func elasticsearchKeystoreContentsPayload()

in ec/ecresource/deploymentresource/elasticsearch/v2/elasticsearch_keystore_contents.go [40:97]


func elasticsearchKeystoreContentsPayload(ctx context.Context, keystoreContentsTF types.Map, model *models.ElasticsearchClusterSettings, esState *ElasticsearchTF) (*models.ElasticsearchClusterSettings, diag.Diagnostics) {
	var diags diag.Diagnostics

	if (keystoreContentsTF.IsNull() || len(keystoreContentsTF.Elements()) == 0) && esState == nil {
		return model, nil
	}

	secrets := make(map[string]models.KeystoreSecret, len(keystoreContentsTF.Elements()))

	for secretKey, elem := range keystoreContentsTF.Elements() {
		var secretTF ElasticsearchKeystoreContentsTF

		ds := tfsdk.ValueAs(ctx, elem, &secretTF)
		diags.Append(ds...)

		if ds.HasError() {
			continue
		}

		var secret models.KeystoreSecret

		secret.AsFile = ec.Bool(false)

		if !secretTF.AsFile.IsUnknown() && !secretTF.AsFile.IsNull() {
			secret.AsFile = ec.Bool(secretTF.AsFile.ValueBool())
		}
		secret.Value = secretTF.Value.ValueString()

		secrets[secretKey] = secret
	}

	// remove secrets that were in state but are removed from plan
	if esState != nil {
		if !esState.KeystoreContents.IsNull() {
			for k := range esState.KeystoreContents.Elements() {
				if _, ok := secrets[k]; !ok {
					secrets[k] = models.KeystoreSecret{}
				}
			}
		}
	}

	if len(secrets) == 0 {
		return model, nil
	}

	if model == nil {
		model = &models.ElasticsearchClusterSettings{}
	}

	if model.KeystoreContents == nil {
		model.KeystoreContents = new(models.KeystoreContents)
	}

	model.KeystoreContents.Secrets = secrets

	return model, nil
}