Skip to content

Commit

Permalink
PR review: factor out a function to add the PKI cert verification fie…
Browse files Browse the repository at this point in the history
…lds.
  • Loading branch information
victorr committed Feb 4, 2025
1 parent 8d2a782 commit 82fcaa0
Show file tree
Hide file tree
Showing 2 changed files with 13 additions and 27 deletions.
20 changes: 11 additions & 9 deletions vault/data_source_pki_secret_backend_issuer.go
Original file line number Diff line number Diff line change
Expand Up @@ -133,13 +133,7 @@ func readPKISecretBackendIssuer(ctx context.Context, d *schema.ResourceData, met
consts.FieldManualChain,
consts.FieldUsage,
}
if supportPkiCertVerifyDisableChecksFields(meta) {
issuerComputedFields = append(issuerComputedFields,
consts.FieldDisableCriticalExtensionChecks,
consts.FieldDisablePathLengthChecks,
consts.FieldDisableNameChecks,
consts.FieldDisableNameConstraintChecks)
}
issuerComputedFields = appendPkiCertVerifyDisableChecksFields(meta, issuerComputedFields)

for _, k := range issuerComputedFields {
if err := d.Set(k, resp.Data[k]); err != nil {
Expand All @@ -150,6 +144,14 @@ func readPKISecretBackendIssuer(ctx context.Context, d *schema.ResourceData, met
return nil
}

func supportPkiCertVerifyDisableChecksFields(meta interface{}) bool {
return provider.IsAPISupported(meta, provider.VaultVersion119) && provider.IsEnterpriseSupported(meta)
func appendPkiCertVerifyDisableChecksFields(meta interface{}, fields []string) []string {
if !provider.IsAPISupported(meta, provider.VaultVersion119) && provider.IsEnterpriseSupported(meta) {
return fields
}
return append(fields,
consts.FieldDisableCriticalExtensionChecks,
consts.FieldDisablePathLengthChecks,
consts.FieldDisableNameChecks,
consts.FieldDisableNameConstraintChecks,
)
}
20 changes: 2 additions & 18 deletions vault/resource_pki_secret_backend_issuer.go
Original file line number Diff line number Diff line change
Expand Up @@ -183,15 +183,7 @@ func pkiSecretBackendIssuerUpdate(ctx context.Context, d *schema.ResourceData, m
consts.FieldOCSPServers,
consts.FieldEnableAIAURLTemplating,
}

if supportPkiCertVerifyDisableChecksFields(meta) {
configurableFields = append(configurableFields,
consts.FieldDisableCriticalExtensionChecks,
consts.FieldDisablePathLengthChecks,
consts.FieldDisableNameChecks,
consts.FieldDisableNameConstraintChecks,
)
}
configurableFields = appendPkiCertVerifyDisableChecksFields(meta, configurableFields)

var patchRequired bool
data := map[string]interface{}{}
Expand Down Expand Up @@ -271,15 +263,7 @@ func pkiSecretBackendIssuerRead(ctx context.Context, d *schema.ResourceData, met
consts.FieldEnableAIAURLTemplating,
consts.FieldIssuerID,
}

if supportPkiCertVerifyDisableChecksFields(meta) {
fields = append(fields,
consts.FieldDisableCriticalExtensionChecks,
consts.FieldDisablePathLengthChecks,
consts.FieldDisableNameChecks,
consts.FieldDisableNameConstraintChecks,
)
}
fields = appendPkiCertVerifyDisableChecksFields(meta, fields)

for _, k := range fields {
if v, ok := resp.Data[k]; ok {
Expand Down

0 comments on commit 82fcaa0

Please sign in to comment.