Skip to content

Commit 40c1f2c

Browse files
authored
add trocket role access (#2158)
* add trocket role access * add changelog
1 parent 703420f commit 40c1f2c

File tree

4 files changed

+43
-0
lines changed

4 files changed

+43
-0
lines changed

.changelog/2158.txt

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,3 @@
1+
```release-note:enhancement
2+
resource/tencentcloud_trocket_rocketmq_role: Add computed `access_key` and `secret_key`
3+
```

tencentcloud/resource_tc_trocket_rocketmq_role.go

Lines changed: 28 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -24,6 +24,14 @@ resource "tencentcloud_trocket_rocketmq_role" "rocketmq_role" {
2424
perm_write = false
2525
perm_read = true
2626
}
27+
28+
output "access_key" {
29+
value = tencentcloud_trocket_rocketmq_role.rocketmq_role.access_key
30+
}
31+
32+
output "secret_key" {
33+
value = tencentcloud_trocket_rocketmq_role.rocketmq_role.secret_key
34+
}
2735
```
2836
2937
Import
@@ -90,6 +98,18 @@ func resourceTencentCloudTrocketRocketmqRole() *schema.Resource {
9098
Description: "Whether to enable consumption permission.",
9199
},
92100

101+
"access_key": {
102+
Computed: true,
103+
Type: schema.TypeString,
104+
Description: "Access key.",
105+
},
106+
107+
"secret_key": {
108+
Computed: true,
109+
Type: schema.TypeString,
110+
Description: "Secret key.",
111+
},
112+
93113
"created_time": {
94114
Computed: true,
95115
Type: schema.TypeInt,
@@ -202,6 +222,14 @@ func resourceTencentCloudTrocketRocketmqRoleRead(d *schema.ResourceData, meta in
202222
_ = d.Set("perm_read", rocketmqRole.PermRead)
203223
}
204224

225+
if rocketmqRole.AccessKey != nil {
226+
_ = d.Set("access_key", rocketmqRole.AccessKey)
227+
}
228+
229+
if rocketmqRole.SecretKey != nil {
230+
_ = d.Set("secret_key", rocketmqRole.SecretKey)
231+
}
232+
205233
if rocketmqRole.CreatedTime != nil {
206234
_ = d.Set("created_time", rocketmqRole.CreatedTime)
207235
}

tencentcloud/resource_tc_trocket_rocketmq_role_test.go

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -21,6 +21,8 @@ func TestAccTencentCloudTrocketRocketmqRoleResource_basic(t *testing.T) {
2121
resource.TestCheckResourceAttr("tencentcloud_trocket_rocketmq_role.rocketmq_role", "remark", "test for terraform"),
2222
resource.TestCheckResourceAttr("tencentcloud_trocket_rocketmq_role.rocketmq_role", "perm_write", "false"),
2323
resource.TestCheckResourceAttr("tencentcloud_trocket_rocketmq_role.rocketmq_role", "perm_read", "true"),
24+
resource.TestCheckResourceAttrSet("tencentcloud_trocket_rocketmq_role.rocketmq_role", "access_key"),
25+
resource.TestCheckResourceAttrSet("tencentcloud_trocket_rocketmq_role.rocketmq_role", "secret_key"),
2426
),
2527
},
2628
{

website/docs/r/trocket_rocketmq_role.html.markdown

Lines changed: 10 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,14 @@ resource "tencentcloud_trocket_rocketmq_role" "rocketmq_role" {
3434
perm_write = false
3535
perm_read = true
3636
}
37+
38+
output "access_key" {
39+
value = tencentcloud_trocket_rocketmq_role.rocketmq_role.access_key
40+
}
41+
42+
output "secret_key" {
43+
value = tencentcloud_trocket_rocketmq_role.rocketmq_role.secret_key
44+
}
3745
```
3846

3947
## Argument Reference
@@ -51,8 +59,10 @@ The following arguments are supported:
5159
In addition to all arguments above, the following attributes are exported:
5260

5361
* `id` - ID of the resource.
62+
* `access_key` - Access key.
5463
* `created_time` - Created time.
5564
* `modified_time` - Modified time.
65+
* `secret_key` - Secret key.
5666

5767

5868
## Import

0 commit comments

Comments
 (0)