mirror of
https://github.com/opentffoundation/opentf.git
synced 2026-04-28 21:01:16 -04:00
* update github.com/aws/aws-sdk-go to v1.30.9 * deps: github.com/aws/aws-sdk-go@v1.30.12 Reference: https://github.com/hashicorp/terraform/issues/24710 Reference: https://github.com/hashicorp/terraform/issues/24741 Changes: ``` NOTES: * backend/s3: Region validation now automatically supports the new `af-south-1` (Africa (Cape Town)) region. For AWS operations to work in the new region, the region must be explicitly enabled as outlined in the [AWS Documentation](https://docs.aws.amazon.com/general/latest/gr/rande-manage.html#rande-manage-enable). When the region is not enabled, the Terraform S3 Backend will return errors during credential validation (e.g. `error validating provider credentials: error calling sts:GetCallerIdentity: InvalidClientTokenId: The security token included in the request is invalid`). ENHANCEMENTS: * backend/s3: Support automatic region validation for `af-south-1` ``` Updated via: ```console $ go get github.com/aws/aws-sdk-go@v1.30.12 $ go mod tidy $ go mod vendor ``` Output from acceptance testing: ```console $ TF_ACC=1 go test -v ./backend/remote-state/s3 | grep '^--- ' --- PASS: TestBackend_impl (0.00s) --- PASS: TestBackendConfig (1.68s) --- PASS: TestBackendConfig_invalidKey (0.00s) --- PASS: TestBackendConfig_invalidSSECustomerKeyLength (0.00s) --- PASS: TestBackendConfig_invalidSSECustomerKeyEncoding (0.00s) --- PASS: TestBackendConfig_conflictingEncryptionSchema (0.00s) --- PASS: TestBackend (15.07s) --- PASS: TestBackendLocked (26.40s) --- PASS: TestBackendSSECustomerKey (16.99s) --- PASS: TestBackendExtraPaths (12.05s) --- PASS: TestBackendPrefixInWorkspace (5.55s) --- PASS: TestKeyEnv (45.07s) --- PASS: TestRemoteClient_impl (0.00s) --- PASS: TestRemoteClient (5.39s) --- PASS: TestRemoteClientLocks (14.30s) --- PASS: TestForceUnlock (20.08s) --- PASS: TestRemoteClient_clientMD5 (16.43s) --- PASS: TestRemoteClient_stateChecksum (24.58s) ``` Co-authored-by: Nicola Senno <nicola.senno@workday.com>
50 lines
1.4 KiB
Go
50 lines
1.4 KiB
Go
package jmespath
|
|
|
|
import "strconv"
|
|
|
|
// JMESPath is the representation of a compiled JMES path query. A JMESPath is
|
|
// safe for concurrent use by multiple goroutines.
|
|
type JMESPath struct {
|
|
ast ASTNode
|
|
intr *treeInterpreter
|
|
}
|
|
|
|
// Compile parses a JMESPath expression and returns, if successful, a JMESPath
|
|
// object that can be used to match against data.
|
|
func Compile(expression string) (*JMESPath, error) {
|
|
parser := NewParser()
|
|
ast, err := parser.Parse(expression)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
jmespath := &JMESPath{ast: ast, intr: newInterpreter()}
|
|
return jmespath, nil
|
|
}
|
|
|
|
// MustCompile is like Compile but panics if the expression cannot be parsed.
|
|
// It simplifies safe initialization of global variables holding compiled
|
|
// JMESPaths.
|
|
func MustCompile(expression string) *JMESPath {
|
|
jmespath, err := Compile(expression)
|
|
if err != nil {
|
|
panic(`jmespath: Compile(` + strconv.Quote(expression) + `): ` + err.Error())
|
|
}
|
|
return jmespath
|
|
}
|
|
|
|
// Search evaluates a JMESPath expression against input data and returns the result.
|
|
func (jp *JMESPath) Search(data interface{}) (interface{}, error) {
|
|
return jp.intr.Execute(jp.ast, data)
|
|
}
|
|
|
|
// Search evaluates a JMESPath expression against input data and returns the result.
|
|
func Search(expression string, data interface{}) (interface{}, error) {
|
|
intr := newInterpreter()
|
|
parser := NewParser()
|
|
ast, err := parser.Parse(expression)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
return intr.Execute(ast, data)
|
|
}
|