisioned cluster. +- `workgroup_name` (String) Workgroup name for serverless cluster. diff --git a/docs/resources/repository_user_account.md b/docs/resources/repository_user_account.md index 7363df5b..2cc5ca71 100644 --- a/docs/resources/repository_user_account.md +++ b/docs/resources/repository_user_account.md @@ -159,6 +159,10 @@ Required: - `role_arn` (String) The AWS IAM roleARN to gain access to the database. +Optional: + +- `authenticate_as_iam_role` (Boolean) Indicates whether to access as an AWS IAM role (`true`)or a native database user (`false`). Defaults to `false`. + ### Nested Schema for `auth_scheme.aws_secrets_manager`