-
Notifications
You must be signed in to change notification settings - Fork 645
/
data_source_ibm_is_backup_policy_plan.go
208 lines (186 loc) · 7.24 KB
/
data_source_ibm_is_backup_policy_plan.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
// Copyright IBM Corp. 2021 All Rights Reserved.
// Licensed under the Mozilla Public License v2.0
package vpc
import (
"context"
"fmt"
"log"
"github.com/IBM-Cloud/terraform-provider-ibm/ibm/flex"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/IBM/vpc-go-sdk/vpcv1"
)
func DataSourceIBMIsBackupPolicyPlan() *schema.Resource {
return &schema.Resource{
ReadContext: dataSourceIBMIsBackupPolicyPlanRead,
Schema: map[string]*schema.Schema{
"backup_policy_id": &schema.Schema{
Type: schema.TypeString,
Required: true,
Description: "The backup policy identifier.",
},
"identifier": &schema.Schema{
Type: schema.TypeString,
Optional: true,
ExactlyOneOf: []string{"name", "identifier"},
Description: "The backup policy plan identifier.",
},
"name": {
Type: schema.TypeString,
Computed: true,
Optional: true,
ExactlyOneOf: []string{"name", "identifier"},
Description: "The unique user-defined name for this backup policy plan.",
},
"active": &schema.Schema{
Type: schema.TypeBool,
Computed: true,
Description: "Indicates whether the plan is active.",
},
"attach_user_tags": &schema.Schema{
Type: schema.TypeList,
Computed: true,
Description: "User tags to attach to each resource created by this plan.",
Elem: &schema.Schema{
Type: schema.TypeString,
},
},
"copy_user_tags": &schema.Schema{
Type: schema.TypeBool,
Computed: true,
Description: "Indicates whether to copy the source's user tags to the created resource.",
},
"created_at": &schema.Schema{
Type: schema.TypeString,
Computed: true,
Description: "The date and time that the backup policy plan was created.",
},
"cron_spec": &schema.Schema{
Type: schema.TypeString,
Computed: true,
Description: "The cron specification for the backup schedule.",
},
"deletion_trigger": &schema.Schema{
Type: schema.TypeList,
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"delete_after": &schema.Schema{
Type: schema.TypeInt,
Optional: true,
Description: "The maximum number of days to keep each backup after creation.",
},
"delete_over_count": &schema.Schema{
Type: schema.TypeInt,
Computed: true,
Description: "The maximum number of recent backups to keep. If absent, there is no maximum.",
},
},
},
},
"href": &schema.Schema{
Type: schema.TypeString,
Computed: true,
Description: "The URL for this backup policy plan.",
},
"lifecycle_state": &schema.Schema{
Type: schema.TypeString,
Computed: true,
Description: "The lifecycle state of this backup policy plan.",
},
"resource_type": &schema.Schema{
Type: schema.TypeString,
Computed: true,
Description: "The type of resource referenced.",
},
},
}
}
func dataSourceIBMIsBackupPolicyPlanRead(context context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
sess, err := vpcClient(meta)
if err != nil {
return diag.FromErr(err)
}
var backupPolicyPlan *vpcv1.BackupPolicyPlan
if v, ok := d.GetOk("identifier"); ok {
id := v.(string)
getBackupPolicyPlanOptions := &vpcv1.GetBackupPolicyPlanOptions{}
getBackupPolicyPlanOptions.SetBackupPolicyID(d.Get("backup_policy_id").(string))
getBackupPolicyPlanOptions.SetID(id)
backupPolicyPlanInfo, response, err := sess.GetBackupPolicyPlanWithContext(context, getBackupPolicyPlanOptions)
if err != nil {
log.Printf("[DEBUG] GetBackupPolicyPlanWithContext failed %s\n%s", err, response)
return diag.FromErr(fmt.Errorf("[ERROR] GetBackupPolicyPlanWithContext failed %s\n%s", err, response))
}
backupPolicyPlan = backupPolicyPlanInfo
} else if v, ok := d.GetOk("name"); ok {
name := v.(string)
listBackupPolicyPlansOptions := &vpcv1.ListBackupPolicyPlansOptions{}
listBackupPolicyPlansOptions.SetBackupPolicyID(d.Get("backup_policy_id").(string))
backupPolicyPlanCollection, response, err := sess.ListBackupPolicyPlansWithContext(context, listBackupPolicyPlansOptions)
if err != nil {
log.Printf("[DEBUG] ListBackupPolicyPlansWithContext failed %s\n%s", err, response)
return diag.FromErr(fmt.Errorf("[ERROR] ListBackupPolicyPlansWithContext failed %s\n%s", err, response))
}
for _, backupPolicyPlanInfo := range backupPolicyPlanCollection.Plans {
if *backupPolicyPlanInfo.Name == name {
backupPolicyPlan = &backupPolicyPlanInfo
break
}
}
if backupPolicyPlan == nil {
return diag.FromErr(fmt.Errorf("[ERROR] No backup policy plan found with name (%s)", name))
}
}
d.SetId(*backupPolicyPlan.ID)
if err = d.Set("active", backupPolicyPlan.Active); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting active: %s", err))
}
if err = d.Set("attach_user_tags", backupPolicyPlan.AttachUserTags); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting attach_user_tags: %s", err))
}
if err = d.Set("copy_user_tags", backupPolicyPlan.CopyUserTags); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting copy_user_tags: %s", err))
}
if err = d.Set("created_at", flex.DateTimeToString(backupPolicyPlan.CreatedAt)); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting created_at: %s", err))
}
if err = d.Set("cron_spec", backupPolicyPlan.CronSpec); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting cron_spec: %s", err))
}
if backupPolicyPlan.DeletionTrigger != nil {
err = d.Set("deletion_trigger", dataSourceBackupPolicyPlanFlattenDeletionTrigger(*backupPolicyPlan.DeletionTrigger))
if err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting deletion_trigger %s", err))
}
}
if err = d.Set("href", backupPolicyPlan.Href); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting href: %s", err))
}
if err = d.Set("lifecycle_state", backupPolicyPlan.LifecycleState); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting lifecycle_state: %s", err))
}
if err = d.Set("name", backupPolicyPlan.Name); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting name: %s", err))
}
if err = d.Set("resource_type", backupPolicyPlan.ResourceType); err != nil {
return diag.FromErr(fmt.Errorf("[ERROR] Error setting resource_type: %s", err))
}
return nil
}
func dataSourceBackupPolicyPlanFlattenDeletionTrigger(result vpcv1.BackupPolicyPlanDeletionTrigger) (finalList []map[string]interface{}) {
finalList = []map[string]interface{}{}
finalMap := dataSourceBackupPolicyPlanDeletionTriggerToMap(result)
finalList = append(finalList, finalMap)
return finalList
}
func dataSourceBackupPolicyPlanDeletionTriggerToMap(deletionTriggerItem vpcv1.BackupPolicyPlanDeletionTrigger) (deletionTriggerMap map[string]interface{}) {
deletionTriggerMap = map[string]interface{}{}
if deletionTriggerItem.DeleteAfter != nil {
deletionTriggerMap["delete_after"] = deletionTriggerItem.DeleteAfter
}
if deletionTriggerItem.DeleteOverCount != nil {
deletionTriggerMap["delete_over_count"] = deletionTriggerItem.DeleteOverCount
}
return deletionTriggerMap
}