diff --git a/.changelog/2478.txt b/.changelog/2478.txt
index 3c80528ff7..7e35be9a8b 100644
--- a/.changelog/2478.txt
+++ b/.changelog/2478.txt
@@ -3,7 +3,7 @@ resource/mongodbatlas_advanced_cluster: Supports defining cluster shards with in
```
```release-note:note
-resource/mongodbatlas_advanced_cluster: Using this new version impacts the possibility of editing the definition of multi shard clusters in the Atlas UI. This impact is limited to the first weeks of August.
+resource/mongodbatlas_advanced_cluster: Using this new version impacts the possibility of editing the definition of multi shard clusters in the Atlas UI. This impact is limited to the first weeks of September.
```
```release-note:enhancement
diff --git a/.changelog/2505.txt b/.changelog/2505.txt
new file mode 100644
index 0000000000..f9a5d81b39
--- /dev/null
+++ b/.changelog/2505.txt
@@ -0,0 +1,7 @@
+```release-note:new-guide
+[Migration Guide: Advanced Cluster New Sharding Schema](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/advanced-cluster-new-sharding-schema). This enables Independent Shard Scaling.
+```
+
+```release-note:new-guide
+[Migration Guide: Cluster to Advanced Cluster](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/cluster-to-advanced-cluster-migration-guide)
+```
diff --git a/.github/pull_request_template.md b/.github/pull_request_template.md
index 4ce09e6022..4e133f503f 100644
--- a/.github/pull_request_template.md
+++ b/.github/pull_request_template.md
@@ -20,7 +20,7 @@ Link to any related issue(s):
- [ ] I have added tests that prove my fix is effective or that my feature works per HashiCorp requirements
- [ ] I have added any necessary documentation (if appropriate)
- [ ] I have run make fmt and formatted my code
-- [ ] If changes include deprecations or removals, I defined an isolated PR with a relevant title as it will be used in the auto-generated changelog.
+- [ ] If changes include deprecations or removals I have added appropriate changelog entries.
- [ ] If changes include removal or addition of 3rd party GitHub actions, I updated our internal document. Reach out to the APIx Integration slack channel to get access to the internal document.
## Further comments
diff --git a/.github/workflows/acceptance-tests-runner.yml b/.github/workflows/acceptance-tests-runner.yml
index 136c693902..ab7217a453 100644
--- a/.github/workflows/acceptance-tests-runner.yml
+++ b/.github/workflows/acceptance-tests-runner.yml
@@ -294,7 +294,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -316,7 +316,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -356,7 +356,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -394,7 +394,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -418,7 +418,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -440,7 +440,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -485,7 +485,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -507,7 +507,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -529,7 +529,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -551,7 +551,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -589,7 +589,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -616,7 +616,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -645,7 +645,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -690,7 +690,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -727,7 +727,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -752,7 +752,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -774,7 +774,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -796,7 +796,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -823,7 +823,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
@@ -847,7 +847,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ inputs.terraform_version }}
terraform_wrapper: false
diff --git a/.github/workflows/code-health.yml b/.github/workflows/code-health.yml
index ec4c2be7c6..78a0072ab5 100644
--- a/.github/workflows/code-health.yml
+++ b/.github/workflows/code-health.yml
@@ -49,7 +49,7 @@ jobs:
- name: golangci-lint
uses: golangci/golangci-lint-action@aaa42aa0628b4ae2578232a66b541047968fac86
with:
- version: v1.59.1 # Also update GOLANGCI_VERSION variable in GNUmakefile when updating this version
+ version: v1.60.3 # Also update GOLANGCI_VERSION variable in GNUmakefile when updating this version
- name: actionlint
run: |
make tools
@@ -70,13 +70,15 @@ jobs:
- uses: actions/checkout@692973e3d937129bcbf40652eb9f2f61becf3332
- run: make tools # all resources with auto-generated doc must be specified below here
- name: Doc for control_plane_ip_addresses
- run: export resource_name=control_plane_ip_addresses && make generate-doc
+ run: make generate-doc resource_name=control_plane_ip_addresses
- name: Doc for push_based_log_export
- run: export resource_name=push_based_log_export && make generate-doc
+ run: make generate-doc resource_name=push_based_log_export
- name: Doc for search_deployment
- run: export resource_name=search_deployment && make generate-doc
+ run: make generate-doc resource_name=search_deployment
- name: Doc for encryption_at_rest
- run: export resource_name=encryption_at_rest && make generate-doc
+ run: make generate-doc resource_name=encryption_at_rest
+ - name: Doc for encryption_at_rest_private_endpoint
+ run: make generate-doc resource_name=encryption_at_rest_private_endpoint
- name: Find mutations
id: self_mutation
run: |-
diff --git a/.github/workflows/examples.yml b/.github/workflows/examples.yml
index daa8791a50..a0667e5f6e 100644
--- a/.github/workflows/examples.yml
+++ b/.github/workflows/examples.yml
@@ -21,7 +21,7 @@ jobs:
- uses: actions/setup-go@0a12ed9d6a96ab950c8f026ed9f722fe0da7ef32
with:
go-version-file: 'go.mod'
- - uses: hashicorp/setup-terraform@651471c36a6092792c552e8b1bef71e592b462d8
+ - uses: hashicorp/setup-terraform@b9cd54a3c349d3f38e8881555d616ced269862dd
with:
terraform_version: ${{ vars.TF_VERSION_LATEST }}
terraform_wrapper: false
diff --git a/.golangci.yml b/.golangci.yml
index 7bcb5c94a9..3620dfb765 100644
--- a/.golangci.yml
+++ b/.golangci.yml
@@ -85,7 +85,7 @@ linters:
- nakedret
- nolintlint
- rowserrcheck
- - exportloopref
+ - copyloopvar
- staticcheck
- stylecheck
- typecheck
diff --git a/.tool-versions b/.tool-versions
index c23da88ab6..46456547b9 100644
--- a/.tool-versions
+++ b/.tool-versions
@@ -1,2 +1,2 @@
-golang 1.22.5
-terraform 1.9.2
+golang 1.23.0
+terraform 1.9.5
diff --git a/CHANGELOG.md b/CHANGELOG.md
index bc3d437bbf..a8a41dd7b5 100644
--- a/CHANGELOG.md
+++ b/CHANGELOG.md
@@ -1,5 +1,9 @@
## (Unreleased)
+## 1.18.1 (August 26, 2024)
+
+## 1.18.0 (August 14, 2024)
+
BREAKING CHANGES:
* data-source/mongodbatlas_cloud_backup_snapshot_export_bucket: Changes `id` attribute from optional to computed only ([#2499](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2499))
@@ -20,7 +24,12 @@ NOTES:
* data-source/mongodbatlas_advanced_cluster: Deprecates `replication_specs.#.id`, `replication_specs.#.num_shards`, `disk_size_gb`, `advanced_configuration.0.default_read_concern`, and `advanced_configuration.0.fail_index_key_too_long`. To learn more, see the [1.18.0 Migration Guide](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/1.18.0-upgrade-guide). ([#2420](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2420))
* data-source/mongodbatlas_advanced_clusters: Deprecates `replication_specs.#.id`, `replication_specs.#.num_shards`, `disk_size_gb`, `advanced_configuration.0.default_read_concern`, and `advanced_configuration.0.fail_index_key_too_long`. To learn more, see the [1.18.0 Migration Guide](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/1.18.0-upgrade-guide). ([#2420](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2420))
* resource/mongodbatlas_advanced_cluster: Deprecates `replication_specs.#.id`, `replication_specs.#.num_shards`, `disk_size_gb`, `advanced_configuration.0.default_read_concern`, and `advanced_configuration.0.fail_index_key_too_long`. To learn more, see the [1.18.0 Migration Guide](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/1.18.0-upgrade-guide). ([#2420](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2420))
-* resource/mongodbatlas_advanced_cluster: Using this new version impacts the possibility of editing the definition of multi shard clusters in the Atlas UI. This impact is limited to the first weeks of August. ([#2478](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2478))
+* resource/mongodbatlas_advanced_cluster: Using this new version impacts the possibility of editing the definition of multi shard clusters in the Atlas UI. This impact is limited to the first weeks of September. ([#2478](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2478))
+
+FEATURES:
+
+* **New Guide:** [Migration Guide: Advanced Cluster New Sharding Schema](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/advanced-cluster-new-sharding-schema). This enables Independent Shard Scaling. ([#2505](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2505))
+* **New Guide:** [Migration Guide: Cluster to Advanced Cluster](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs/guides/cluster-to-advanced-cluster-migration-guide) ([#2505](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/2505))
ENHANCEMENTS:
diff --git a/GNUmakefile b/GNUmakefile
index 488873875d..d8739af884 100644
--- a/GNUmakefile
+++ b/GNUmakefile
@@ -18,7 +18,7 @@ GITTAG=$(shell git describe --always --tags)
VERSION=$(GITTAG:v%=%)
LINKER_FLAGS=-s -w -X 'github.com/mongodb/terraform-provider-mongodbatlas/version.ProviderVersion=${VERSION}'
-GOLANGCI_VERSION=v1.59.1 # Also update golangci-lint GH action in code-health.yml when updating this version
+GOLANGCI_VERSION=v1.60.3 # Also update golangci-lint GH action in code-health.yml when updating this version
export PATH := $(shell go env GOPATH)/bin:$(PATH)
export SHELL := env PATH=$(PATH) /bin/bash
@@ -74,6 +74,7 @@ lint:
.PHONY: tools
tools: ## Install dev tools
@echo "==> Installing dependencies..."
+ go telemetry off # disable sending telemetry data, more info: https://go.dev/doc/telemetry
go install github.com/icholy/gomajor@latest
go install github.com/terraform-linters/tflint@v0.52.0
go install github.com/rhysd/actionlint/cmd/actionlint@latest
@@ -123,8 +124,10 @@ scaffold-schemas:
.PHONY: generate-doc
-generate-doc: ## Generate the resource documentation via tfplugindocs
- ./scripts/generate-doc.sh ${resource_name}
+# e.g. run: make generate-doc resource_name=search_deployment
+# generate the resource documentation via tfplugindocs
+generate-doc:
+ @scripts/generate-doc.sh ${resource_name}
.PHONY: update-tf-compatibility-matrix
update-tf-compatibility-matrix: ## Update Terraform Compatibility Matrix documentation
diff --git a/README.md b/README.md
index b665386052..ea50b98e8b 100644
--- a/README.md
+++ b/README.md
@@ -19,7 +19,7 @@ Feature requests can be submitted at https://feedback.mongodb.com/forums/924145-
## Requirements
- [HashiCorp Terraform Version Compatibility Matrix](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs#hashicorp-terraform-versionhttpswwwterraformiodownloadshtml-compatibility-matrix)
-- [Go Version](https://golang.org/doc/install) 1.22 (to build the provider plugin)
+- [Go Version](https://golang.org/doc/install) 1.23 (to build the provider plugin)
## Using the Provider
diff --git a/contributing/README.md b/contributing/README.md
index 31a2ca2103..9718e582c0 100644
--- a/contributing/README.md
+++ b/contributing/README.md
@@ -1,6 +1,6 @@
# Contribution guidelines
-Thanks for your interest in contributing to MongoDB Atlas Terraform Provider, the following documents define guidelines necessary to participate in the community.
+Thanks for your interest in contributing to MongoDB Atlas Terraform Provider, the following documents define guidelines necessary to participate in the community. Please note that we no longer develop or maintain any resources or data sources we marked as deprecated in our [documentation](https://registry.terraform.io/providers/mongodb/mongodbatlas/latest/docs).
- [Development Setup](development-setup.md)
- [Development Best Practices](development-best-practices.md)
diff --git a/contributing/development-setup.md b/contributing/development-setup.md
index e01ca8a79d..ece7da2611 100644
--- a/contributing/development-setup.md
+++ b/contributing/development-setup.md
@@ -11,7 +11,7 @@
### Prerequisite Tools
- [Git](https://git-scm.com/)
-- [Go (at least Go 1.22)](https://golang.org/dl/)
+- [Go (at least Go 1.23)](https://golang.org/dl/)
### Environment
@@ -51,7 +51,7 @@ For more explained information about plugin override check [Development Override
- Make sure that the PR title follows [*Conventional Commits*](https://www.conventionalcommits.org/).
- Add comments around your new code that explain what's happening.
- Commit and push your changes to your branch then submit a pull request against the `master` branch.
-- A repo maintainer will review your pull request.
+- A repo maintainer will review your pull request. **Note**: If you have an active [MongoDB Atlas Support](https://www.mongodb.com/services/support/atlas-support-plans) contract, we recommend also creating a support ticket for any questions related to this process.
### Merging a Pull Request
Due to security reasons, there are restrictions on how external contributions can be handled, especially concerning the use of repository secrets and running tests from forks.
diff --git a/contributing/documentation.md b/contributing/documentation.md
index eaa3d9eae4..6879da6f53 100644
--- a/contributing/documentation.md
+++ b/contributing/documentation.md
@@ -12,5 +12,5 @@ We autogenerate the documentation of our provider resources and data sources via
- Add the resource/data source templates to the [templates](https://github.com/mongodb/terraform-provider-mongodbatlas/blob/master/templates) folder. See [README.md](https://github.com/mongodb/terraform-provider-mongodbatlas/blob/master/templates/README.md) for more info.
- Run the Makefile command `generate-doc`
```bash
-export resource_name=search_deployment && make generate-doc
+make generate-doc resource_name=search_deployment
```
diff --git a/docs/data-sources/advanced_cluster.md b/docs/data-sources/advanced_cluster.md
index 12933e4676..9044c4c884 100644
--- a/docs/data-sources/advanced_cluster.md
+++ b/docs/data-sources/advanced_cluster.md
@@ -35,7 +35,7 @@ data "mongodbatlas_advanced_cluster" "example" {
}
```
-## Example using latest sharding schema with independent shard scaling in the cluster
+## Example using latest sharding configurations with independent shard scaling in the cluster
```terraform
resource "mongodbatlas_advanced_cluster" "example" {
diff --git a/docs/data-sources/advanced_clusters.md b/docs/data-sources/advanced_clusters.md
index 641e9e2d8e..ee67dd01fd 100644
--- a/docs/data-sources/advanced_clusters.md
+++ b/docs/data-sources/advanced_clusters.md
@@ -34,7 +34,7 @@ data "mongodbatlas_advanced_clusters" "example" {
}
```
-## Example using latest sharding schema with independent shard scaling in the cluster
+## Example using latest sharding configurations with independent shard scaling in the cluster
```terraform
resource "mongodbatlas_advanced_cluster" "example" {
diff --git a/docs/data-sources/encryption_at_rest_private_endpoint.md b/docs/data-sources/encryption_at_rest_private_endpoint.md
new file mode 100644
index 0000000000..fc6c00f57f
--- /dev/null
+++ b/docs/data-sources/encryption_at_rest_private_endpoint.md
@@ -0,0 +1,37 @@
+# Data Source: mongodbatlas_encryption_at_rest_private_endpoint
+
+`mongodbatlas_encryption_at_rest_private_endpoint` describes a private endpoint used for encryption at rest using customer-managed keys.
+
+## Example Usages
+
+```terraform
+data "mongodbatlas_encryption_at_rest_private_endpoint" "single" {
+ project_id = var.atlas_project_id
+ cloud_provider = "AZURE"
+ id = mongodbatlas_encryption_at_rest_private_endpoint.endpoint.id
+}
+
+output "endpoint_connection_name" {
+ value = data.mongodbatlas_encryption_at_rest_private_endpoint.single.private_endpoint_connection_name
+}
+```
+
+
+## Schema
+
+### Required
+
+- `cloud_provider` (String) Label that identifies the cloud provider of the private endpoint.
+- `id` (String) Unique 24-hexadecimal digit string that identifies the Private Endpoint Service.
+- `project_id` (String) Unique 24-hexadecimal digit string that identifies your project.
+
+### Read-Only
+
+- `error_message` (String) Error message for failures associated with the Encryption At Rest private endpoint.
+- `private_endpoint_connection_name` (String) Connection name of the Azure Private Endpoint.
+- `region_name` (String) Cloud provider region in which the Encryption At Rest private endpoint is located.
+- `status` (String) State of the Encryption At Rest private endpoint.
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpoint) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/docs/data-sources/encryption_at_rest_private_endpoints.md b/docs/data-sources/encryption_at_rest_private_endpoints.md
new file mode 100644
index 0000000000..f21ba135a2
--- /dev/null
+++ b/docs/data-sources/encryption_at_rest_private_endpoints.md
@@ -0,0 +1,45 @@
+# Data Source: mongodbatlas_encryption_at_rest_private_endpoints
+
+`mongodbatlas_encryption_at_rest_private_endpoints` describes private endpoints of a particular cloud provider used for encryption at rest using customer-managed keys.
+
+## Example Usages
+
+```terraform
+data "mongodbatlas_encryption_at_rest_private_endpoints" "plural" {
+ project_id = var.atlas_project_id
+ cloud_provider = "AZURE"
+}
+
+output "number_of_endpoints" {
+ value = length(data.mongodbatlas_encryption_at_rest_private_endpoints.plural.results)
+}
+```
+
+
+## Schema
+
+### Required
+
+- `cloud_provider` (String) Human-readable label that identifies the cloud provider for the private endpoints to return.
+- `project_id` (String) Unique 24-hexadecimal digit string that identifies your project.
+
+### Read-Only
+
+- `results` (Attributes List) List of returned documents that MongoDB Cloud providers when completing this request. (see [below for nested schema](#nestedatt--results))
+
+
+### Nested Schema for `results`
+
+Read-Only:
+
+- `cloud_provider` (String) Label that identifies the cloud provider of the private endpoint.
+- `error_message` (String) Error message for failures associated with the Encryption At Rest private endpoint.
+- `id` (String) Unique 24-hexadecimal digit string that identifies the Private Endpoint Service.
+- `private_endpoint_connection_name` (String) Connection name of the Azure Private Endpoint.
+- `project_id` (String) Unique 24-hexadecimal digit string that identifies your project.
+- `region_name` (String) Cloud provider region in which the Encryption At Rest private endpoint is located.
+- `status` (String) State of the Encryption At Rest private endpoint.
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpointsForCloudProvider) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/docs/guides/1.18.0-upgrade-guide.md b/docs/guides/1.18.0-upgrade-guide.md
index 936e4ac379..99ea9e381e 100644
--- a/docs/guides/1.18.0-upgrade-guide.md
+++ b/docs/guides/1.18.0-upgrade-guide.md
@@ -4,13 +4,13 @@ page_title: "Upgrade Guide 1.18.0"
# MongoDB Atlas Provider 1.18.0: Upgrade and Information Guide
-***WARNING:*** For users using the `mongodbatlas_advanced_cluster` resource or data sources, and defining multi sharded clusters, this new version impacts the possibility of editing the definition of these clusters from the Atlas UI. This impact is limited to the first weeks of August 2024.
+***WARNING:*** For users using the `mongodbatlas_advanced_cluster` resource or data sources, and defining multi sharded clusters, this new version impacts the possibility of editing the definition of these clusters from the Atlas UI. This impact is limited to the first weeks of September 2024.
The Terraform MongoDB Atlas Provider version 1.18.0 has a number of new and exciting features.
**New Resources, Data Sources, and Features:**
-- You can now scale the instance size and disk IOPS independently for each individual shard for sharded and geo-sharded clusters defined with `mongodbatlas_advanced_cluster`. To learn more, see the [Advanced Cluster New Sharding Schema Migration Guide](advanced-cluster-new-sharding-schema). As part of these changes two new attributes are added:
+- You can now scale the instance size and disk IOPS independently for each individual shard for sharded and geo-sharded clusters defined with `mongodbatlas_advanced_cluster`. To learn more, see the [Advanced Cluster New Sharding Configurations Migration Guide](advanced-cluster-new-sharding-schema). As part of these changes two new attributes are added:
- Use the `replication_specs.*.zone_id` attribute in the `mongodbatlas_advanced_cluster` resource and data sources to identify the zone of each `replication_specs` object.
- Use the `use_replication_spec_per_shard` attribute in the `mongodbatlas_advanced_cluster` data sources to specify whether to obtain `replication_specs` objects for each shard.
diff --git a/docs/guides/advanced-cluster-new-sharding-schema.md b/docs/guides/advanced-cluster-new-sharding-schema.md
index 26a2ec4480..994cf3aaff 100644
--- a/docs/guides/advanced-cluster-new-sharding-schema.md
+++ b/docs/guides/advanced-cluster-new-sharding-schema.md
@@ -1,23 +1,23 @@
---
-page_title: "Migration Guide: Advanced Cluster New Sharding Schema"
+page_title: "Migration Guide: Advanced Cluster New Sharding Configurations"
---
-# Migration Guide: Advanced Cluster New Sharding Schema
+# Migration Guide: Advanced Cluster New Sharding Configurations
-**Objective**: Use this guide to migrate your existing `advanced_cluster` configurations to the new sharding schema introduced in version 1.18.0. The new sharding schema allows you to scale shards independently. Existing sharding configurations continue to work, although the software issues deprecation messages if you use the legacy schema.
+**Objective**: Use this guide to migrate your existing `advanced_cluster` resources to support new sharding configurations introduced in version 1.18.0. The new sharding configurations allow you to scale shards independently. Existing sharding configurations continue to work, but you will receive deprecation messages if you continue to use them.
-- [Migration Guide: Advanced Cluster New Sharding Schema](#migration-guide-advanced-cluster-new-sharding-schema)
- - [Overview of schema changes](#overview-of-schema-changes)
+- [Migration Guide: Advanced Cluster New Sharding Configurations](#migration-guide-advanced-cluster-new-sharding-schema)
+ - [Changes Overview](#changes-overview)
- [Migrate advanced\_cluster type `SHARDED`](#migrate-advanced_cluster-type-sharded)
- [Migrate advanced\_cluster type `GEOSHARDED`](#migrate-advanced_cluster-type-geosharded)
- [Migrate advanced\_cluster type `REPLICASET`](#migrate-advanced_cluster-type-replicaset)
- [Use Independent Shard Scaling](#use-independent-shard-scaling)
-## Overview of schema changes
+## Changes Overview
`replication_specs` attribute now represents each individual cluster's shard with a unique replication spec element.
-When you use the new sharding schema, the schema no longer uses the existing attribute `num_shards`, and instead the number of shards are defined by the number of `replication_specs` elements.
+When you use the new sharding configurations, it will no longer use the existing attribute `num_shards`, and instead the number of shards are defined by the number of `replication_specs` elements.
### Migrate advanced_cluster type `SHARDED`
@@ -46,7 +46,7 @@ resource "mongodbatlas_advanced_cluster" "test" {
}
```
-In order to update our configuration to the new schema, we will remove the use of `num_shards` and add a new identical `replication_specs` element for each shard. Note that these 2 changes must be done at the same time.
+In order to use our new sharding configurations, we will remove the use of `num_shards` and add a new identical `replication_specs` element for each shard. Note that these 2 changes must be done at the same time.
```
resource "mongodbatlas_advanced_cluster" "test" {
@@ -84,6 +84,8 @@ resource "mongodbatlas_advanced_cluster" "test" {
This updated configuration will trigger a Terraform update plan. However, the underlying cluster will not face any changes after the `apply` command, as both configurations represent a sharded cluster composed of two shards.
+Note: The first time `terraform apply` command is run **after** updating the configuration, you may receive a `500 Internal Server Error (Error code: "SERVICE_UNAVAILABLE")` error. This is a known temporary issue. If you encounter this, please re-run `terraform apply` and this time the update should succeed.
+
### Migrate advanced_cluster type `GEOSHARDED`
@@ -126,7 +128,7 @@ resource "mongodbatlas_advanced_cluster" "test" {
}
```
-In order to update our configuration to the new schema, we will remove the use of `num_shards` and add a new identical `replication_specs` element for each shard. Note that these two changes must be done at the same time.
+In order to use our new sharding configurations, we will remove the use of `num_shards` and add a new identical `replication_specs` element for each shard. Note that these two changes must be done at the same time.
```
resource "mongodbatlas_advanced_cluster" "test" {
@@ -192,6 +194,8 @@ resource "mongodbatlas_advanced_cluster" "test" {
This updated configuration triggers a Terraform update plan. However, the underlying cluster will not face any changes after the `apply` command, as both configurations represent a geo sharded cluster with two zones and two shards in each one.
+Note: The first time `terraform apply` command is run **after** updating the configuration, you may receive a `500 Internal Server Error (Error code: "SERVICE_UNAVAILABLE")` error. This is a known temporary issue. If you encounter this, please re-run `terraform apply` and this time the update should succeed.
+
### Migrate advanced_cluster type `REPLICASET`
@@ -240,7 +244,7 @@ resource "mongodbatlas_advanced_cluster" "test" {
}
```
-Once the cluster type is adjusted accordingly, we can proceed to add a new shard using the new schema:
+Once the cluster type is adjusted accordingly, we can proceed to add a new shard:
```
resource "mongodbatlas_advanced_cluster" "test" {
@@ -274,10 +278,12 @@ resource "mongodbatlas_advanced_cluster" "test" {
}
```
+Note: The first time `terraform apply` command is run **after** updating the configuration, you may receive a `500 Internal Server Error (Error code: "SERVICE_UNAVAILABLE")` error. This is a known temporary issue. If you encounter this, please re-run `terraform apply` and this time the update should succeed.
+
### Use Independent Shard Scaling
-Use the new sharding schema. Each shard must be represented with a unique replication_specs element and `num_shards` must not be used, as illustrated in the following example.
+Use the new sharding configurations. Each shard must be represented with a unique `replication_specs` element and `num_shards` must not be used, as illustrated in the following example.
```
resource "mongodbatlas_advanced_cluster" "test" {
@@ -347,4 +353,4 @@ resource "mongodbatlas_advanced_cluster" "test" {
}
```
--> **NOTE:** For any cluster leveraging the new schema and defining independently scaled shards, users should also update corresponding `mongodbatlas_cloud_backup_schedule` resource & data sources. This involves updating any existing Terraform configurations of the resource to use `copy_settings.#.zone_id` instead of `copy_settings.#.replication_spec_id`. This is needed as `mongodbatlas_advanced_cluster` resource and data source will no longer have `replication_specs.#.id` present when shards are scaled independently. To learn more, review the [1.18.0 Migration Guide](1.18.0-upgrade-guide.md#transition-cloud-backup-schedules-for-clusters-to-use-zones).
+-> **NOTE:** For any cluster leveraging the new sharding configurations and defining independently scaled shards, users should also update corresponding `mongodbatlas_cloud_backup_schedule` resource & data sources. This involves updating any existing Terraform configurations of the resource to use `copy_settings.#.zone_id` instead of `copy_settings.#.replication_spec_id`. This is needed as `mongodbatlas_advanced_cluster` resource and data source will no longer have `replication_specs.#.id` present when shards are scaled independently. To learn more, review the [1.18.0 Migration Guide](1.18.0-upgrade-guide.md#transition-cloud-backup-schedules-for-clusters-to-use-zones).
diff --git a/docs/guides/cluster-to-advanced-cluster-migration-guide.md b/docs/guides/cluster-to-advanced-cluster-migration-guide.md
index 03a3f369a5..ccade2d6dc 100644
--- a/docs/guides/cluster-to-advanced-cluster-migration-guide.md
+++ b/docs/guides/cluster-to-advanced-cluster-migration-guide.md
@@ -12,7 +12,7 @@ page_title: "Migration Guide: Cluster to Advanced Cluster"
2. Provider Settings: Moved from the top level to the replication spec allowing you to create multi-cloud clusters.
3. Auto Scaling: Moved from the top level to the replication spec allowing you to scale replication specs individually.
4. Backup Configuration: Renamed from `cloud_backup` to `backup_enabled`.
-5. See the [Migration Guide: Advanced Cluster New Sharding Schema](advanced-cluster-new-sharding-schema#migration-sharded) for changes to `num_shards` and the new `zone_id`.
+5. See the [Migration Guide: Advanced Cluster New Sharding Configurations](advanced-cluster-new-sharding-schema#migration-sharded) for changes to `num_shards` and the new `zone_id`.
### Example 1: Old Configuration (`mongodbatlas_cluster`)
diff --git a/docs/index.md b/docs/index.md
index 06f666ecc1..b2d5124fc2 100644
--- a/docs/index.md
+++ b/docs/index.md
@@ -219,7 +219,7 @@ We ship binaries but do not prioritize fixes for the following operating system
## Examples from MongoDB and the Community
-We have [example configurations](https://github.com/mongodb/terraform-provider-mongodbatlas/tree/v1.17.6/examples)
+We have [example configurations](https://github.com/mongodb/terraform-provider-mongodbatlas/tree/v1.18.1/examples)
in our GitHub repo that will help both beginner and more advanced users.
Have a good example you've created and want to share?
diff --git a/docs/resources/advanced_cluster.md b/docs/resources/advanced_cluster.md
index c73c9b48eb..2d2d534ec8 100644
--- a/docs/resources/advanced_cluster.md
+++ b/docs/resources/advanced_cluster.md
@@ -383,7 +383,7 @@ This parameter defaults to false.
* `labels` - (Optional) Set that contains key-value pairs between 1 to 255 characters in length for tagging and categorizing the cluster. See [below](#labels). **DEPRECATED** Use `tags` instead.
* `mongo_db_major_version` - (Optional) Version of the cluster to deploy. Atlas supports the following MongoDB versions for M10+ clusters: `4.4`, `5.0`, `6.0` or `7.0`. If omitted, Atlas deploys a cluster that runs MongoDB 7.0. If `replication_specs#.region_configs#.Specs.instance_size`: `M0`, `M2` or `M5`, Atlas deploys MongoDB 4.4. Atlas always deploys the cluster with the latest stable release of the specified version. If you set a value to this parameter and set `version_release_system` `CONTINUOUS`, the resource returns an error. Either clear this parameter or set `version_release_system`: `LTS`.
* `pit_enabled` - (Optional) - Flag that indicates if the cluster uses Continuous Cloud Backup.
-* `replication_specs` - List of settings that configure your cluster regions. This attribute has one object per shard representing node configurations in each shard. For replica sets there is only one object representing node configurations. If for each replication_spec `num_shards` is configured with a value greater than 1 (using deprecated sharding schema), then each object represents a zone with one or more shards. See [below](#replication_specs)
+* `replication_specs` - List of settings that configure your cluster regions. This attribute has one object per shard representing node configurations in each shard. For replica sets there is only one object representing node configurations. If for each replication_spec `num_shards` is configured with a value greater than 1 (using deprecated sharding configurations), then each object represents a zone with one or more shards. See [below](#replication_specs)
* `root_cert_type` - (Optional) - Certificate Authority that MongoDB Atlas clusters use. You can specify ISRGROOTX1 (for ISRG Root X1).
* `termination_protection_enabled` - Flag that indicates whether termination protection is enabled on the cluster. If set to true, MongoDB Cloud won't delete the cluster. If set to false, MongoDB Cloud will delete the cluster.
* `version_release_system` - (Optional) - Release cadence that Atlas uses for this cluster. This parameter defaults to `LTS`. If you set this field to `CONTINUOUS`, you must omit the `mongo_db_major_version` field. Atlas accepts:
@@ -693,3 +693,4 @@ See detailed information for arguments and attributes: [MongoDB API Advanced Clu
~> **IMPORTANT:**
• When a cluster is imported, the resulting schema structure will always return the new schema including `replication_specs` per independent shards of the cluster.
+
• Note: The first time `terraform apply` command is run **after** updating the configuration of an imported cluster, you may receive a `500 Internal Server Error (Error code: "SERVICE_UNAVAILABLE")` error. This is a known temporary issue. If you encounter this, please re-run `terraform apply` and this time the update should succeed.
diff --git a/docs/resources/encryption_at_rest.md b/docs/resources/encryption_at_rest.md
index 32313f0143..ad977e6997 100644
--- a/docs/resources/encryption_at_rest.md
+++ b/docs/resources/encryption_at_rest.md
@@ -6,6 +6,8 @@
[Azure Key Vault](https://docs.atlas.mongodb.com/security-azure-kms/#security-azure-kms)
[Google Cloud KMS](https://docs.atlas.mongodb.com/security-gcp-kms/#security-gcp-kms)
+The [encryption at rest Terraform module](https://registry.terraform.io/modules/terraform-mongodbatlas-modules/encryption-at-rest/mongodbatlas/latest) makes use of this resource and simplifies its use.
+
After configuring at least one Encryption at Rest provider for the Atlas project, Project Owners can enable Encryption at Rest for each Atlas cluster for which they require encryption. The Encryption at Rest provider does not have to match the cluster cloud service provider.
Atlas does not automatically rotate user-managed encryption keys. Defer to your preferred Encryption at Rest provider’s documentation and guidance for best practices on key rotation. Atlas automatically creates a 90-day key rotation alert when you configure Encryption at Rest using your Key Management in an Atlas project.
diff --git a/docs/resources/encryption_at_rest_private_endpoint.md b/docs/resources/encryption_at_rest_private_endpoint.md
new file mode 100644
index 0000000000..a9a9a6ed94
--- /dev/null
+++ b/docs/resources/encryption_at_rest_private_endpoint.md
@@ -0,0 +1,88 @@
+# Resource: mongodbatlas_encryption_at_rest_private_endpoint
+
+`mongodbatlas_encryption_at_rest_private_endpoint` provides a resource for managing a private endpoint used for encryption at rest with customer-managed keys. This ensures all traffic between Atlas and customer key management systems take place over private network interfaces.
+
+~> **IMPORTANT** The Encryption at Rest using Azure Key Vault over Private Endpoints feature is available by request. To request this functionality for you Atlas deployments, contact your Account Manager.
+Additionally, you'll need to set the environment variable `MONGODB_ATLAS_ENABLE_PREVIEW=true` to use this resource. To learn more about existing limitations, see the [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/#manage-customer-keys-with-azure-key-vault-over-private-endpoints).
+
+-> **NOTE:** Only Azure Key Vault with Azure Private Link is supported at this time.
+
+## Example Usages
+
+### Configuring Atlas Encryption at Rest using Azure Key Vault with Azure Private Link
+
+```terraform
+resource "mongodbatlas_encryption_at_rest" "ear" {
+ project_id = var.atlas_project_id
+
+ azure_key_vault_config {
+ require_private_networking = true
+
+ enabled = true
+ azure_environment = "AZURE"
+
+ tenant_id = var.azure_tenant_id
+ subscription_id = var.azure_subscription_id
+ client_id = var.azure_client_id
+ secret = var.azure_client_secret
+
+ resource_group_name = var.azure_resource_group_name
+ key_vault_name = var.azure_key_vault_name
+ key_identifier = var.azure_key_identifier
+ }
+}
+
+# Creates private endpoint
+resource "mongodbatlas_encryption_at_rest_private_endpoint" "endpoint" {
+ project_id = mongodbatlas_encryption_at_rest.ear.project_id
+ cloud_provider = "AZURE"
+ region_name = var.azure_region_name
+}
+
+locals {
+ key_vault_resource_id = "/subscriptions/${var.azure_subscription_id}/resourceGroups/${var.azure_resource_group_name}/providers/Microsoft.KeyVault/vaults/${var.azure_key_vault_name}"
+}
+
+# Approves private endpoint connection from Azure Key Vault
+resource "azapi_update_resource" "approval" {
+ type = "Microsoft.KeyVault/Vaults/PrivateEndpointConnections@2023-07-01"
+ name = mongodbatlas_encryption_at_rest_private_endpoint.endpoint.private_endpoint_connection_name
+ parent_id = local.key_vault_resource_id
+
+ body = jsonencode({
+ properties = {
+ privateLinkServiceConnectionState = {
+ description = "Approved via Terraform"
+ status = "Approved"
+ }
+ }
+ })
+}
+```
+
+
+## Schema
+
+### Required
+
+- `cloud_provider` (String) Label that identifies the cloud provider for the Encryption At Rest private endpoint.
+- `project_id` (String) Unique 24-hexadecimal digit string that identifies your project.
+- `region_name` (String) Cloud provider region in which the Encryption At Rest private endpoint is located.
+
+### Read-Only
+
+- `error_message` (String) Error message for failures associated with the Encryption At Rest private endpoint.
+- `id` (String) Unique 24-hexadecimal digit string that identifies the Private Endpoint Service.
+- `private_endpoint_connection_name` (String) Connection name of the Azure Private Endpoint.
+- `status` (String) State of the Encryption At Rest private endpoint.
+
+# Import
+Encryption At Rest Private Endpoint resource can be imported using the project ID, cloud provider, and private endpoint ID. The format must be `{project_id}-{cloud_provider}-{private_endpoint_id}` e.g.
+
+```
+$ terraform import mongodbatlas_encryption_at_rest_private_endpoint.test 650972848269185c55f40ca1-AZURE-650972848269185c55f40ca2
+```
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpoint) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/docs/resources/privatelink_endpoint.md b/docs/resources/privatelink_endpoint.md
index 0b4eb81665..2753926b24 100644
--- a/docs/resources/privatelink_endpoint.md
+++ b/docs/resources/privatelink_endpoint.md
@@ -2,6 +2,8 @@
`mongodbatlas_privatelink_endpoint` provides a Private Endpoint resource. This represents a [Private Endpoint Service](https://www.mongodb.com/docs/atlas/security-private-endpoint/#private-endpoint-concepts) that can be created in an Atlas project.
+The [private link Terraform module](https://registry.terraform.io/modules/terraform-mongodbatlas-modules/private-endpoint/mongodbatlas/latest) makes use of this resource and simplifies its use.
+
~> **IMPORTANT:**You must have one of the following roles to successfully handle the resource:
* Organization Owner
* Project Owner
@@ -79,4 +81,4 @@ Private Endpoint Service can be imported using project ID, private link ID, prov
$ terraform import mongodbatlas_privatelink_endpoint.test 1112222b3bf99403840e8934-3242342343112-AWS-us-east-1
```
-See detailed information for arguments and attributes: [MongoDB API Private Endpoint Service](https://docs.atlas.mongodb.com/reference/api/private-endpoints-service-create-one//)
\ No newline at end of file
+See detailed information for arguments and attributes: [MongoDB API Private Endpoint Service](https://docs.atlas.mongodb.com/reference/api/private-endpoints-service-create-one/)
diff --git a/docs/resources/privatelink_endpoint_service.md b/docs/resources/privatelink_endpoint_service.md
index b22f42de3b..1427810101 100644
--- a/docs/resources/privatelink_endpoint_service.md
+++ b/docs/resources/privatelink_endpoint_service.md
@@ -2,6 +2,8 @@
`mongodbatlas_privatelink_endpoint_service` provides a Private Endpoint Interface Link resource. This represents a Private Endpoint Interface Link, which adds one [Interface Endpoint](https://www.mongodb.com/docs/atlas/security-private-endpoint/#private-endpoint-concepts) to a private endpoint connection in an Atlas project.
+The [private link Terraform module](https://registry.terraform.io/modules/terraform-mongodbatlas-modules/private-endpoint/mongodbatlas/latest) makes use of this resource and simplifies its use.
+
~> **IMPORTANT:**You must have one of the following roles to successfully handle the resource:
* Organization Owner
* Project Owner
diff --git a/docs/resources/push_based_log_export.md b/docs/resources/push_based_log_export.md
index 5c2f5cb41a..a3ae1e863b 100644
--- a/docs/resources/push_based_log_export.md
+++ b/docs/resources/push_based_log_export.md
@@ -3,6 +3,8 @@
`mongodbatlas_push_based_log_export` provides a resource for push-based log export feature. The resource lets you configure, enable & disable the project level settings for the push-based log export feature. Using this resource you
can continually push logs from mongod, mongos, and audit logs to an Amazon S3 bucket. Atlas exports logs every 5 minutes.
+The [push based log export Terraform module](https://registry.terraform.io/modules/terraform-mongodbatlas-modules/push-based-log-export/mongodbatlas/latest) makes use of this resource and simplifies its use.
+
## Example Usages
diff --git a/docs/resources/stream_connection.md b/docs/resources/stream_connection.md
index 962ca1831f..9fd9d50454 100644
--- a/docs/resources/stream_connection.md
+++ b/docs/resources/stream_connection.md
@@ -96,7 +96,7 @@ If `type` is of value `Kafka` the following additional arguments are defined:
### DBRoleToExecute
-* `role` - The name of the role to use. Can be a built in role or a custom role.
+* `role` - The name of the role to use. Value can be `atlasAdmin`, `readWriteAnyDatabase`, or `readAnyDatabase` if `type` is set to `BUILT_IN`, or the name of a user-defined role if `type` is set to `CUSTOM`.
* `type` - Type of the DB role. Can be either BUILT_IN or CUSTOM.
## Import
diff --git a/examples/mongodbatlas_advanced_cluster/asymmetric-sharded-cluster/versions.tf b/examples/mongodbatlas_advanced_cluster/asymmetric-sharded-cluster/versions.tf
index 4f4050928f..9b4be6c14c 100644
--- a/examples/mongodbatlas_advanced_cluster/asymmetric-sharded-cluster/versions.tf
+++ b/examples/mongodbatlas_advanced_cluster/asymmetric-sharded-cluster/versions.tf
@@ -2,7 +2,7 @@ terraform {
required_providers {
mongodbatlas = {
source = "mongodb/mongodbatlas"
- version = "~> 1.17"
+ version = "~> 1.18"
}
}
required_version = ">= 1.0"
diff --git a/examples/mongodbatlas_advanced_cluster/global-cluster/versions.tf b/examples/mongodbatlas_advanced_cluster/global-cluster/versions.tf
index a8f13589d1..9b4be6c14c 100644
--- a/examples/mongodbatlas_advanced_cluster/global-cluster/versions.tf
+++ b/examples/mongodbatlas_advanced_cluster/global-cluster/versions.tf
@@ -2,7 +2,7 @@ terraform {
required_providers {
mongodbatlas = {
source = "mongodb/mongodbatlas"
- version = "~> 1.10.0"
+ version = "~> 1.18"
}
}
required_version = ">= 1.0"
diff --git a/examples/mongodbatlas_advanced_cluster/multi-cloud/versions.tf b/examples/mongodbatlas_advanced_cluster/multi-cloud/versions.tf
index a8f13589d1..9b4be6c14c 100644
--- a/examples/mongodbatlas_advanced_cluster/multi-cloud/versions.tf
+++ b/examples/mongodbatlas_advanced_cluster/multi-cloud/versions.tf
@@ -2,7 +2,7 @@ terraform {
required_providers {
mongodbatlas = {
source = "mongodb/mongodbatlas"
- version = "~> 1.10.0"
+ version = "~> 1.18"
}
}
required_version = ">= 1.0"
diff --git a/examples/mongodbatlas_advanced_cluster/tenant-upgrade/main.tf b/examples/mongodbatlas_advanced_cluster/tenant-upgrade/main.tf
index 3dad9ff507..863eb1b240 100644
--- a/examples/mongodbatlas_advanced_cluster/tenant-upgrade/main.tf
+++ b/examples/mongodbatlas_advanced_cluster/tenant-upgrade/main.tf
@@ -9,8 +9,6 @@ resource "mongodbatlas_advanced_cluster" "cluster" {
cluster_type = "REPLICASET"
replication_specs {
- num_shards = 1
-
region_configs {
electable_specs {
instance_size = var.provider_instance_size_name
@@ -31,4 +29,4 @@ resource "mongodbatlas_advanced_cluster" "cluster" {
resource "mongodbatlas_project" "project" {
name = "TenantUpgradeTest"
org_id = var.atlas_org_id
-}
\ No newline at end of file
+}
diff --git a/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/plural-data-source.tf b/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/plural-data-source.tf
new file mode 100644
index 0000000000..f2cb36d2dd
--- /dev/null
+++ b/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/plural-data-source.tf
@@ -0,0 +1,8 @@
+data "mongodbatlas_encryption_at_rest_private_endpoints" "plural" {
+ project_id = var.atlas_project_id
+ cloud_provider = "AZURE"
+}
+
+output "number_of_endpoints" {
+ value = length(data.mongodbatlas_encryption_at_rest_private_endpoints.plural.results)
+}
diff --git a/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/singular-data-source.tf b/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/singular-data-source.tf
new file mode 100644
index 0000000000..f3699a2353
--- /dev/null
+++ b/examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/singular-data-source.tf
@@ -0,0 +1,9 @@
+data "mongodbatlas_encryption_at_rest_private_endpoint" "single" {
+ project_id = var.atlas_project_id
+ cloud_provider = "AZURE"
+ id = mongodbatlas_encryption_at_rest_private_endpoint.endpoint.id
+}
+
+output "endpoint_connection_name" {
+ value = data.mongodbatlas_encryption_at_rest_private_endpoint.single.private_endpoint_connection_name
+}
diff --git a/go.mod b/go.mod
index 42813b6766..65e23141f6 100644
--- a/go.mod
+++ b/go.mod
@@ -1,6 +1,6 @@
module github.com/mongodb/terraform-provider-mongodbatlas
-go 1.22
+go 1.23
require (
github.com/andygrunwald/go-jira/v2 v2.0.0-20240116150243-50d59fe116d6
@@ -8,7 +8,7 @@ require (
github.com/hashicorp/go-changelog v0.0.0-20240318095659-4d68c58a6e7f
github.com/hashicorp/go-cty v1.4.1-0.20200414143053-d3edf31b6320
github.com/hashicorp/go-version v1.7.0
- github.com/hashicorp/hcl/v2 v2.21.0
+ github.com/hashicorp/hcl/v2 v2.22.0
github.com/hashicorp/terraform-plugin-framework v1.10.0
github.com/hashicorp/terraform-plugin-framework-timeouts v0.4.1
github.com/hashicorp/terraform-plugin-framework-validators v0.13.0
@@ -22,9 +22,9 @@ require (
github.com/spf13/cast v1.6.0
github.com/stretchr/testify v1.9.0
github.com/zclconf/go-cty v1.15.0
- go.mongodb.org/atlas v0.36.0
+ go.mongodb.org/atlas v0.37.0
go.mongodb.org/atlas-sdk/v20240530005 v20240530005.0.0
- go.mongodb.org/atlas-sdk/v20240805001 v20240805001.1.1-0.20240826083604-5148b5e06fe3
+ go.mongodb.org/atlas-sdk/v20240805003 v20240805003.0.0
go.mongodb.org/realm v0.1.0
)
diff --git a/go.sum b/go.sum
index 01da42592d..8c698c5820 100644
--- a/go.sum
+++ b/go.sum
@@ -506,8 +506,8 @@ github.com/hashicorp/hcl v1.0.0 h1:0Anlzjpi4vEasTeNFn2mLJgTSwt0+6sfsiTG8qcWGx4=
github.com/hashicorp/hcl v1.0.0/go.mod h1:E5yfLk+7swimpb2L/Alb/PJmXilQ/rhwaUYs4T20WEQ=
github.com/hashicorp/hcl/v2 v2.0.0/go.mod h1:oVVDG71tEinNGYCxinCYadcmKU9bglqW9pV3txagJ90=
github.com/hashicorp/hcl/v2 v2.8.2/go.mod h1:bQTN5mpo+jewjJgh8jr0JUguIi7qPHUF6yIfAEN3jqY=
-github.com/hashicorp/hcl/v2 v2.21.0 h1:lve4q/o/2rqwYOgUg3y3V2YPyD1/zkCLGjIV74Jit14=
-github.com/hashicorp/hcl/v2 v2.21.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=
+github.com/hashicorp/hcl/v2 v2.22.0 h1:hkZ3nCtqeJsDhPRFz5EA9iwcG1hNWGePOTw6oyul12M=
+github.com/hashicorp/hcl/v2 v2.22.0/go.mod h1:62ZYHrXgPoX8xBnzl8QzbWq4dyDsDtfCRgIq1rbJEvA=
github.com/hashicorp/logutils v1.0.0 h1:dLEQVugN8vlakKOUE3ihGLTZJRB4j+M2cdTm/ORI65Y=
github.com/hashicorp/logutils v1.0.0/go.mod h1:QIAnNjmIWmVIIkWDTG1z5v++HQmx9WQRO+LraFDTW64=
github.com/hashicorp/terraform-config-inspect v0.0.0-20191212124732-c6ae6269b9d7 h1:Pc5TCv9mbxFN6UVX0LH6CpQrdTM5YjbVI2w15237Pjk=
@@ -778,14 +778,12 @@ github.com/zclconf/go-cty-debug v0.0.0-20240509010212-0d6042c53940/go.mod h1:CmB
github.com/zclconf/go-cty-yaml v1.0.2 h1:dNyg4QLTrv2IfJpm7Wtxi55ed5gLGOlPrZ6kMd51hY0=
github.com/zclconf/go-cty-yaml v1.0.2/go.mod h1:IP3Ylp0wQpYm50IHK8OZWKMu6sPJIUgKa8XhiVHura0=
go.mongodb.org/atlas v0.12.0/go.mod h1:wVCnHcm/7/IfTjEB6K8K35PLG70yGz8BdkRwX0oK9/M=
-go.mongodb.org/atlas v0.36.0 h1:m05S3AO7zkl+bcG1qaNsEKBnAqnKx2FDwLooHpIG3j4=
-go.mongodb.org/atlas v0.36.0/go.mod h1:nfPldE9dSama6G2IbIzmEza02Ly7yFZjMMVscaM0uEc=
+go.mongodb.org/atlas v0.37.0 h1:zQnO1o5+bVP9IotpAYpres4UjMD2F4nwNEFTZhNL4ck=
+go.mongodb.org/atlas v0.37.0/go.mod h1:DJYtM+vsEpPEMSkQzJnFHrT0sP7ev6cseZc/GGjJYG8=
go.mongodb.org/atlas-sdk/v20240530005 v20240530005.0.0 h1:d/gbYJ+obR0EM/3DZf7+ZMi2QWISegm3mid7Or708cc=
go.mongodb.org/atlas-sdk/v20240530005 v20240530005.0.0/go.mod h1:O47ZrMMfcWb31wznNIq2PQkkdoFoK0ea2GlmRqGJC2s=
-go.mongodb.org/atlas-sdk/v20240805001 v20240805001.0.1-0.20240813143344-1cfe40386cbc h1:ZZOXzXjt9PMOx1tKz76aenAikF6n5f8qvitaarDWJ9Q=
-go.mongodb.org/atlas-sdk/v20240805001 v20240805001.0.1-0.20240813143344-1cfe40386cbc/go.mod h1:0aHEphVfsYbpg3CiEUcXeAU7OVoOFig1tltXdLjYiSQ=
-go.mongodb.org/atlas-sdk/v20240805001 v20240805001.1.1-0.20240826083604-5148b5e06fe3 h1:Xru9985dRWbJB1d0bQ4wu5FYGEu9ke3SHNJ2BgJdbNQ=
-go.mongodb.org/atlas-sdk/v20240805001 v20240805001.1.1-0.20240826083604-5148b5e06fe3/go.mod h1:0aHEphVfsYbpg3CiEUcXeAU7OVoOFig1tltXdLjYiSQ=
+go.mongodb.org/atlas-sdk/v20240805003 v20240805003.0.0 h1:f2PRtW3r9873dGApUXwf/njVT2uWpXtGw9Pg9czMX5I=
+go.mongodb.org/atlas-sdk/v20240805003 v20240805003.0.0/go.mod h1:CVDolHhHTrXPPqig+7KKTPu54tIVqsrtmQm4LssNcZ0=
go.mongodb.org/realm v0.1.0 h1:zJiXyLaZrznQ+Pz947ziSrDKUep39DO4SfA0Fzx8M4M=
go.mongodb.org/realm v0.1.0/go.mod h1:4Vj6iy+Puo1TDERcoh4XZ+pjtwbOzPpzqy3Cwe8ZmDM=
go.opencensus.io v0.21.0/go.mod h1:mSImk1erAIZhrmZN+AvHh14ztQfjbGwt4TtuofqLduU=
diff --git a/internal/common/constant/deprecation.go b/internal/common/constant/deprecation.go
index 9572bcc843..72211322d2 100644
--- a/internal/common/constant/deprecation.go
+++ b/internal/common/constant/deprecation.go
@@ -5,6 +5,7 @@ const (
DeprecationParamWithReplacement = "This parameter is deprecated. Please transition to %s."
DeprecationParamByDate = "This parameter is deprecated and will be removed by %s."
DeprecationParamByDateWithReplacement = "This parameter is deprecated and will be removed by %s. Please transition to %s."
+ DeprecationParamFutureWithReplacement = "This parameter is deprecated and will be removed in the future. Please transition to %s"
DeprecationParamByVersion = "This parameter is deprecated and will be removed in version %s."
DeprecationResourceByDateWithReplacement = "This resource is deprecated and will be removed in %s. Please transition to %s."
DeprecationDataSourceByDateWithReplacement = "This data source is deprecated and will be removed in %s. Please transition to %s."
diff --git a/internal/common/conversion/flatten_expand.go b/internal/common/conversion/flatten_expand.go
index e97b4450bc..4a36480cda 100644
--- a/internal/common/conversion/flatten_expand.go
+++ b/internal/common/conversion/flatten_expand.go
@@ -3,7 +3,7 @@ package conversion
import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func FlattenLinks(links []admin.Link) []map[string]string {
diff --git a/internal/config/client.go b/internal/config/client.go
index 8b31a10ccd..dfcec11ba2 100644
--- a/internal/config/client.go
+++ b/internal/config/client.go
@@ -10,7 +10,7 @@ import (
"time"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
matlasClient "go.mongodb.org/atlas/mongodbatlas"
realmAuth "go.mongodb.org/realm/auth"
"go.mongodb.org/realm/realm"
diff --git a/internal/service/accesslistapikey/data_source_accesslist_api_keys.go b/internal/service/accesslistapikey/data_source_accesslist_api_keys.go
index 0ce79a22d4..62effe0dc0 100644
--- a/internal/service/accesslistapikey/data_source_accesslist_api_keys.go
+++ b/internal/service/accesslistapikey/data_source_accesslist_api_keys.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/accesslistapikey/resource_access_list_api_key.go b/internal/service/accesslistapikey/resource_access_list_api_key.go
index f099ec0e14..a5c4bdc2a9 100644
--- a/internal/service/accesslistapikey/resource_access_list_api_key.go
+++ b/internal/service/accesslistapikey/resource_access_list_api_key.go
@@ -13,7 +13,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/advancedcluster/data_source_advanced_cluster.go b/internal/service/advancedcluster/data_source_advanced_cluster.go
index 082fdc113b..c81b5e3ceb 100644
--- a/internal/service/advancedcluster/data_source_advanced_cluster.go
+++ b/internal/service/advancedcluster/data_source_advanced_cluster.go
@@ -70,7 +70,7 @@ func DataSource() *schema.Resource {
"labels": {
Type: schema.TypeSet,
Computed: true,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/advancedcluster/data_source_advanced_clusters.go b/internal/service/advancedcluster/data_source_advanced_clusters.go
index edd7b3e869..b9e7b1f877 100644
--- a/internal/service/advancedcluster/data_source_advanced_clusters.go
+++ b/internal/service/advancedcluster/data_source_advanced_clusters.go
@@ -7,7 +7,7 @@ import (
"net/http"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
@@ -83,7 +83,7 @@ func PluralDataSource() *schema.Resource {
"labels": {
Type: schema.TypeSet,
Computed: true,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/advancedcluster/model_advanced_cluster.go b/internal/service/advancedcluster/model_advanced_cluster.go
index c02c7d9f03..04bd6f0ec3 100644
--- a/internal/service/advancedcluster/model_advanced_cluster.go
+++ b/internal/service/advancedcluster/model_advanced_cluster.go
@@ -10,7 +10,7 @@ import (
"strings"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
diff --git a/internal/service/advancedcluster/model_advanced_cluster_test.go b/internal/service/advancedcluster/model_advanced_cluster_test.go
index 5f66222a7f..7d39eb45bb 100644
--- a/internal/service/advancedcluster/model_advanced_cluster_test.go
+++ b/internal/service/advancedcluster/model_advanced_cluster_test.go
@@ -9,8 +9,8 @@ import (
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/stretchr/testify/assert"
diff --git a/internal/service/advancedcluster/model_sdk_version_conversion.go b/internal/service/advancedcluster/model_sdk_version_conversion.go
index dcc3559dec..1a85c53309 100644
--- a/internal/service/advancedcluster/model_sdk_version_conversion.go
+++ b/internal/service/advancedcluster/model_sdk_version_conversion.go
@@ -2,7 +2,7 @@ package advancedcluster
import (
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
)
diff --git a/internal/service/advancedcluster/resource_advanced_cluster.go b/internal/service/advancedcluster/resource_advanced_cluster.go
index c18965b4f5..31d71545ad 100644
--- a/internal/service/advancedcluster/resource_advanced_cluster.go
+++ b/internal/service/advancedcluster/resource_advanced_cluster.go
@@ -13,7 +13,7 @@ import (
"time"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
@@ -126,7 +126,7 @@ func Resource() *schema.Resource {
Type: schema.TypeSet,
Optional: true,
Set: HashFunctionForKeyValuePair,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/advancedcluster/resource_advanced_cluster_migration_test.go b/internal/service/advancedcluster/resource_advanced_cluster_migration_test.go
index 79fef52580..69bd1d9db3 100644
--- a/internal/service/advancedcluster/resource_advanced_cluster_migration_test.go
+++ b/internal/service/advancedcluster/resource_advanced_cluster_migration_test.go
@@ -3,6 +3,7 @@ package advancedcluster_test
import (
"fmt"
"os"
+ "regexp"
"testing"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
@@ -15,31 +16,26 @@ import (
const versionBeforeISSRelease = "1.17.6"
func TestMigAdvancedCluster_replicaSetAWSProvider(t *testing.T) {
- // once 1.18.0 is released we can adjust this to always check new attributes - CLOUDP-266096
- testCase := replicaSetAWSProviderTestCase(t, false)
+ testCase := replicaSetAWSProviderTestCase(t)
mig.CreateAndRunTest(t, &testCase)
}
func TestMigAdvancedCluster_replicaSetMultiCloud(t *testing.T) {
- // once 1.18.0 is released we can adjust this to always check new attributes - CLOUDP-266096
- testCase := replicaSetMultiCloudTestCase(t, false)
+ testCase := replicaSetMultiCloudTestCase(t)
mig.CreateAndRunTest(t, &testCase)
}
func TestMigAdvancedCluster_singleShardedMultiCloud(t *testing.T) {
- // once 1.18.0 is released we can adjust this to always check new attributes - CLOUDP-266096
- testCase := singleShardedMultiCloudTestCase(t, false)
+ testCase := singleShardedMultiCloudTestCase(t)
mig.CreateAndRunTest(t, &testCase)
}
func TestMigAdvancedCluster_symmetricGeoShardedOldSchema(t *testing.T) {
- // once 1.18.0 is released we can adjust this to always check new attributes - CLOUDP-266096
- testCase := symmetricGeoShardedOldSchemaTestCase(t, false)
+ testCase := symmetricGeoShardedOldSchemaTestCase(t)
mig.CreateAndRunTest(t, &testCase)
}
func TestMigAdvancedCluster_asymmetricShardedNewSchema(t *testing.T) {
- acc.SkipTestForCI(t) // latest release does not support ISS, to be adjusted in CLOUDP-266096
testCase := asymmetricShardedNewSchemaTestCase(t)
mig.CreateAndRunTest(t, &testCase)
}
@@ -109,6 +105,11 @@ func TestMigAdvancedCluster_shardedMigrationFromOldToNewSchema(t *testing.T) {
Config: configShardedTransitionOldToNewSchema(orgID, projectName, clusterName, false),
Check: checkShardedTransitionOldToNewSchema(false),
},
+ {
+ ProtoV6ProviderFactories: acc.TestAccProviderV6Factories,
+ Config: configShardedTransitionOldToNewSchema(orgID, projectName, clusterName, true),
+ ExpectError: regexp.MustCompile("SERVICE_UNAVAILABLE"),
+ },
{
ProtoV6ProviderFactories: acc.TestAccProviderV6Factories,
Config: configShardedTransitionOldToNewSchema(orgID, projectName, clusterName, true),
@@ -134,6 +135,11 @@ func TestMigAdvancedCluster_geoShardedMigrationFromOldToNewSchema(t *testing.T)
Config: configGeoShardedTransitionOldToNewSchema(orgID, projectName, clusterName, false),
Check: checkGeoShardedTransitionOldToNewSchema(false),
},
+ {
+ ProtoV6ProviderFactories: acc.TestAccProviderV6Factories,
+ Config: configShardedTransitionOldToNewSchema(orgID, projectName, clusterName, true),
+ ExpectError: regexp.MustCompile("SERVICE_UNAVAILABLE"),
+ },
{
ProtoV6ProviderFactories: acc.TestAccProviderV6Factories,
Config: configGeoShardedTransitionOldToNewSchema(orgID, projectName, clusterName, true),
diff --git a/internal/service/advancedcluster/resource_advanced_cluster_test.go b/internal/service/advancedcluster/resource_advanced_cluster_test.go
index 2ef25cc775..beba9619ae 100644
--- a/internal/service/advancedcluster/resource_advanced_cluster_test.go
+++ b/internal/service/advancedcluster/resource_advanced_cluster_test.go
@@ -8,7 +8,7 @@ import (
"testing"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
@@ -54,9 +54,9 @@ func TestAccClusterAdvancedCluster_basicTenant(t *testing.T) {
}
func TestAccClusterAdvancedCluster_replicaSetAWSProvider(t *testing.T) {
- resource.ParallelTest(t, replicaSetAWSProviderTestCase(t, true))
+ resource.ParallelTest(t, replicaSetAWSProviderTestCase(t))
}
-func replicaSetAWSProviderTestCase(t *testing.T, checkNewAttributes bool) resource.TestCase {
+func replicaSetAWSProviderTestCase(t *testing.T) resource.TestCase {
t.Helper()
var (
projectID = acc.ProjectIDExecution(t)
@@ -70,11 +70,11 @@ func replicaSetAWSProviderTestCase(t *testing.T, checkNewAttributes bool) resour
Steps: []resource.TestStep{
{
Config: configReplicaSetAWSProvider(projectID, clusterName, 60, 3),
- Check: checkReplicaSetAWSProvider(projectID, clusterName, 60, 3, checkNewAttributes, checkNewAttributes),
+ Check: checkReplicaSetAWSProvider(projectID, clusterName, 60, 3, true, true),
},
{
Config: configReplicaSetAWSProvider(projectID, clusterName, 50, 5),
- Check: checkReplicaSetAWSProvider(projectID, clusterName, 50, 5, checkNewAttributes, checkNewAttributes),
+ Check: checkReplicaSetAWSProvider(projectID, clusterName, 50, 5, true, true),
},
{
ResourceName: resourceName,
@@ -88,9 +88,9 @@ func replicaSetAWSProviderTestCase(t *testing.T, checkNewAttributes bool) resour
}
func TestAccClusterAdvancedCluster_replicaSetMultiCloud(t *testing.T) {
- resource.ParallelTest(t, replicaSetMultiCloudTestCase(t, true))
+ resource.ParallelTest(t, replicaSetMultiCloudTestCase(t))
}
-func replicaSetMultiCloudTestCase(t *testing.T, verifyExternalID bool) resource.TestCase {
+func replicaSetMultiCloudTestCase(t *testing.T) resource.TestCase {
t.Helper()
var (
orgID = os.Getenv("MONGODB_ATLAS_ORG_ID")
@@ -106,11 +106,11 @@ func replicaSetMultiCloudTestCase(t *testing.T, verifyExternalID bool) resource.
Steps: []resource.TestStep{
{
Config: configReplicaSetMultiCloud(orgID, projectName, clusterName),
- Check: checkReplicaSetMultiCloud(clusterName, 3, verifyExternalID),
+ Check: checkReplicaSetMultiCloud(clusterName, 3),
},
{
Config: configReplicaSetMultiCloud(orgID, projectName, clusterNameUpdated),
- Check: checkReplicaSetMultiCloud(clusterNameUpdated, 3, verifyExternalID),
+ Check: checkReplicaSetMultiCloud(clusterNameUpdated, 3),
},
{
ResourceName: resourceName,
@@ -124,10 +124,10 @@ func replicaSetMultiCloudTestCase(t *testing.T, verifyExternalID bool) resource.
}
func TestAccClusterAdvancedCluster_singleShardedMultiCloud(t *testing.T) {
- resource.ParallelTest(t, singleShardedMultiCloudTestCase(t, true))
+ resource.ParallelTest(t, singleShardedMultiCloudTestCase(t))
}
-func singleShardedMultiCloudTestCase(t *testing.T, verifyExternalID bool) resource.TestCase {
+func singleShardedMultiCloudTestCase(t *testing.T) resource.TestCase {
t.Helper()
var (
orgID = os.Getenv("MONGODB_ATLAS_ORG_ID")
@@ -143,11 +143,11 @@ func singleShardedMultiCloudTestCase(t *testing.T, verifyExternalID bool) resour
Steps: []resource.TestStep{
{
Config: configShardedOldSchemaMultiCloud(orgID, projectName, clusterName, 1, "M10"),
- Check: checkShardedOldSchemaMultiCloud(clusterName, 1, "M10", verifyExternalID),
+ Check: checkShardedOldSchemaMultiCloud(clusterName, 1, "M10", true),
},
{
Config: configShardedOldSchemaMultiCloud(orgID, projectName, clusterNameUpdated, 1, "M10"),
- Check: checkShardedOldSchemaMultiCloud(clusterNameUpdated, 1, "M10", verifyExternalID),
+ Check: checkShardedOldSchemaMultiCloud(clusterNameUpdated, 1, "M10", true),
},
{
ResourceName: resourceName,
@@ -535,10 +535,10 @@ func TestAccClusterAdvancedClusterConfig_symmetricShardedOldSchema(t *testing.T)
}
func TestAccClusterAdvancedClusterConfig_symmetricGeoShardedOldSchema(t *testing.T) {
- resource.ParallelTest(t, symmetricGeoShardedOldSchemaTestCase(t, true))
+ resource.ParallelTest(t, symmetricGeoShardedOldSchemaTestCase(t))
}
-func symmetricGeoShardedOldSchemaTestCase(t *testing.T, checkNewAttributes bool) resource.TestCase {
+func symmetricGeoShardedOldSchemaTestCase(t *testing.T) resource.TestCase {
t.Helper()
var (
orgID = os.Getenv("MONGODB_ATLAS_ORG_ID")
@@ -553,11 +553,11 @@ func symmetricGeoShardedOldSchemaTestCase(t *testing.T, checkNewAttributes bool)
Steps: []resource.TestStep{
{
Config: configGeoShardedOldSchema(orgID, projectName, clusterName, 2, 2, false),
- Check: checkGeoShardedOldSchema(clusterName, 2, 2, checkNewAttributes, false),
+ Check: checkGeoShardedOldSchema(clusterName, 2, 2, true, false),
},
{
Config: configGeoShardedOldSchema(orgID, projectName, clusterName, 3, 3, false),
- Check: checkGeoShardedOldSchema(clusterName, 3, 3, checkNewAttributes, false),
+ Check: checkGeoShardedOldSchema(clusterName, 3, 3, true, false),
},
},
}
@@ -600,16 +600,16 @@ func TestAccClusterAdvancedClusterConfig_symmetricShardedNewSchemaToAsymmetricAd
CheckDestroy: acc.CheckDestroyCluster,
Steps: []resource.TestStep{
{
- Config: configShardedNewSchema(orgID, projectName, clusterName, 50, "M30", "M30", 2000, 2000, false),
- Check: checkShardedNewSchema(50, "M30", "M30", "2000", "2000", false, false),
+ Config: configShardedNewSchema(orgID, projectName, clusterName, 50, "M10", "M10", nil, nil, false),
+ Check: checkShardedNewSchema(50, "M10", "M10", nil, nil, false, false),
},
{
- Config: configShardedNewSchema(orgID, projectName, clusterName, 55, "M30", "M40", 2000, 2500, true),
- Check: checkShardedNewSchema(55, "M30", "M40", "2000", "2500", true, true),
+ Config: configShardedNewSchema(orgID, projectName, clusterName, 55, "M10", "M20", nil, nil, true), // add middle replication spec and transition to asymmetric
+ Check: checkShardedNewSchema(55, "M10", "M20", nil, nil, true, true),
},
{
- Config: configShardedNewSchema(orgID, projectName, clusterName, 55, "M30", "M40", 2000, 2500, false), // removes middle replication spec
- Check: checkShardedNewSchema(55, "M30", "M40", "2000", "2500", true, false),
+ Config: configShardedNewSchema(orgID, projectName, clusterName, 55, "M10", "M20", nil, nil, false), // removes middle replication spec
+ Check: checkShardedNewSchema(55, "M10", "M20", nil, nil, true, false),
},
},
})
@@ -633,8 +633,8 @@ func asymmetricShardedNewSchemaTestCase(t *testing.T) resource.TestCase {
CheckDestroy: acc.CheckDestroyCluster,
Steps: []resource.TestStep{
{
- Config: configShardedNewSchema(orgID, projectName, clusterName, 50, "M30", "M40", 2000, 2500, false),
- Check: checkShardedNewSchema(50, "M30", "M40", "2000", "2500", true, false),
+ Config: configShardedNewSchema(orgID, projectName, clusterName, 50, "M30", "M40", admin.PtrInt(2000), admin.PtrInt(2500), false),
+ Check: checkShardedNewSchema(50, "M30", "M40", admin.PtrInt(2000), admin.PtrInt(2500), true, false),
},
},
}
@@ -1012,7 +1012,7 @@ func configReplicaSetMultiCloud(orgID, projectName, name string) string {
`, orgID, projectName, name)
}
-func checkReplicaSetMultiCloud(name string, regionConfigs int, verifyExternalID bool) resource.TestCheckFunc {
+func checkReplicaSetMultiCloud(name string, regionConfigs int) resource.TestCheckFunc {
additionalChecks := []resource.TestCheckFunc{
resource.TestCheckResourceAttr(resourceName, "retain_backups_enabled", "false"),
resource.TestCheckResourceAttrWith(resourceName, "replication_specs.0.region_configs.#", acc.JSONEquals(strconv.Itoa(regionConfigs))),
@@ -1021,9 +1021,7 @@ func checkReplicaSetMultiCloud(name string, regionConfigs int, verifyExternalID
resource.TestCheckResourceAttrSet(dataSourcePluralName, "results.#"),
resource.TestCheckResourceAttrSet(dataSourcePluralName, "results.0.replication_specs.#"),
resource.TestCheckResourceAttrSet(dataSourcePluralName, "results.0.name"),
- }
- if verifyExternalID {
- additionalChecks = append(additionalChecks, resource.TestCheckResourceAttrSet(resourceName, "replication_specs.0.external_id"))
+ resource.TestCheckResourceAttrSet(resourceName, "replication_specs.0.external_id"),
}
return checkAggr(
[]string{"project_id", "replication_specs.#", "replication_specs.0.id"},
@@ -1482,7 +1480,7 @@ func checkShardedOldSchemaDiskSizeGBElectableLevel(diskSizeGB int) resource.Test
})
}
-func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, firstInstanceSize, lastInstanceSize string, firstDiskIops, lastDiskIops int, includeMiddleSpec bool) string {
+func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, firstInstanceSize, lastInstanceSize string, firstDiskIOPS, lastDiskIOPS *int, includeMiddleSpec bool) string {
var thirdReplicationSpec string
if includeMiddleSpec {
thirdReplicationSpec = fmt.Sprintf(`
@@ -1505,6 +1503,20 @@ func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, fir
}
`, firstInstanceSize, diskSizeGB)
}
+ var firstDiskIOPSAttrs string
+ if firstDiskIOPS != nil {
+ firstDiskIOPSAttrs = fmt.Sprintf(`
+ disk_iops = %d
+ ebs_volume_type = "PROVISIONED"
+ `, *firstDiskIOPS)
+ }
+ var lastDiskIOPSAttrs string
+ if lastDiskIOPS != nil {
+ lastDiskIOPSAttrs = fmt.Sprintf(`
+ disk_iops = %d
+ ebs_volume_type = "PROVISIONED"
+ `, *lastDiskIOPS)
+ }
return fmt.Sprintf(`
resource "mongodbatlas_project" "cluster_project" {
org_id = %[1]q
@@ -1521,10 +1533,9 @@ func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, fir
region_configs {
electable_specs {
instance_size = %[4]q
- disk_iops = %[6]d
- ebs_volume_type = "PROVISIONED"
node_count = 3
disk_size_gb = %[9]d
+ %[6]s
}
analytics_specs {
instance_size = %[4]q
@@ -1543,10 +1554,9 @@ func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, fir
region_configs {
electable_specs {
instance_size = %[5]q
- disk_iops = %[7]d
- ebs_volume_type = "PROVISIONED"
node_count = 3
disk_size_gb = %[9]d
+ %[7]s
}
analytics_specs {
instance_size = %[5]q
@@ -1570,10 +1580,10 @@ func configShardedNewSchema(orgID, projectName, name string, diskSizeGB int, fir
project_id = mongodbatlas_advanced_cluster.test.project_id
use_replication_spec_per_shard = true
}
- `, orgID, projectName, name, firstInstanceSize, lastInstanceSize, firstDiskIops, lastDiskIops, thirdReplicationSpec, diskSizeGB)
+ `, orgID, projectName, name, firstInstanceSize, lastInstanceSize, firstDiskIOPSAttrs, lastDiskIOPSAttrs, thirdReplicationSpec, diskSizeGB)
}
-func checkShardedNewSchema(diskSizeGB int, firstInstanceSize, lastInstanceSize, firstDiskIops, lastDiskIops string, isAsymmetricCluster, includeMiddleSpec bool) resource.TestCheckFunc {
+func checkShardedNewSchema(diskSizeGB int, firstInstanceSize, lastInstanceSize string, firstDiskIops, lastDiskIops *int, isAsymmetricCluster, includeMiddleSpec bool) resource.TestCheckFunc {
amtOfReplicationSpecs := 2
if includeMiddleSpec {
amtOfReplicationSpecs = 3
@@ -1593,8 +1603,12 @@ func checkShardedNewSchema(diskSizeGB int, firstInstanceSize, lastInstanceSize,
fmt.Sprintf("replication_specs.%d.region_configs.0.electable_specs.0.disk_size_gb", lastSpecIndex): fmt.Sprintf("%d", diskSizeGB),
"replication_specs.0.region_configs.0.analytics_specs.0.disk_size_gb": fmt.Sprintf("%d", diskSizeGB),
fmt.Sprintf("replication_specs.%d.region_configs.0.analytics_specs.0.disk_size_gb", lastSpecIndex): fmt.Sprintf("%d", diskSizeGB),
- "replication_specs.0.region_configs.0.electable_specs.0.disk_iops": firstDiskIops,
- fmt.Sprintf("replication_specs.%d.region_configs.0.electable_specs.0.disk_iops", lastSpecIndex): lastDiskIops,
+ }
+ if firstDiskIops != nil {
+ clusterChecks["replication_specs.0.region_configs.0.electable_specs.0.disk_iops"] = fmt.Sprintf("%d", *firstDiskIops)
+ }
+ if lastDiskIops != nil {
+ clusterChecks[fmt.Sprintf("replication_specs.%d.region_configs.0.electable_specs.0.disk_iops", lastSpecIndex)] = fmt.Sprintf("%d", *lastDiskIops)
}
// plural data source checks
diff --git a/internal/service/advancedcluster/resource_update_logic.go b/internal/service/advancedcluster/resource_update_logic.go
index 146fe729ad..d518494042 100644
--- a/internal/service/advancedcluster/resource_update_logic.go
+++ b/internal/service/advancedcluster/resource_update_logic.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func noIDsPopulatedInReplicationSpecs(replicationSpecs *[]admin.ReplicationSpec20240805) bool {
diff --git a/internal/service/advancedcluster/resource_update_logic_test.go b/internal/service/advancedcluster/resource_update_logic_test.go
index 009e51e55d..f9986b8b13 100644
--- a/internal/service/advancedcluster/resource_update_logic_test.go
+++ b/internal/service/advancedcluster/resource_update_logic_test.go
@@ -5,7 +5,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/advancedcluster"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAddIDsToReplicationSpecs(t *testing.T) {
diff --git a/internal/service/alertconfiguration/data_source_alert_configuration.go b/internal/service/alertconfiguration/data_source_alert_configuration.go
index 8909a10c18..182fcf0099 100644
--- a/internal/service/alertconfiguration/data_source_alert_configuration.go
+++ b/internal/service/alertconfiguration/data_source_alert_configuration.go
@@ -14,7 +14,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/zclconf/go-cty/cty"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var _ datasource.DataSource = &alertConfigurationDS{}
diff --git a/internal/service/alertconfiguration/data_source_alert_configurations.go b/internal/service/alertconfiguration/data_source_alert_configurations.go
index f3ab30d2bf..2161f7979c 100644
--- a/internal/service/alertconfiguration/data_source_alert_configurations.go
+++ b/internal/service/alertconfiguration/data_source_alert_configurations.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const alertConfigurationsDataSourceName = "alert_configurations"
diff --git a/internal/service/alertconfiguration/model_alert_configuration.go b/internal/service/alertconfiguration/model_alert_configuration.go
index 2c7e6571e5..4f7fca83cd 100644
--- a/internal/service/alertconfiguration/model_alert_configuration.go
+++ b/internal/service/alertconfiguration/model_alert_configuration.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewNotificationList(list []TfNotificationModel) (*[]admin.AlertsNotificationRootForGroup, error) {
diff --git a/internal/service/alertconfiguration/model_alert_configuration_test.go b/internal/service/alertconfiguration/model_alert_configuration_test.go
index ac63c13e83..0d8704b59f 100644
--- a/internal/service/alertconfiguration/model_alert_configuration_test.go
+++ b/internal/service/alertconfiguration/model_alert_configuration_test.go
@@ -7,7 +7,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/alertconfiguration"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/alertconfiguration/resource_alert_configuration.go b/internal/service/alertconfiguration/resource_alert_configuration.go
index 24080129b6..de1cd6e7c0 100644
--- a/internal/service/alertconfiguration/resource_alert_configuration.go
+++ b/internal/service/alertconfiguration/resource_alert_configuration.go
@@ -20,7 +20,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/apikey/data_source_api_keys.go b/internal/service/apikey/data_source_api_keys.go
index 19744e8f27..4e5cd62812 100644
--- a/internal/service/apikey/data_source_api_keys.go
+++ b/internal/service/apikey/data_source_api_keys.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/apikey/resource_api_key.go b/internal/service/apikey/resource_api_key.go
index f6731c64d4..c3262f870f 100644
--- a/internal/service/apikey/resource_api_key.go
+++ b/internal/service/apikey/resource_api_key.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/atlasuser/data_source_atlas_user.go b/internal/service/atlasuser/data_source_atlas_user.go
index 7a662e55e4..27c83e51a7 100644
--- a/internal/service/atlasuser/data_source_atlas_user.go
+++ b/internal/service/atlasuser/data_source_atlas_user.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/atlasuser/data_source_atlas_user_test.go b/internal/service/atlasuser/data_source_atlas_user_test.go
index 56ace2bf2d..aaa6f397a2 100644
--- a/internal/service/atlasuser/data_source_atlas_user_test.go
+++ b/internal/service/atlasuser/data_source_atlas_user_test.go
@@ -10,7 +10,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAccConfigDSAtlasUser_ByUserID(t *testing.T) {
diff --git a/internal/service/atlasuser/data_source_atlas_users.go b/internal/service/atlasuser/data_source_atlas_users.go
index e036e942b3..a5c8977d51 100644
--- a/internal/service/atlasuser/data_source_atlas_users.go
+++ b/internal/service/atlasuser/data_source_atlas_users.go
@@ -13,7 +13,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/atlasuser/data_source_atlas_users_test.go b/internal/service/atlasuser/data_source_atlas_users_test.go
index af0baf55c4..5a5ba0f55a 100644
--- a/internal/service/atlasuser/data_source_atlas_users_test.go
+++ b/internal/service/atlasuser/data_source_atlas_users_test.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/terraform"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/atlasuser"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAccConfigDSAtlasUsers_ByOrgID(t *testing.T) {
diff --git a/internal/service/auditing/resource_auditing.go b/internal/service/auditing/resource_auditing.go
index 91cffaf374..3aa3feca46 100644
--- a/internal/service/auditing/resource_auditing.go
+++ b/internal/service/auditing/resource_auditing.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/backupcompliancepolicy/resource_backup_compliance_policy.go b/internal/service/backupcompliancepolicy/resource_backup_compliance_policy.go
index 39448e2024..c63ed964d5 100644
--- a/internal/service/backupcompliancepolicy/resource_backup_compliance_policy.go
+++ b/internal/service/backupcompliancepolicy/resource_backup_compliance_policy.go
@@ -8,7 +8,7 @@ import (
"net/http"
"strings"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
diff --git a/internal/service/cloudbackupschedule/data_source_cloud_backup_schedule.go b/internal/service/cloudbackupschedule/data_source_cloud_backup_schedule.go
index 25510ef617..809d939922 100644
--- a/internal/service/cloudbackupschedule/data_source_cloud_backup_schedule.go
+++ b/internal/service/cloudbackupschedule/data_source_cloud_backup_schedule.go
@@ -8,7 +8,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/cloudbackupschedule/model_cloud_backup_schedule.go b/internal/service/cloudbackupschedule/model_cloud_backup_schedule.go
index bd8747afee..b7013bda55 100644
--- a/internal/service/cloudbackupschedule/model_cloud_backup_schedule.go
+++ b/internal/service/cloudbackupschedule/model_cloud_backup_schedule.go
@@ -2,7 +2,7 @@ package cloudbackupschedule
import (
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func FlattenPolicyItem(items []admin.DiskBackupApiPolicyItem, frequencyType string) []map[string]any {
diff --git a/internal/service/cloudbackupschedule/model_cloud_backup_schedule_test.go b/internal/service/cloudbackupschedule/model_cloud_backup_schedule_test.go
index 50304e7d5b..e573361dee 100644
--- a/internal/service/cloudbackupschedule/model_cloud_backup_schedule_test.go
+++ b/internal/service/cloudbackupschedule/model_cloud_backup_schedule_test.go
@@ -6,7 +6,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/cloudbackupschedule"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestFlattenPolicyItem(t *testing.T) {
diff --git a/internal/service/cloudbackupschedule/model_sdk_version_conversion.go b/internal/service/cloudbackupschedule/model_sdk_version_conversion.go
index 7f156507d0..5e59dd3c3b 100644
--- a/internal/service/cloudbackupschedule/model_sdk_version_conversion.go
+++ b/internal/service/cloudbackupschedule/model_sdk_version_conversion.go
@@ -2,7 +2,7 @@ package cloudbackupschedule
import (
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
// Conversions from one SDK model version to another are used to avoid duplicating our flatten/expand conversion functions.
diff --git a/internal/service/cloudbackupschedule/resource_cloud_backup_schedule.go b/internal/service/cloudbackupschedule/resource_cloud_backup_schedule.go
index c67cc55b20..f4720df14c 100644
--- a/internal/service/cloudbackupschedule/resource_cloud_backup_schedule.go
+++ b/internal/service/cloudbackupschedule/resource_cloud_backup_schedule.go
@@ -14,7 +14,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/spf13/cast"
admin20240530 "go.mongodb.org/atlas-sdk/v20240530005/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/cloudbackupsnapshot/data_source_cloud_backup_snapshots.go b/internal/service/cloudbackupsnapshot/data_source_cloud_backup_snapshots.go
index bf5283b9b2..ad0fd6f71c 100644
--- a/internal/service/cloudbackupsnapshot/data_source_cloud_backup_snapshots.go
+++ b/internal/service/cloudbackupsnapshot/data_source_cloud_backup_snapshots.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot.go b/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot.go
index 2f852f50de..8bcae4e545 100644
--- a/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot.go
+++ b/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot.go
@@ -4,7 +4,7 @@ import (
"errors"
"regexp"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func SplitSnapshotImportID(id string) (*admin.GetReplicaSetBackupApiParams, error) {
diff --git a/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot_test.go b/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot_test.go
index 8e2df8d6af..32bad1804a 100644
--- a/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot_test.go
+++ b/internal/service/cloudbackupsnapshot/model_cloud_backup_snapshot_test.go
@@ -5,7 +5,7 @@ import (
"testing"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/cloudbackupsnapshot"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestSplitSnapshotImportID(t *testing.T) {
diff --git a/internal/service/cloudbackupsnapshot/resource_cloud_backup_snapshot.go b/internal/service/cloudbackupsnapshot/resource_cloud_backup_snapshot.go
index 172f1ad22c..e8bb360817 100644
--- a/internal/service/cloudbackupsnapshot/resource_cloud_backup_snapshot.go
+++ b/internal/service/cloudbackupsnapshot/resource_cloud_backup_snapshot.go
@@ -14,7 +14,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/cluster"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotexportbucket/data_source_cloud_backup_snapshot_export_buckets.go b/internal/service/cloudbackupsnapshotexportbucket/data_source_cloud_backup_snapshot_export_buckets.go
index 7b6b5b19f3..c8d5354ad2 100644
--- a/internal/service/cloudbackupsnapshotexportbucket/data_source_cloud_backup_snapshot_export_buckets.go
+++ b/internal/service/cloudbackupsnapshotexportbucket/data_source_cloud_backup_snapshot_export_buckets.go
@@ -7,7 +7,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotexportbucket/resource_cloud_backup_snapshot_export_bucket.go b/internal/service/cloudbackupsnapshotexportbucket/resource_cloud_backup_snapshot_export_bucket.go
index cfb2fc4f74..e53fe51012 100644
--- a/internal/service/cloudbackupsnapshotexportbucket/resource_cloud_backup_snapshot_export_bucket.go
+++ b/internal/service/cloudbackupsnapshotexportbucket/resource_cloud_backup_snapshot_export_bucket.go
@@ -14,7 +14,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotexportjob/data_source_cloud_backup_snapshot_export_jobs.go b/internal/service/cloudbackupsnapshotexportjob/data_source_cloud_backup_snapshot_export_jobs.go
index a29f13d3a6..2f915200ee 100644
--- a/internal/service/cloudbackupsnapshotexportjob/data_source_cloud_backup_snapshot_export_jobs.go
+++ b/internal/service/cloudbackupsnapshotexportjob/data_source_cloud_backup_snapshot_export_jobs.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotexportjob/resource_cloud_backup_snapshot_export_job.go b/internal/service/cloudbackupsnapshotexportjob/resource_cloud_backup_snapshot_export_job.go
index 8fe4a0d7a3..063909512b 100644
--- a/internal/service/cloudbackupsnapshotexportjob/resource_cloud_backup_snapshot_export_job.go
+++ b/internal/service/cloudbackupsnapshotexportjob/resource_cloud_backup_snapshot_export_job.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotrestorejob/data_source_cloud_backup_snapshot_restore_jobs.go b/internal/service/cloudbackupsnapshotrestorejob/data_source_cloud_backup_snapshot_restore_jobs.go
index 4cfe052d43..3cc07c2eba 100644
--- a/internal/service/cloudbackupsnapshotrestorejob/data_source_cloud_backup_snapshot_restore_jobs.go
+++ b/internal/service/cloudbackupsnapshotrestorejob/data_source_cloud_backup_snapshot_restore_jobs.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/cloudbackupsnapshotrestorejob/resource_cloud_backup_snapshot_restore_job.go b/internal/service/cloudbackupsnapshotrestorejob/resource_cloud_backup_snapshot_restore_job.go
index 56a3a776d5..6700299b70 100644
--- a/internal/service/cloudbackupsnapshotrestorejob/resource_cloud_backup_snapshot_restore_job.go
+++ b/internal/service/cloudbackupsnapshotrestorejob/resource_cloud_backup_snapshot_restore_job.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/cloudprovideraccess/resource_cloud_provider_access_authorization.go b/internal/service/cloudprovideraccess/resource_cloud_provider_access_authorization.go
index 85feb002ef..f1164f6170 100644
--- a/internal/service/cloudprovideraccess/resource_cloud_provider_access_authorization.go
+++ b/internal/service/cloudprovideraccess/resource_cloud_provider_access_authorization.go
@@ -12,7 +12,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
/*
@@ -260,7 +260,7 @@ func resourceCloudProviderAccessAuthorizationStateUpgradeV0(ctx context.Context,
}
func authorizeRole(ctx context.Context, client *admin.APIClient, d *schema.ResourceData, projectID string, targetRole *admin.CloudProviderAccessRole) diag.Diagnostics {
- req := &admin.CloudProviderAccessRoleRequestUpdate{
+ req := &admin.CloudProviderAccessRole{
ProviderName: targetRole.ProviderName,
}
@@ -281,9 +281,11 @@ func authorizeRole(ctx context.Context, client *admin.APIClient, d *schema.Resou
roleID = targetRole.GetId()
}
+ var role *admin.CloudProviderAccessRole
var err error
+
for i := 0; i < 3; i++ {
- _, _, err = client.CloudProviderAccessApi.AuthorizeCloudProviderAccessRole(ctx, projectID, roleID, req).Execute()
+ role, _, err = client.CloudProviderAccessApi.AuthorizeCloudProviderAccessRole(ctx, projectID, roleID, req).Execute()
if err != nil && strings.Contains(err.Error(), "CANNOT_ASSUME_ROLE") { // aws takes time to update , in case of single path
log.Printf("warning issue performing authorize: %s \n", err.Error())
log.Println("retrying")
@@ -299,10 +301,6 @@ func authorizeRole(ctx context.Context, client *admin.APIClient, d *schema.Resou
if err != nil {
return diag.FromErr(fmt.Errorf("error cloud provider access authorization %s", err))
}
- role, _, err := client.CloudProviderAccessApi.GetCloudProviderAccessRole(ctx, projectID, roleID).Execute()
- if err != nil {
- return diag.FromErr(fmt.Errorf("error cloud provider access authorization read after authorization %s", err))
- }
authSchema := roleToSchemaAuthorization(role)
diff --git a/internal/service/cloudprovideraccess/resource_cloud_provider_access_setup.go b/internal/service/cloudprovideraccess/resource_cloud_provider_access_setup.go
index 8d3bd7fa50..a593195062 100644
--- a/internal/service/cloudprovideraccess/resource_cloud_provider_access_setup.go
+++ b/internal/service/cloudprovideraccess/resource_cloud_provider_access_setup.go
@@ -6,7 +6,7 @@ import (
"net/http"
"regexp"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
@@ -134,9 +134,8 @@ func resourceCloudProviderAccessSetupCreate(ctx context.Context, d *schema.Resou
conn := meta.(*config.MongoDBClient).AtlasV2
- providerName := d.Get("provider_name").(string)
- requestParameters := &admin.CloudProviderAccessRoleRequest{
- ProviderName: providerName,
+ requestParameters := &admin.CloudProviderAccessRole{
+ ProviderName: d.Get("provider_name").(string),
}
if value, ok := d.GetOk("azure_config.0.atlas_azure_app_id"); ok {
@@ -151,17 +150,7 @@ func resourceCloudProviderAccessSetupCreate(ctx context.Context, d *schema.Resou
requestParameters.SetTenantId(value.(string))
}
- roleCreate, _, err := conn.CloudProviderAccessApi.CreateCloudProviderAccessRole(ctx, projectID, requestParameters).Execute()
- if err != nil {
- return diag.FromErr(fmt.Errorf(errorCloudProviderAccessCreate, err))
- }
- var roleID string
- if providerName == constant.AZURE {
- roleID = roleCreate.GetId()
- } else {
- roleID = roleCreate.GetRoleId()
- }
- role, _, err := conn.CloudProviderAccessApi.GetCloudProviderAccessRole(ctx, projectID, roleID).Execute()
+ role, _, err := conn.CloudProviderAccessApi.CreateCloudProviderAccessRole(ctx, projectID, requestParameters).Execute()
if err != nil {
return diag.FromErr(fmt.Errorf(errorCloudProviderAccessCreate, err))
}
diff --git a/internal/service/cluster/data_source_cluster.go b/internal/service/cluster/data_source_cluster.go
index 82026a53aa..32b995875c 100644
--- a/internal/service/cluster/data_source_cluster.go
+++ b/internal/service/cluster/data_source_cluster.go
@@ -289,7 +289,7 @@ func DataSource() *schema.Resource {
"labels": {
Type: schema.TypeSet,
Computed: true,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/cluster/data_source_clusters.go b/internal/service/cluster/data_source_clusters.go
index ac63ed3e27..c5e8ac10da 100644
--- a/internal/service/cluster/data_source_clusters.go
+++ b/internal/service/cluster/data_source_clusters.go
@@ -292,7 +292,7 @@ func PluralDataSource() *schema.Resource {
"labels": {
Type: schema.TypeSet,
Computed: true,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/cluster/resource_cluster.go b/internal/service/cluster/resource_cluster.go
index 01a63dc42f..41f38f4da2 100644
--- a/internal/service/cluster/resource_cluster.go
+++ b/internal/service/cluster/resource_cluster.go
@@ -314,7 +314,7 @@ func Resource() *schema.Resource {
Type: schema.TypeSet,
Optional: true,
Set: advancedcluster.HashFunctionForKeyValuePair,
- Deprecated: fmt.Sprintf(constant.DeprecationParamByDateWithReplacement, "September 2024", "tags"),
+ Deprecated: fmt.Sprintf(constant.DeprecationParamFutureWithReplacement, "tags"),
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": {
diff --git a/internal/service/clusteroutagesimulation/resource_cluster_outage_simulation.go b/internal/service/clusteroutagesimulation/resource_cluster_outage_simulation.go
index d9271a7baa..6a943eab52 100644
--- a/internal/service/clusteroutagesimulation/resource_cluster_outage_simulation.go
+++ b/internal/service/clusteroutagesimulation/resource_cluster_outage_simulation.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/controlplaneipaddresses/model.go b/internal/service/controlplaneipaddresses/model.go
index e70ec902c0..a50fee8946 100644
--- a/internal/service/controlplaneipaddresses/model.go
+++ b/internal/service/controlplaneipaddresses/model.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/diag"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewTFControlPlaneIPAddresses(ctx context.Context, apiResp *admin.ControlPlaneIPAddresses) (*TFControlPlaneIpAddressesModel, diag.Diagnostics) {
diff --git a/internal/service/controlplaneipaddresses/model_test.go b/internal/service/controlplaneipaddresses/model_test.go
index 7a4e2f48ea..5c627b5120 100644
--- a/internal/service/controlplaneipaddresses/model_test.go
+++ b/internal/service/controlplaneipaddresses/model_test.go
@@ -9,7 +9,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/controlplaneipaddresses"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
type sdkToTFModelTestCase struct {
diff --git a/internal/service/customdbrole/data_source_custom_db_roles.go b/internal/service/customdbrole/data_source_custom_db_roles.go
index 3f7492bbc7..dfe78c2b79 100644
--- a/internal/service/customdbrole/data_source_custom_db_roles.go
+++ b/internal/service/customdbrole/data_source_custom_db_roles.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/customdbrole/resource_custom_db_role.go b/internal/service/customdbrole/resource_custom_db_role.go
index 4043f34be5..239ecd3fde 100644
--- a/internal/service/customdbrole/resource_custom_db_role.go
+++ b/internal/service/customdbrole/resource_custom_db_role.go
@@ -17,7 +17,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/spf13/cast"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/customdbrole/resource_custom_db_role_test.go b/internal/service/customdbrole/resource_custom_db_role_test.go
index 8e9360f71f..02809cfba5 100644
--- a/internal/service/customdbrole/resource_custom_db_role_test.go
+++ b/internal/service/customdbrole/resource_custom_db_role_test.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
"github.com/spf13/cast"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const resourceName = "mongodbatlas_custom_db_role.test"
diff --git a/internal/service/customdnsconfigurationclusteraws/resource_custom_dns_configuration_cluster_aws.go b/internal/service/customdnsconfigurationclusteraws/resource_custom_dns_configuration_cluster_aws.go
index 8fea87b8d2..488fa9bef5 100644
--- a/internal/service/customdnsconfigurationclusteraws/resource_custom_dns_configuration_cluster_aws.go
+++ b/internal/service/customdnsconfigurationclusteraws/resource_custom_dns_configuration_cluster_aws.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/databaseuser/model_database_user.go b/internal/service/databaseuser/model_database_user.go
index a27b018149..90c31d0bd9 100644
--- a/internal/service/databaseuser/model_database_user.go
+++ b/internal/service/databaseuser/model_database_user.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewMongoDBDatabaseUser(ctx context.Context, statePasswordValue types.String, dbUserModel *TfDatabaseUserModel) (*admin.CloudDatabaseUser, diag.Diagnostics) {
diff --git a/internal/service/databaseuser/model_database_user_test.go b/internal/service/databaseuser/model_database_user_test.go
index c829481f22..0b0d5602a0 100644
--- a/internal/service/databaseuser/model_database_user_test.go
+++ b/internal/service/databaseuser/model_database_user_test.go
@@ -9,7 +9,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/databaseuser"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var (
diff --git a/internal/service/databaseuser/resource_database_user_migration_test.go b/internal/service/databaseuser/resource_database_user_migration_test.go
index 6d37e4c860..3716139021 100644
--- a/internal/service/databaseuser/resource_database_user_migration_test.go
+++ b/internal/service/databaseuser/resource_database_user_migration_test.go
@@ -3,7 +3,7 @@ package databaseuser_test
import (
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
diff --git a/internal/service/databaseuser/resource_database_user_test.go b/internal/service/databaseuser/resource_database_user_test.go
index 1e614f5ec4..8281fe67fd 100644
--- a/internal/service/databaseuser/resource_database_user_test.go
+++ b/internal/service/databaseuser/resource_database_user_test.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/databaseuser"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/datalakepipeline/data_source_data_lake_pipeline_run.go b/internal/service/datalakepipeline/data_source_data_lake_pipeline_run.go
index 25bdf48651..04a5da68a6 100644
--- a/internal/service/datalakepipeline/data_source_data_lake_pipeline_run.go
+++ b/internal/service/datalakepipeline/data_source_data_lake_pipeline_run.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const errorDataLakePipelineRunRead = "error reading MongoDB Atlas DataLake Run (%s): %s"
diff --git a/internal/service/datalakepipeline/data_source_data_lake_pipeline_runs.go b/internal/service/datalakepipeline/data_source_data_lake_pipeline_runs.go
index c11ba3ae90..9c357fec0f 100644
--- a/internal/service/datalakepipeline/data_source_data_lake_pipeline_runs.go
+++ b/internal/service/datalakepipeline/data_source_data_lake_pipeline_runs.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const errorDataLakePipelineRunList = "error reading MongoDB Atlas DataLake Runs (%s): %s"
diff --git a/internal/service/datalakepipeline/data_source_data_lake_pipelines.go b/internal/service/datalakepipeline/data_source_data_lake_pipelines.go
index fb4dfffbe9..1846c35428 100644
--- a/internal/service/datalakepipeline/data_source_data_lake_pipelines.go
+++ b/internal/service/datalakepipeline/data_source_data_lake_pipelines.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const errorDataLakePipelineList = "error creating MongoDB Atlas DataLake Pipelines: %s"
diff --git a/internal/service/datalakepipeline/resource_data_lake_pipeline.go b/internal/service/datalakepipeline/resource_data_lake_pipeline.go
index dcb97f9268..0420997a30 100644
--- a/internal/service/datalakepipeline/resource_data_lake_pipeline.go
+++ b/internal/service/datalakepipeline/resource_data_lake_pipeline.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/encryptionatrest/data_source_schema.go b/internal/service/encryptionatrest/data_source_schema.go
index 4d83bebd53..2c3c5e8267 100644
--- a/internal/service/encryptionatrest/data_source_schema.go
+++ b/internal/service/encryptionatrest/data_source_schema.go
@@ -3,7 +3,7 @@ package encryptionatrest
import (
"context"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
"github.com/hashicorp/terraform-plugin-framework/types"
diff --git a/internal/service/encryptionatrest/model.go b/internal/service/encryptionatrest/model.go
index d2e268410f..3a3fddbce7 100644
--- a/internal/service/encryptionatrest/model.go
+++ b/internal/service/encryptionatrest/model.go
@@ -3,7 +3,7 @@ package encryptionatrest
import (
"context"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/types"
diff --git a/internal/service/encryptionatrest/model_test.go b/internal/service/encryptionatrest/model_test.go
index eb3fdf6d2e..0d78ad05ad 100644
--- a/internal/service/encryptionatrest/model_test.go
+++ b/internal/service/encryptionatrest/model_test.go
@@ -4,12 +4,11 @@ import (
"context"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
-
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/stretchr/testify/assert"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/encryptionatrest"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var (
diff --git a/internal/service/encryptionatrest/resource.go b/internal/service/encryptionatrest/resource.go
index d8840fe92b..0370d0af3c 100644
--- a/internal/service/encryptionatrest/resource.go
+++ b/internal/service/encryptionatrest/resource.go
@@ -9,8 +9,6 @@ import (
"reflect"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
-
"github.com/hashicorp/terraform-plugin-framework-validators/listvalidator"
"github.com/hashicorp/terraform-plugin-framework/path"
"github.com/hashicorp/terraform-plugin-framework/resource"
@@ -27,6 +25,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/validate"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/project"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/encryptionatrest/resource_migration_test.go b/internal/service/encryptionatrest/resource_migration_test.go
index 671cc702a9..e2e2ab2ec7 100644
--- a/internal/service/encryptionatrest/resource_migration_test.go
+++ b/internal/service/encryptionatrest/resource_migration_test.go
@@ -5,14 +5,13 @@ import (
"os"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
-
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/plancheck"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/mig"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestMigEncryptionAtRest_basicAWS(t *testing.T) {
diff --git a/internal/service/encryptionatrest/resource_test.go b/internal/service/encryptionatrest/resource_test.go
index 6483155ab3..c175313c03 100644
--- a/internal/service/encryptionatrest/resource_test.go
+++ b/internal/service/encryptionatrest/resource_test.go
@@ -8,19 +8,18 @@ import (
"strconv"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
-
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
- "github.com/stretchr/testify/assert"
- "github.com/stretchr/testify/mock"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/retrystrategy"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/encryptionatrest"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
+ "github.com/stretchr/testify/assert"
+ "github.com/stretchr/testify/mock"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
)
const (
diff --git a/internal/service/encryptionatrestprivateendpoint/data_source_schema.go b/internal/service/encryptionatrestprivateendpoint/data_source_schema.go
index a928dcc174..cf4afc4b11 100644
--- a/internal/service/encryptionatrestprivateendpoint/data_source_schema.go
+++ b/internal/service/encryptionatrestprivateendpoint/data_source_schema.go
@@ -28,8 +28,8 @@ func DSAttributes(withArguments bool) map[string]schema.Attribute {
"project_id": schema.StringAttribute{
Required: withArguments,
Computed: !withArguments,
- Description: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
- MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
+ Description: "Unique 24-hexadecimal digit string that identifies your project.",
+ MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project.",
},
"id": schema.StringAttribute{
Required: withArguments,
diff --git a/internal/service/encryptionatrestprivateendpoint/model.go b/internal/service/encryptionatrestprivateendpoint/model.go
index 2ed3087a68..a509b18c84 100644
--- a/internal/service/encryptionatrestprivateendpoint/model.go
+++ b/internal/service/encryptionatrestprivateendpoint/model.go
@@ -3,7 +3,7 @@ package encryptionatrestprivateendpoint
import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewTFEarPrivateEndpoint(apiResp admin.EARPrivateEndpoint, projectID string) TFEarPrivateEndpointModel {
diff --git a/internal/service/encryptionatrestprivateendpoint/model_test.go b/internal/service/encryptionatrestprivateendpoint/model_test.go
index ed265f9ae2..33a13cc4e8 100644
--- a/internal/service/encryptionatrestprivateendpoint/model_test.go
+++ b/internal/service/encryptionatrestprivateendpoint/model_test.go
@@ -3,7 +3,7 @@ package encryptionatrestprivateendpoint_test
import (
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/stretchr/testify/assert"
diff --git a/internal/service/encryptionatrestprivateendpoint/plural_data_source.go b/internal/service/encryptionatrestprivateendpoint/plural_data_source.go
index 779d653138..77caf87394 100644
--- a/internal/service/encryptionatrestprivateendpoint/plural_data_source.go
+++ b/internal/service/encryptionatrestprivateendpoint/plural_data_source.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/datasource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/dsschema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var _ datasource.DataSource = &encryptionAtRestPrivateEndpointsDS{}
diff --git a/internal/service/encryptionatrestprivateendpoint/pural_data_source_schema.go b/internal/service/encryptionatrestprivateendpoint/pural_data_source_schema.go
index fe3d734981..bacabb9e43 100644
--- a/internal/service/encryptionatrestprivateendpoint/pural_data_source_schema.go
+++ b/internal/service/encryptionatrestprivateendpoint/pural_data_source_schema.go
@@ -12,17 +12,17 @@ func PluralDataSourceSchema(ctx context.Context) schema.Schema {
Attributes: map[string]schema.Attribute{
"cloud_provider": schema.StringAttribute{
Required: true,
- Description: "Human-readable label that identifies the cloud provider for the private endpoints to return.",
+ Description: "Label that identifies the cloud provider for the private endpoints to return.",
MarkdownDescription: "Human-readable label that identifies the cloud provider for the private endpoints to return.",
},
"project_id": schema.StringAttribute{
Required: true,
- Description: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
- MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
+ Description: "Unique 24-hexadecimal digit string that identifies your project.",
+ MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project.",
},
"results": schema.ListNestedAttribute{
NestedObject: schema.NestedAttributeObject{
- Attributes: DSAttributes(true),
+ Attributes: DSAttributes(false),
},
Computed: true,
Description: "List of returned documents that MongoDB Cloud providers when completing this request.",
diff --git a/internal/service/encryptionatrestprivateendpoint/resource.go b/internal/service/encryptionatrestprivateendpoint/resource.go
index 0a23e9b14d..01940d51ef 100644
--- a/internal/service/encryptionatrestprivateendpoint/resource.go
+++ b/internal/service/encryptionatrestprivateendpoint/resource.go
@@ -3,21 +3,26 @@ package encryptionatrestprivateendpoint
import (
"context"
"errors"
- "fmt"
"net/http"
"regexp"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+
+ "github.com/hashicorp/terraform-plugin-framework/diag"
"github.com/hashicorp/terraform-plugin-framework/path"
"github.com/hashicorp/terraform-plugin-framework/resource"
+
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/retrystrategy"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
)
const (
encryptionAtRestPrivateEndpointName = "encryption_at_rest_private_endpoint"
warnUnsupportedOperation = "Operation not supported"
- failedStatusErrorMessage = "Private endpoint is in a failed status"
+ FailedStatusErrorMessageSummary = "Private endpoint is in a failed status"
+ NonEmptyErrorMessageFieldSummary = "Something went wrong. Please review the `status` field of this resource"
+ PendingAcceptanceWarnMsgSummary = "Private endpoint may be in PENDING_ACCEPTANCE status"
+ PendingAcceptanceWarnMsg = "Please ensure to approve the private endpoint connection. If recently approved or deleted the endpoint, please ignore this warning & wait for a few minutes for the status to update."
)
var _ resource.ResourceWithConfigure = &encryptionAtRestPrivateEndpointRS{}
@@ -64,9 +69,9 @@ func (r *encryptionAtRestPrivateEndpointRS) Create(ctx context.Context, req reso
privateEndpointModel := NewTFEarPrivateEndpoint(*finalResp, projectID)
resp.Diagnostics.Append(resp.State.Set(ctx, privateEndpointModel)...)
- if err := getErrorMsgForFailedStatus(finalResp); err != nil {
- resp.Diagnostics.AddError(failedStatusErrorMessage, err.Error())
- }
+
+ diags := CheckErrorMessageAndStatus(finalResp)
+ resp.Diagnostics.Append(diags...)
}
func (r *encryptionAtRestPrivateEndpointRS) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
@@ -92,9 +97,9 @@ func (r *encryptionAtRestPrivateEndpointRS) Read(ctx context.Context, req resour
}
resp.Diagnostics.Append(resp.State.Set(ctx, NewTFEarPrivateEndpoint(*endpointModel, projectID))...)
- if err := getErrorMsgForFailedStatus(endpointModel); err != nil {
- resp.Diagnostics.AddError(failedStatusErrorMessage, err.Error())
- }
+
+ diags := CheckErrorMessageAndStatus(endpointModel)
+ resp.Diagnostics.Append(diags...)
}
func (r *encryptionAtRestPrivateEndpointRS) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
@@ -122,9 +127,9 @@ func (r *encryptionAtRestPrivateEndpointRS) Delete(ctx context.Context, req reso
resp.Diagnostics.AddError("error when waiting for status transition in delete", err.Error())
return
}
- if err := getErrorMsgForFailedStatus(model); err != nil {
- resp.Diagnostics.AddError(failedStatusErrorMessage, err.Error())
- }
+
+ diags := CheckErrorMessageAndStatus(model)
+ resp.Diagnostics.Append(diags...)
}
func (r *encryptionAtRestPrivateEndpointRS) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) {
@@ -154,10 +159,17 @@ func splitEncryptionAtRestPrivateEndpointImportID(id string) (projectID, cloudPr
return
}
-func getErrorMsgForFailedStatus(model *admin.EARPrivateEndpoint) error {
- if model.GetStatus() != retrystrategy.RetryStrategyFailedState {
- return nil
+func CheckErrorMessageAndStatus(model *admin.EARPrivateEndpoint) diag.Diagnostics {
+ var diags diag.Diagnostics
+
+ switch {
+ case model.GetStatus() == retrystrategy.RetryStrategyFailedState:
+ diags = append(diags, diag.NewErrorDiagnostic(FailedStatusErrorMessageSummary, model.GetErrorMessage()))
+ case model.GetErrorMessage() != "":
+ diags = append(diags, diag.NewWarningDiagnostic(NonEmptyErrorMessageFieldSummary, model.GetErrorMessage()))
+ case model.GetStatus() == retrystrategy.RetryStrategyPendingAcceptanceState:
+ diags = append(diags, diag.NewWarningDiagnostic(PendingAcceptanceWarnMsgSummary, PendingAcceptanceWarnMsg))
}
- msg := model.GetErrorMessage()
- return fmt.Errorf("detail of error message: %s", msg)
+
+ return diags
}
diff --git a/internal/service/encryptionatrestprivateendpoint/resource_schema.go b/internal/service/encryptionatrestprivateendpoint/resource_schema.go
index 15fd40ed48..11b85983c3 100644
--- a/internal/service/encryptionatrestprivateendpoint/resource_schema.go
+++ b/internal/service/encryptionatrestprivateendpoint/resource_schema.go
@@ -22,8 +22,8 @@ func ResourceSchema(ctx context.Context) schema.Schema {
},
"project_id": schema.StringAttribute{
Required: true,
- Description: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
- MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project. Use the [/groups](#tag/Projects/operation/listProjects) endpoint to retrieve all projects to which the authenticated user has access.\n\n**NOTE**: Groups and projects are synonymous terms. Your group id is the same as your project id. For existing groups, your group/project id remains the same. The resource and corresponding endpoints use the term groups.",
+ Description: "Unique 24-hexadecimal digit string that identifies your project.",
+ MarkdownDescription: "Unique 24-hexadecimal digit string that identifies your project.",
},
"id": schema.StringAttribute{
Computed: true,
diff --git a/internal/service/encryptionatrestprivateendpoint/resource_test.go b/internal/service/encryptionatrestprivateendpoint/resource_test.go
index 32bccd1b66..15c0f432eb 100644
--- a/internal/service/encryptionatrestprivateendpoint/resource_test.go
+++ b/internal/service/encryptionatrestprivateendpoint/resource_test.go
@@ -6,12 +6,17 @@ import (
"os"
"testing"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+
+ "github.com/hashicorp/terraform-plugin-framework/diag"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
+ "github.com/stretchr/testify/assert"
+
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/retrystrategy"
+ "github.com/mongodb/terraform-provider-mongodbatlas/internal/service/encryptionatrestprivateendpoint"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
)
const (
@@ -108,6 +113,67 @@ func TestAccEncryptionAtRestPrivateEndpoint_transitionPublicToPrivateNetwork(t *
})
}
+type errMsgTestCase struct {
+ SDKResp *admin.EARPrivateEndpoint
+ diags diag.Diagnostics
+}
+
+func TestCheckErrorMessageAndStatus(t *testing.T) {
+ var defaultDiags diag.Diagnostics
+
+ testCases := map[string]errMsgTestCase{
+ "FAILED status with no error_message": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: nil,
+ Status: admin.PtrString(retrystrategy.RetryStrategyFailedState),
+ },
+ diags: append(defaultDiags, diag.NewErrorDiagnostic(encryptionatrestprivateendpoint.FailedStatusErrorMessageSummary, "")),
+ },
+ "FAILED status with error_message": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: admin.PtrString("test err message"),
+ Status: admin.PtrString(retrystrategy.RetryStrategyFailedState),
+ },
+ diags: append(defaultDiags, diag.NewErrorDiagnostic(encryptionatrestprivateendpoint.FailedStatusErrorMessageSummary, "test err message")),
+ },
+ "non-empty error_message": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: admin.PtrString("private endpoint was rejected"),
+ Status: admin.PtrString(retrystrategy.RetryStrategyPendingRecreationState),
+ },
+ diags: append(defaultDiags, diag.NewWarningDiagnostic(encryptionatrestprivateendpoint.NonEmptyErrorMessageFieldSummary, "private endpoint was rejected")),
+ },
+ "nil error_message": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: nil,
+ Status: admin.PtrString(retrystrategy.RetryStrategyActiveState),
+ },
+ diags: defaultDiags,
+ },
+ "empty error_message": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: admin.PtrString(""),
+ Status: admin.PtrString(retrystrategy.RetryStrategyActiveState),
+ },
+ diags: defaultDiags,
+ },
+ "pending acceptance status": {
+ SDKResp: &admin.EARPrivateEndpoint{
+ ErrorMessage: admin.PtrString(""),
+ Status: admin.PtrString(retrystrategy.RetryStrategyPendingAcceptanceState),
+ },
+ diags: append(defaultDiags, diag.NewWarningDiagnostic(encryptionatrestprivateendpoint.PendingAcceptanceWarnMsgSummary, encryptionatrestprivateendpoint.PendingAcceptanceWarnMsg)),
+ },
+ }
+
+ for testName, tc := range testCases {
+ t.Run(testName, func(t *testing.T) {
+ diags := encryptionatrestprivateendpoint.CheckErrorMessageAndStatus(tc.SDKResp)
+ assert.Equal(t, tc.diags, diags, "diagnostics did not match expected output")
+ })
+ }
+}
+
func importStateIDFunc(resourceName string) resource.ImportStateIdFunc {
return func(s *terraform.State) (string, error) {
rs, ok := s.RootModule().Resources[resourceName]
diff --git a/internal/service/encryptionatrestprivateendpoint/state_transition.go b/internal/service/encryptionatrestprivateendpoint/state_transition.go
index 26aaba312f..73bb5e1f20 100644
--- a/internal/service/encryptionatrestprivateendpoint/state_transition.go
+++ b/internal/service/encryptionatrestprivateendpoint/state_transition.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/retrystrategy"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/encryptionatrestprivateendpoint/state_transition_test.go b/internal/service/encryptionatrestprivateendpoint/state_transition_test.go
index 8cd5792811..f06308b48c 100644
--- a/internal/service/encryptionatrestprivateendpoint/state_transition_test.go
+++ b/internal/service/encryptionatrestprivateendpoint/state_transition_test.go
@@ -13,8 +13,8 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/encryptionatrestprivateendpoint"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
)
type testCase struct {
diff --git a/internal/service/federateddatabaseinstance/data_source_federated_database_instance_test.go b/internal/service/federateddatabaseinstance/data_source_federated_database_instance_test.go
index 1f91f587f2..70c22fd762 100644
--- a/internal/service/federateddatabaseinstance/data_source_federated_database_instance_test.go
+++ b/internal/service/federateddatabaseinstance/data_source_federated_database_instance_test.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/terraform"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAccFederatedDatabaseInstanceDS_s3Bucket(t *testing.T) {
diff --git a/internal/service/federateddatabaseinstance/data_source_federated_database_instances.go b/internal/service/federateddatabaseinstance/data_source_federated_database_instances.go
index aa29744694..78f37148ca 100644
--- a/internal/service/federateddatabaseinstance/data_source_federated_database_instances.go
+++ b/internal/service/federateddatabaseinstance/data_source_federated_database_instances.go
@@ -4,7 +4,7 @@ import (
"context"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
diff --git a/internal/service/federateddatabaseinstance/resource_federated_database_instance.go b/internal/service/federateddatabaseinstance/resource_federated_database_instance.go
index 647b7629a8..9dde38f38f 100644
--- a/internal/service/federateddatabaseinstance/resource_federated_database_instance.go
+++ b/internal/service/federateddatabaseinstance/resource_federated_database_instance.go
@@ -7,7 +7,7 @@ import (
"net/http"
"strings"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
diff --git a/internal/service/federatedquerylimit/data_source_federated_query_limits.go b/internal/service/federatedquerylimit/data_source_federated_query_limits.go
index c270ed8c99..7886c003ae 100644
--- a/internal/service/federatedquerylimit/data_source_federated_query_limits.go
+++ b/internal/service/federatedquerylimit/data_source_federated_query_limits.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/federatedquerylimit/resource_federated_query_limit.go b/internal/service/federatedquerylimit/resource_federated_query_limit.go
index 9e8c744a26..02f2c778c9 100644
--- a/internal/service/federatedquerylimit/resource_federated_query_limit.go
+++ b/internal/service/federatedquerylimit/resource_federated_query_limit.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/federatedsettingsidentityprovider/data_source_federated_settings_identity_providers.go b/internal/service/federatedsettingsidentityprovider/data_source_federated_settings_identity_providers.go
index a393063e14..d29e30d07d 100644
--- a/internal/service/federatedsettingsidentityprovider/data_source_federated_settings_identity_providers.go
+++ b/internal/service/federatedsettingsidentityprovider/data_source_federated_settings_identity_providers.go
@@ -5,7 +5,7 @@ import (
"errors"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
diff --git a/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider.go b/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider.go
index a307e73983..9fe7309679 100644
--- a/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider.go
+++ b/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider.go
@@ -4,7 +4,7 @@ import (
"sort"
"strings"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
diff --git a/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider_test.go b/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider_test.go
index a1505b9d89..c6d031a19b 100644
--- a/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider_test.go
+++ b/internal/service/federatedsettingsidentityprovider/model_federated_settings_identity_provider_test.go
@@ -4,7 +4,7 @@ import (
"testing"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/stretchr/testify/assert"
diff --git a/internal/service/federatedsettingsorgconfig/data_source_federated_settings.go b/internal/service/federatedsettingsorgconfig/data_source_federated_settings.go
index e930171af6..9bb62d1314 100644
--- a/internal/service/federatedsettingsorgconfig/data_source_federated_settings.go
+++ b/internal/service/federatedsettingsorgconfig/data_source_federated_settings.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func DataSourceSettings() *schema.Resource {
diff --git a/internal/service/federatedsettingsorgconfig/data_source_federated_settings_connected_orgs.go b/internal/service/federatedsettingsorgconfig/data_source_federated_settings_connected_orgs.go
index 0aca97e00f..a07b937981 100644
--- a/internal/service/federatedsettingsorgconfig/data_source_federated_settings_connected_orgs.go
+++ b/internal/service/federatedsettingsorgconfig/data_source_federated_settings_connected_orgs.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/federatedsettingsorgconfig/model_federated_settings_connected_orgs.go b/internal/service/federatedsettingsorgconfig/model_federated_settings_connected_orgs.go
index d9a8ab937d..c52b653185 100644
--- a/internal/service/federatedsettingsorgconfig/model_federated_settings_connected_orgs.go
+++ b/internal/service/federatedsettingsorgconfig/model_federated_settings_connected_orgs.go
@@ -4,7 +4,7 @@ import (
"sort"
"strings"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
type roleMappingsByGroupName []admin.AuthFederationRoleMapping
diff --git a/internal/service/federatedsettingsorgrolemapping/data_source_federated_settings_org_role_mappings.go b/internal/service/federatedsettingsorgrolemapping/data_source_federated_settings_org_role_mappings.go
index ae8241e996..bd383db6fc 100644
--- a/internal/service/federatedsettingsorgrolemapping/data_source_federated_settings_org_role_mappings.go
+++ b/internal/service/federatedsettingsorgrolemapping/data_source_federated_settings_org_role_mappings.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/federatedsettingsorgrolemapping/model_federated_settings_org_role_mapping.go b/internal/service/federatedsettingsorgrolemapping/model_federated_settings_org_role_mapping.go
index 5a0208f843..3a5f2bffc6 100644
--- a/internal/service/federatedsettingsorgrolemapping/model_federated_settings_org_role_mapping.go
+++ b/internal/service/federatedsettingsorgrolemapping/model_federated_settings_org_role_mapping.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
type mRoleAssignment []admin.RoleAssignment
diff --git a/internal/service/federatedsettingsorgrolemapping/resource_federated_settings_org_role_mapping.go b/internal/service/federatedsettingsorgrolemapping/resource_federated_settings_org_role_mapping.go
index fb5512dd1d..1f0282aa08 100644
--- a/internal/service/federatedsettingsorgrolemapping/resource_federated_settings_org_role_mapping.go
+++ b/internal/service/federatedsettingsorgrolemapping/resource_federated_settings_org_role_mapping.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/ldapconfiguration/resource_ldap_configuration.go b/internal/service/ldapconfiguration/resource_ldap_configuration.go
index 9182281009..191f89e92e 100644
--- a/internal/service/ldapconfiguration/resource_ldap_configuration.go
+++ b/internal/service/ldapconfiguration/resource_ldap_configuration.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/ldapverify/resource_ldap_verify.go b/internal/service/ldapverify/resource_ldap_verify.go
index e199c63e97..3e485ab487 100644
--- a/internal/service/ldapverify/resource_ldap_verify.go
+++ b/internal/service/ldapverify/resource_ldap_verify.go
@@ -13,7 +13,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/maintenancewindow/resource_maintenance_window.go b/internal/service/maintenancewindow/resource_maintenance_window.go
index ca60b6cce1..7e0ba44162 100644
--- a/internal/service/maintenancewindow/resource_maintenance_window.go
+++ b/internal/service/maintenancewindow/resource_maintenance_window.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/spf13/cast"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/networkcontainer/data_source_network_containers.go b/internal/service/networkcontainer/data_source_network_containers.go
index ad5218c2cf..ece872b189 100644
--- a/internal/service/networkcontainer/data_source_network_containers.go
+++ b/internal/service/networkcontainer/data_source_network_containers.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/networkcontainer/resource_network_container.go b/internal/service/networkcontainer/resource_network_container.go
index e404ff7df1..b597e8fb77 100644
--- a/internal/service/networkcontainer/resource_network_container.go
+++ b/internal/service/networkcontainer/resource_network_container.go
@@ -17,7 +17,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/spf13/cast"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/networkpeering/data_source_network_peering.go b/internal/service/networkpeering/data_source_network_peering.go
index f596831578..b8dfc33259 100644
--- a/internal/service/networkpeering/data_source_network_peering.go
+++ b/internal/service/networkpeering/data_source_network_peering.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func DataSource() *schema.Resource {
diff --git a/internal/service/networkpeering/data_source_network_peerings.go b/internal/service/networkpeering/data_source_network_peerings.go
index 5412234217..97ef2598e6 100644
--- a/internal/service/networkpeering/data_source_network_peerings.go
+++ b/internal/service/networkpeering/data_source_network_peerings.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/networkpeering/resource_network_peering.go b/internal/service/networkpeering/resource_network_peering.go
index 23efb04908..42b417bc5a 100644
--- a/internal/service/networkpeering/resource_network_peering.go
+++ b/internal/service/networkpeering/resource_network_peering.go
@@ -16,7 +16,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/networkcontainer"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/onlinearchive/resource_online_archive.go b/internal/service/onlinearchive/resource_online_archive.go
index d93371f089..96bdded486 100644
--- a/internal/service/onlinearchive/resource_online_archive.go
+++ b/internal/service/onlinearchive/resource_online_archive.go
@@ -15,7 +15,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/organization/data_source_organizations.go b/internal/service/organization/data_source_organizations.go
index 484dab350a..4eda3355cb 100644
--- a/internal/service/organization/data_source_organizations.go
+++ b/internal/service/organization/data_source_organizations.go
@@ -5,7 +5,7 @@ import (
"fmt"
"log"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
diff --git a/internal/service/organization/resource_organization.go b/internal/service/organization/resource_organization.go
index dbeaa71c81..b8d0ae473c 100644
--- a/internal/service/organization/resource_organization.go
+++ b/internal/service/organization/resource_organization.go
@@ -6,7 +6,7 @@ import (
"log"
"net/http"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
diff --git a/internal/service/organization/resource_organization_test.go b/internal/service/organization/resource_organization_test.go
index 7b65af7ec8..3103cc900e 100644
--- a/internal/service/organization/resource_organization_test.go
+++ b/internal/service/organization/resource_organization_test.go
@@ -7,7 +7,7 @@ import (
"regexp"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
diff --git a/internal/service/orginvitation/resource_org_invitation.go b/internal/service/orginvitation/resource_org_invitation.go
index bcdc8c7c16..fc7269e84d 100644
--- a/internal/service/orginvitation/resource_org_invitation.go
+++ b/internal/service/orginvitation/resource_org_invitation.go
@@ -10,7 +10,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/privateendpointregionalmode/resource_private_endpoint_regional_mode.go b/internal/service/privateendpointregionalmode/resource_private_endpoint_regional_mode.go
index af79008157..622410d3aa 100644
--- a/internal/service/privateendpointregionalmode/resource_private_endpoint_regional_mode.go
+++ b/internal/service/privateendpointregionalmode/resource_private_endpoint_regional_mode.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/advancedcluster"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
type permCtxKey string
diff --git a/internal/service/privatelinkendpoint/resource_privatelink_endpoint.go b/internal/service/privatelinkendpoint/resource_privatelink_endpoint.go
index 261638f6a8..196b97a219 100644
--- a/internal/service/privatelinkendpoint/resource_privatelink_endpoint.go
+++ b/internal/service/privatelinkendpoint/resource_privatelink_endpoint.go
@@ -15,7 +15,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/privatelinkendpointserverless/resource_privatelink_endpoint_serverless.go b/internal/service/privatelinkendpointserverless/resource_privatelink_endpoint_serverless.go
index cf58e60062..c5a3e106d3 100644
--- a/internal/service/privatelinkendpointserverless/resource_privatelink_endpoint_serverless.go
+++ b/internal/service/privatelinkendpointserverless/resource_privatelink_endpoint_serverless.go
@@ -8,7 +8,7 @@ import (
"strings"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
diff --git a/internal/service/privatelinkendpointservice/resource_privatelink_endpoint_service.go b/internal/service/privatelinkendpointservice/resource_privatelink_endpoint_service.go
index 1de1317e79..b2ab84162b 100644
--- a/internal/service/privatelinkendpointservice/resource_privatelink_endpoint_service.go
+++ b/internal/service/privatelinkendpointservice/resource_privatelink_endpoint_service.go
@@ -16,7 +16,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/advancedcluster"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/privatelinkendpointservicedatafederationonlinearchive/data_source_privatelink_endpoint_service_data_federation_online_archives.go b/internal/service/privatelinkendpointservicedatafederationonlinearchive/data_source_privatelink_endpoint_service_data_federation_online_archives.go
index e7df9475d4..f4166db1d6 100644
--- a/internal/service/privatelinkendpointservicedatafederationonlinearchive/data_source_privatelink_endpoint_service_data_federation_online_archives.go
+++ b/internal/service/privatelinkendpointservicedatafederationonlinearchive/data_source_privatelink_endpoint_service_data_federation_online_archives.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/datalakepipeline"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const errorPrivateEndpointServiceDataFederationOnlineArchiveList = "error reading Private Endpoings for projectId %s: %s"
diff --git a/internal/service/privatelinkendpointservicedatafederationonlinearchive/resource_privatelink_endpoint_service_data_federation_online_archive.go b/internal/service/privatelinkendpointservicedatafederationonlinearchive/resource_privatelink_endpoint_service_data_federation_online_archive.go
index 0ae4f26ef8..2479acd3d0 100644
--- a/internal/service/privatelinkendpointservicedatafederationonlinearchive/resource_privatelink_endpoint_service_data_federation_online_archive.go
+++ b/internal/service/privatelinkendpointservicedatafederationonlinearchive/resource_privatelink_endpoint_service_data_federation_online_archive.go
@@ -8,7 +8,7 @@ import (
"strings"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
diff --git a/internal/service/privatelinkendpointserviceserverless/data_source_privatelink_endpoints_service_serverless.go b/internal/service/privatelinkendpointserviceserverless/data_source_privatelink_endpoints_service_serverless.go
index c162674bb5..d296549603 100644
--- a/internal/service/privatelinkendpointserviceserverless/data_source_privatelink_endpoints_service_serverless.go
+++ b/internal/service/privatelinkendpointserviceserverless/data_source_privatelink_endpoints_service_serverless.go
@@ -7,7 +7,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/privatelinkendpointserviceserverless/resource_privatelink_endpoint_service_serverless.go b/internal/service/privatelinkendpointserviceserverless/resource_privatelink_endpoint_service_serverless.go
index 4f87ceecfc..b2bf1fc489 100644
--- a/internal/service/privatelinkendpointserviceserverless/resource_privatelink_endpoint_service_serverless.go
+++ b/internal/service/privatelinkendpointserviceserverless/resource_privatelink_endpoint_service_serverless.go
@@ -8,7 +8,7 @@ import (
"strings"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
diff --git a/internal/service/project/data_source_project.go b/internal/service/project/data_source_project.go
index 30bd51cdf8..085455f9dc 100644
--- a/internal/service/project/data_source_project.go
+++ b/internal/service/project/data_source_project.go
@@ -4,7 +4,7 @@ import (
"context"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
"github.com/hashicorp/terraform-plugin-framework/datasource"
diff --git a/internal/service/project/data_source_projects.go b/internal/service/project/data_source_projects.go
index e2d17eb7a4..ce18dbdf39 100644
--- a/internal/service/project/data_source_projects.go
+++ b/internal/service/project/data_source_projects.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const projectsDataSourceName = "projects"
diff --git a/internal/service/project/model_project.go b/internal/service/project/model_project.go
index 2a1ffd8e3b..349cf824bf 100644
--- a/internal/service/project/model_project.go
+++ b/internal/service/project/model_project.go
@@ -3,7 +3,7 @@ package project
import (
"context"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/attr"
"github.com/hashicorp/terraform-plugin-framework/diag"
diff --git a/internal/service/project/model_project_test.go b/internal/service/project/model_project_test.go
index ec139f2309..4a8a0a3928 100644
--- a/internal/service/project/model_project_test.go
+++ b/internal/service/project/model_project_test.go
@@ -4,7 +4,7 @@ import (
"context"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/attr"
"github.com/hashicorp/terraform-plugin-framework/types"
diff --git a/internal/service/project/resource_project.go b/internal/service/project/resource_project.go
index bc7671807d..e826dacc07 100644
--- a/internal/service/project/resource_project.go
+++ b/internal/service/project/resource_project.go
@@ -9,7 +9,7 @@ import (
"sort"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/attr"
"github.com/hashicorp/terraform-plugin-framework/path"
diff --git a/internal/service/project/resource_project_migration_test.go b/internal/service/project/resource_project_migration_test.go
index 76b5042f63..a6f48dde23 100644
--- a/internal/service/project/resource_project_migration_test.go
+++ b/internal/service/project/resource_project_migration_test.go
@@ -7,7 +7,7 @@ import (
"strings"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
diff --git a/internal/service/project/resource_project_test.go b/internal/service/project/resource_project_test.go
index ef63f2852b..a4819cbde4 100644
--- a/internal/service/project/resource_project_test.go
+++ b/internal/service/project/resource_project_test.go
@@ -11,8 +11,8 @@ import (
"strings"
"testing"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
diff --git a/internal/service/projectapikey/data_source_project_api_keys.go b/internal/service/projectapikey/data_source_project_api_keys.go
index 55af1f551b..5b8e143c37 100644
--- a/internal/service/projectapikey/data_source_project_api_keys.go
+++ b/internal/service/projectapikey/data_source_project_api_keys.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/projectapikey/resource_project_api_key.go b/internal/service/projectapikey/resource_project_api_key.go
index f4a6b12c1d..f6bf7d3757 100644
--- a/internal/service/projectapikey/resource_project_api_key.go
+++ b/internal/service/projectapikey/resource_project_api_key.go
@@ -11,7 +11,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/projectinvitation/resource_project_invitation.go b/internal/service/projectinvitation/resource_project_invitation.go
index 8ca1b7c199..37557b3f09 100644
--- a/internal/service/projectinvitation/resource_project_invitation.go
+++ b/internal/service/projectinvitation/resource_project_invitation.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func Resource() *schema.Resource {
diff --git a/internal/service/projectipaccesslist/model_project_ip_access_list.go b/internal/service/projectipaccesslist/model_project_ip_access_list.go
index 12c7bae998..5c1c7076fd 100644
--- a/internal/service/projectipaccesslist/model_project_ip_access_list.go
+++ b/internal/service/projectipaccesslist/model_project_ip_access_list.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/diag"
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewMongoDBProjectIPAccessList(projectIPAccessListModel *TfProjectIPAccessListModel) *[]admin.NetworkPermissionEntry {
diff --git a/internal/service/projectipaccesslist/model_project_ip_access_list_test.go b/internal/service/projectipaccesslist/model_project_ip_access_list_test.go
index e51f4a4787..a506d05713 100644
--- a/internal/service/projectipaccesslist/model_project_ip_access_list_test.go
+++ b/internal/service/projectipaccesslist/model_project_ip_access_list_test.go
@@ -9,7 +9,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/projectipaccesslist"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var (
diff --git a/internal/service/projectipaccesslist/resource_project_ip_access_list.go b/internal/service/projectipaccesslist/resource_project_ip_access_list.go
index 144d587ce1..8be3c3bf8d 100644
--- a/internal/service/projectipaccesslist/resource_project_ip_access_list.go
+++ b/internal/service/projectipaccesslist/resource_project_ip_access_list.go
@@ -7,7 +7,7 @@ import (
"strings"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
"github.com/hashicorp/terraform-plugin-framework-validators/stringvalidator"
diff --git a/internal/service/pushbasedlogexport/model.go b/internal/service/pushbasedlogexport/model.go
index 0238196c0b..3c2106b7fd 100644
--- a/internal/service/pushbasedlogexport/model.go
+++ b/internal/service/pushbasedlogexport/model.go
@@ -3,7 +3,7 @@ package pushbasedlogexport
import (
"context"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
"github.com/hashicorp/terraform-plugin-framework/diag"
diff --git a/internal/service/pushbasedlogexport/model_test.go b/internal/service/pushbasedlogexport/model_test.go
index c0523a6c00..a967e3dd7c 100644
--- a/internal/service/pushbasedlogexport/model_test.go
+++ b/internal/service/pushbasedlogexport/model_test.go
@@ -5,7 +5,7 @@ import (
"testing"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
"github.com/hashicorp/terraform-plugin-framework/types"
diff --git a/internal/service/pushbasedlogexport/resource.go b/internal/service/pushbasedlogexport/resource.go
index dfebae9189..dc35ad1c5a 100644
--- a/internal/service/pushbasedlogexport/resource.go
+++ b/internal/service/pushbasedlogexport/resource.go
@@ -7,7 +7,7 @@ import (
"slices"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-framework/path"
"github.com/hashicorp/terraform-plugin-framework/resource"
diff --git a/internal/service/pushbasedlogexport/state_transition.go b/internal/service/pushbasedlogexport/state_transition.go
index e8c1283339..84f5c23c2e 100644
--- a/internal/service/pushbasedlogexport/state_transition.go
+++ b/internal/service/pushbasedlogexport/state_transition.go
@@ -5,7 +5,7 @@ import (
"errors"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-log/tflog"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
diff --git a/internal/service/pushbasedlogexport/state_transition_test.go b/internal/service/pushbasedlogexport/state_transition_test.go
index d49f0757b3..20d725bfdb 100644
--- a/internal/service/pushbasedlogexport/state_transition_test.go
+++ b/internal/service/pushbasedlogexport/state_transition_test.go
@@ -7,8 +7,8 @@ import (
"testing"
"time"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
diff --git a/internal/service/searchdeployment/model_search_deployment.go b/internal/service/searchdeployment/model_search_deployment.go
index 8548aacf19..90c6fcaa5b 100644
--- a/internal/service/searchdeployment/model_search_deployment.go
+++ b/internal/service/searchdeployment/model_search_deployment.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
"github.com/hashicorp/terraform-plugin-framework/diag"
"github.com/hashicorp/terraform-plugin-framework/types"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewSearchDeploymentReq(ctx context.Context, searchDeploymentPlan *TFSearchDeploymentRSModel) admin.ApiSearchDeploymentRequest {
diff --git a/internal/service/searchdeployment/model_search_deployment_test.go b/internal/service/searchdeployment/model_search_deployment_test.go
index e82b8a6ff7..716be9b7d7 100644
--- a/internal/service/searchdeployment/model_search_deployment_test.go
+++ b/internal/service/searchdeployment/model_search_deployment_test.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/hashicorp/terraform-plugin-framework/types/basetypes"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/searchdeployment"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
type sdkToTFModelTestCase struct {
diff --git a/internal/service/searchdeployment/state_transition_search_deployment.go b/internal/service/searchdeployment/state_transition_search_deployment.go
index 98c992be4c..5da0158914 100644
--- a/internal/service/searchdeployment/state_transition_search_deployment.go
+++ b/internal/service/searchdeployment/state_transition_search_deployment.go
@@ -10,7 +10,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/retrystrategy"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const SearchDeploymentDoesNotExistsError = "ATLAS_SEARCH_DEPLOYMENT_DOES_NOT_EXIST"
diff --git a/internal/service/searchdeployment/state_transition_search_deployment_test.go b/internal/service/searchdeployment/state_transition_search_deployment_test.go
index a004a1e4eb..8024a56771 100644
--- a/internal/service/searchdeployment/state_transition_search_deployment_test.go
+++ b/internal/service/searchdeployment/state_transition_search_deployment_test.go
@@ -12,8 +12,8 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/searchdeployment"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/mock"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
- "go.mongodb.org/atlas-sdk/v20240805001/mockadmin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/mockadmin"
)
var (
diff --git a/internal/service/searchindex/data_source_search_indexes.go b/internal/service/searchindex/data_source_search_indexes.go
index d3bd55bc8f..951fc6fc25 100644
--- a/internal/service/searchindex/data_source_search_indexes.go
+++ b/internal/service/searchindex/data_source_search_indexes.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/searchindex/model_search_index.go b/internal/service/searchindex/model_search_index.go
index 40f7fb4d8c..16227ea7ae 100644
--- a/internal/service/searchindex/model_search_index.go
+++ b/internal/service/searchindex/model_search_index.go
@@ -12,7 +12,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func flattenSearchIndexSynonyms(synonyms []admin.SearchSynonymMappingDefinition) []map[string]any {
diff --git a/internal/service/searchindex/resource_search_index.go b/internal/service/searchindex/resource_search_index.go
index 559202413b..f36233f052 100644
--- a/internal/service/searchindex/resource_search_index.go
+++ b/internal/service/searchindex/resource_search_index.go
@@ -13,7 +13,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/serverlessinstance/data_source_serverless_instances.go b/internal/service/serverlessinstance/data_source_serverless_instances.go
index 52f089258e..b2aacc74a5 100644
--- a/internal/service/serverlessinstance/data_source_serverless_instances.go
+++ b/internal/service/serverlessinstance/data_source_serverless_instances.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/serverlessinstance/resource_serverless_instance.go b/internal/service/serverlessinstance/resource_serverless_instance.go
index 828a7eaa03..c89b9b1abf 100644
--- a/internal/service/serverlessinstance/resource_serverless_instance.go
+++ b/internal/service/serverlessinstance/resource_serverless_instance.go
@@ -15,7 +15,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/advancedcluster"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/serverlessinstance/resource_serverless_instance_test.go b/internal/service/serverlessinstance/resource_serverless_instance_test.go
index a527d70629..c7b92a7102 100644
--- a/internal/service/serverlessinstance/resource_serverless_instance_test.go
+++ b/internal/service/serverlessinstance/resource_serverless_instance_test.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/terraform"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/sharedtier/data_source_cloud_shared_tier_restore_jobs.go b/internal/service/sharedtier/data_source_cloud_shared_tier_restore_jobs.go
index 112ecf1086..d6b4ce47fa 100644
--- a/internal/service/sharedtier/data_source_cloud_shared_tier_restore_jobs.go
+++ b/internal/service/sharedtier/data_source_cloud_shared_tier_restore_jobs.go
@@ -4,7 +4,7 @@ import (
"context"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
diff --git a/internal/service/sharedtier/data_source_shared_tier_snapshots.go b/internal/service/sharedtier/data_source_shared_tier_snapshots.go
index 7654136b99..716577d600 100644
--- a/internal/service/sharedtier/data_source_shared_tier_snapshots.go
+++ b/internal/service/sharedtier/data_source_shared_tier_snapshots.go
@@ -4,7 +4,7 @@ import (
"context"
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
diff --git a/internal/service/streamconnection/data_source_stream_connections.go b/internal/service/streamconnection/data_source_stream_connections.go
index 3800fc1052..3ac0eb0228 100644
--- a/internal/service/streamconnection/data_source_stream_connections.go
+++ b/internal/service/streamconnection/data_source_stream_connections.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/dsschema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var _ datasource.DataSource = &streamConnectionsDS{}
diff --git a/internal/service/streamconnection/data_source_stream_connections_test.go b/internal/service/streamconnection/data_source_stream_connections_test.go
index 47af9736cc..e3685654b8 100644
--- a/internal/service/streamconnection/data_source_stream_connections_test.go
+++ b/internal/service/streamconnection/data_source_stream_connections_test.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAccStreamDSStreamConnections_basic(t *testing.T) {
diff --git a/internal/service/streamconnection/model_stream_connection.go b/internal/service/streamconnection/model_stream_connection.go
index 142efd7146..bfff03b0d2 100644
--- a/internal/service/streamconnection/model_stream_connection.go
+++ b/internal/service/streamconnection/model_stream_connection.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types/basetypes"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewStreamConnectionReq(ctx context.Context, plan *TFStreamConnectionModel) (*admin.StreamsConnection, diag.Diagnostics) {
diff --git a/internal/service/streamconnection/model_stream_connection_test.go b/internal/service/streamconnection/model_stream_connection_test.go
index c60e122983..bf8de03933 100644
--- a/internal/service/streamconnection/model_stream_connection_test.go
+++ b/internal/service/streamconnection/model_stream_connection_test.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/streamconnection"
"github.com/stretchr/testify/assert"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/streaminstance/data_source_stream_instances.go b/internal/service/streaminstance/data_source_stream_instances.go
index 898ffc3ae3..4159388c6d 100644
--- a/internal/service/streaminstance/data_source_stream_instances.go
+++ b/internal/service/streaminstance/data_source_stream_instances.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/dsschema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var _ datasource.DataSource = &streamInstancesDS{}
diff --git a/internal/service/streaminstance/data_source_stream_instances_test.go b/internal/service/streaminstance/data_source_stream_instances_test.go
index 37b952ad9b..94dc32f21f 100644
--- a/internal/service/streaminstance/data_source_stream_instances_test.go
+++ b/internal/service/streaminstance/data_source_stream_instances_test.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/testutil/acc"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func TestAccStreamDSStreamInstances_basic(t *testing.T) {
diff --git a/internal/service/streaminstance/model_stream_instance.go b/internal/service/streaminstance/model_stream_instance.go
index e11f7f3c06..f8b4c4d7f4 100644
--- a/internal/service/streaminstance/model_stream_instance.go
+++ b/internal/service/streaminstance/model_stream_instance.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types/basetypes"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/id"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func NewStreamInstanceCreateReq(ctx context.Context, plan *TFStreamInstanceModel) (*admin.StreamsTenant, diag.Diagnostics) {
diff --git a/internal/service/streaminstance/model_stream_instance_test.go b/internal/service/streaminstance/model_stream_instance_test.go
index 94d69cb194..3e9ed8b95e 100644
--- a/internal/service/streaminstance/model_stream_instance_test.go
+++ b/internal/service/streaminstance/model_stream_instance_test.go
@@ -7,7 +7,7 @@ import (
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/streaminstance"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/team/data_source_team.go b/internal/service/team/data_source_team.go
index 6ac8288b76..889d4b09bb 100644
--- a/internal/service/team/data_source_team.go
+++ b/internal/service/team/data_source_team.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func DataSource() *schema.Resource {
diff --git a/internal/service/team/resource_team.go b/internal/service/team/resource_team.go
index 3fd175f037..a824e6d189 100644
--- a/internal/service/team/resource_team.go
+++ b/internal/service/team/resource_team.go
@@ -15,7 +15,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/service/thirdpartyintegration/data_source_third_party_integrations.go b/internal/service/thirdpartyintegration/data_source_third_party_integrations.go
index a4d5fcca9f..2ad05b6331 100644
--- a/internal/service/thirdpartyintegration/data_source_third_party_integrations.go
+++ b/internal/service/thirdpartyintegration/data_source_third_party_integrations.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func PluralDataSource() *schema.Resource {
diff --git a/internal/service/x509authenticationdatabaseuser/resource_x509_authentication_database_user.go b/internal/service/x509authenticationdatabaseuser/resource_x509_authentication_database_user.go
index 0044516409..35dccf6a41 100644
--- a/internal/service/x509authenticationdatabaseuser/resource_x509_authentication_database_user.go
+++ b/internal/service/x509authenticationdatabaseuser/resource_x509_authentication_database_user.go
@@ -11,7 +11,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/spf13/cast"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/testutil/acc/advanced_cluster.go b/internal/testutil/acc/advanced_cluster.go
index 95897cef6d..4e250af483 100644
--- a/internal/testutil/acc/advanced_cluster.go
+++ b/internal/testutil/acc/advanced_cluster.go
@@ -8,7 +8,7 @@ import (
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/retry"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
var (
diff --git a/internal/testutil/acc/atlas.go b/internal/testutil/acc/atlas.go
index f75fde0ee5..18ac6d7aac 100644
--- a/internal/testutil/acc/atlas.go
+++ b/internal/testutil/acc/atlas.go
@@ -10,7 +10,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/service/advancedcluster"
"github.com/stretchr/testify/require"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func createProject(tb testing.TB, name string) string {
diff --git a/internal/testutil/acc/cluster.go b/internal/testutil/acc/cluster.go
index 615a5430a1..00a29a0fe8 100644
--- a/internal/testutil/acc/cluster.go
+++ b/internal/testutil/acc/cluster.go
@@ -7,7 +7,7 @@ import (
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/constant"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/common/conversion"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
// ClusterRequest contains configuration for a cluster where all fields are optional and AddDefaults is used for required fields.
diff --git a/internal/testutil/acc/config_cluster.go b/internal/testutil/acc/config_cluster.go
index c21501224d..9a34521bc3 100644
--- a/internal/testutil/acc/config_cluster.go
+++ b/internal/testutil/acc/config_cluster.go
@@ -7,7 +7,7 @@ import (
"github.com/hashicorp/hcl/v2/hclwrite"
"github.com/zclconf/go-cty/cty"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func ClusterDatasourceHcl(req *ClusterRequest) (configStr, clusterName, resourceName string, err error) {
diff --git a/internal/testutil/acc/database_user.go b/internal/testutil/acc/database_user.go
index 4189186e73..60778b4637 100644
--- a/internal/testutil/acc/database_user.go
+++ b/internal/testutil/acc/database_user.go
@@ -3,7 +3,7 @@ package acc
import (
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func ConfigDatabaseUserBasic(projectID, username, roleName, keyLabel, valueLabel string) string {
diff --git a/internal/testutil/acc/encryption_at_rest.go b/internal/testutil/acc/encryption_at_rest.go
index 579ba98418..30880cf99a 100644
--- a/internal/testutil/acc/encryption_at_rest.go
+++ b/internal/testutil/acc/encryption_at_rest.go
@@ -3,7 +3,7 @@ package acc
import (
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func ConfigEARAzureKeyVault(projectID string, azure *admin.AzureKeyVault, useRequirePrivateNetworking bool) string {
diff --git a/internal/testutil/acc/factory.go b/internal/testutil/acc/factory.go
index 669d82b929..43a0e6028f 100644
--- a/internal/testutil/acc/factory.go
+++ b/internal/testutil/acc/factory.go
@@ -9,7 +9,7 @@ import (
"github.com/hashicorp/terraform-plugin-go/tfprotov6"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/config"
"github.com/mongodb/terraform-provider-mongodbatlas/internal/provider"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
const (
diff --git a/internal/testutil/acc/project.go b/internal/testutil/acc/project.go
index 1f4b1bbe35..3d8435fed4 100644
--- a/internal/testutil/acc/project.go
+++ b/internal/testutil/acc/project.go
@@ -6,7 +6,7 @@ import (
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func CheckDestroyProject(s *terraform.State) error {
diff --git a/internal/testutil/acc/serverless.go b/internal/testutil/acc/serverless.go
index 0453b5af57..114d8aadf6 100644
--- a/internal/testutil/acc/serverless.go
+++ b/internal/testutil/acc/serverless.go
@@ -3,7 +3,7 @@ package acc
import (
"fmt"
- "go.mongodb.org/atlas-sdk/v20240805001/admin"
+ "go.mongodb.org/atlas-sdk/v20240805003/admin"
)
func ConfigServerlessInstance(projectID, name string, ignoreConnectionStrings bool, autoIndexing *bool, tags []admin.ResourceTag) string {
diff --git a/scripts/changelog/release-note.tmpl b/scripts/changelog/release-note.tmpl
index 78ae791587..e9c9271a6c 100644
--- a/scripts/changelog/release-note.tmpl
+++ b/scripts/changelog/release-note.tmpl
@@ -4,7 +4,7 @@
{{- else if eq "new-datasource" .Type -}}
* **New Data Source:** `{{.Body}}` ([#{{- .Issue -}}](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/{{- .Issue -}}))
{{- else if eq "new-guide" .Type -}}
-* **New Guide:** `{{.Body}}` ([#{{- .Issue -}}](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/{{- .Issue -}}))
+* **New Guide:** {{.Body}} ([#{{- .Issue -}}](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/{{- .Issue -}}))
{{- else -}}
* {{.Body}} ([#{{- .Issue -}}](https://github.com/mongodb/terraform-provider-mongodbatlas/pull/{{- .Issue -}}))
{{- end -}}
diff --git a/scripts/generate-doc.sh b/scripts/generate-doc.sh
index 8e2973e6af..9518a1ce54 100755
--- a/scripts/generate-doc.sh
+++ b/scripts/generate-doc.sh
@@ -67,6 +67,9 @@ if [ ! -f "${TEMPLATE_FOLDER_PATH}/data-sources/${resource_name}s.md.tmpl" ]; th
printf "Skipping this check: We assume that the resource does not have a plural data source.\n\n"
fi
+# ensure preview resource and data sources are also included during generation
+export MONGODB_ATLAS_ENABLE_PREVIEW="true"
+
tfplugindocs generate --tf-version "${TF_VERSION}" --website-source-dir "${TEMPLATE_FOLDER_PATH}" --rendered-website-dir "docs-out"
if [ ! -f "docs-out/resources/${resource_name}.md" ]; then
diff --git a/templates/data-sources/encryption_at_rest_private_endpoint.md.tmpl b/templates/data-sources/encryption_at_rest_private_endpoint.md.tmpl
new file mode 100644
index 0000000000..b747da07df
--- /dev/null
+++ b/templates/data-sources/encryption_at_rest_private_endpoint.md.tmpl
@@ -0,0 +1,13 @@
+# {{.Type}}: {{.Name}}
+
+`{{.Name}}` describes a private endpoint used for encryption at rest using customer-managed keys.
+
+## Example Usages
+
+{{ tffile (printf "examples/%s/azure/singular-data-source.tf" .Name )}}
+
+{{ .SchemaMarkdown | trimspace }}
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpoint) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/templates/data-sources/encryption_at_rest_private_endpoints.md.tmpl b/templates/data-sources/encryption_at_rest_private_endpoints.md.tmpl
new file mode 100644
index 0000000000..0b161f8f17
--- /dev/null
+++ b/templates/data-sources/encryption_at_rest_private_endpoints.md.tmpl
@@ -0,0 +1,13 @@
+# {{.Type}}: {{.Name}}
+
+`{{.Name}}` describes private endpoints of a particular cloud provider used for encryption at rest using customer-managed keys.
+
+## Example Usages
+
+{{ tffile ("examples/mongodbatlas_encryption_at_rest_private_endpoint/azure/plural-data-source.tf") }}
+
+{{ .SchemaMarkdown | trimspace }}
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpointsForCloudProvider) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/templates/resources/encryption_at_rest_private_endpoint.md.tmpl b/templates/resources/encryption_at_rest_private_endpoint.md.tmpl
new file mode 100644
index 0000000000..767132fd90
--- /dev/null
+++ b/templates/resources/encryption_at_rest_private_endpoint.md.tmpl
@@ -0,0 +1,27 @@
+# {{.Type}}: {{.Name}}
+
+`{{.Name}}` provides a resource for managing a private endpoint used for encryption at rest with customer-managed keys. This ensures all traffic between Atlas and customer key management systems take place over private network interfaces.
+
+~> **IMPORTANT** The Encryption at Rest using Azure Key Vault over Private Endpoints feature is available by request. To request this functionality for you Atlas deployments, contact your Account Manager.
+Additionally, you'll need to set the environment variable `MONGODB_ATLAS_ENABLE_PREVIEW=true` to use this resource. To learn more about existing limitations, see the [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/#manage-customer-keys-with-azure-key-vault-over-private-endpoints).
+
+-> **NOTE:** Only Azure Key Vault with Azure Private Link is supported at this time.
+
+## Example Usages
+
+### Configuring Atlas Encryption at Rest using Azure Key Vault with Azure Private Link
+
+{{ tffile (printf "examples/%s/azure/main.tf" .Name )}}
+
+{{ .SchemaMarkdown | trimspace }}
+
+# Import
+Encryption At Rest Private Endpoint resource can be imported using the project ID, cloud provider, and private endpoint ID. The format must be `{project_id}-{cloud_provider}-{private_endpoint_id}` e.g.
+
+```
+$ terraform import mongodbatlas_encryption_at_rest_private_endpoint.test 650972848269185c55f40ca1-AZURE-650972848269185c55f40ca2
+```
+
+For more information see:
+- [MongoDB Atlas API - Private Endpoint for Encryption at Rest Using Customer Key Management](https://www.mongodb.com/docs/atlas/reference/api-resources-spec/v2/#tag/Encryption-at-Rest-using-Customer-Key-Management/operation/getEncryptionAtRestPrivateEndpoint) Documentation.
+- [Manage Customer Keys with Azure Key Vault Over Private Endpoints](https://www.mongodb.com/docs/atlas/security/azure-kms-over-private-endpoint/).
diff --git a/templates/resources/push_based_log_export.md.tmpl b/templates/resources/push_based_log_export.md.tmpl
index aadfb9d954..53f17c8e32 100644
--- a/templates/resources/push_based_log_export.md.tmpl
+++ b/templates/resources/push_based_log_export.md.tmpl
@@ -3,6 +3,8 @@
`{{.Name}}` provides a resource for push-based log export feature. The resource lets you configure, enable & disable the project level settings for the push-based log export feature. Using this resource you
can continually push logs from mongod, mongos, and audit logs to an Amazon S3 bucket. Atlas exports logs every 5 minutes.
+The [push based log export Terraform module](https://registry.terraform.io/modules/terraform-mongodbatlas-modules/push-based-log-export/mongodbatlas/latest) makes use of this resource and simplifies its use.
+
## Example Usages