forked from hashicorp/terraform
-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathresource_datadog_user.go
160 lines (135 loc) · 4.01 KB
/
resource_datadog_user.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
package datadog
import (
"fmt"
"log"
"strings"
"github.com/hashicorp/terraform/helper/schema"
"gopkg.in/zorkian/go-datadog-api.v2"
)
func resourceDatadogUser() *schema.Resource {
return &schema.Resource{
Create: resourceDatadogUserCreate,
Read: resourceDatadogUserRead,
Update: resourceDatadogUserUpdate,
Delete: resourceDatadogUserDelete,
Exists: resourceDatadogUserExists,
Importer: &schema.ResourceImporter{
State: resourceDatadogUserImport,
},
Schema: map[string]*schema.Schema{
"disabled": {
Type: schema.TypeBool,
Optional: true,
Default: false,
},
"email": {
Type: schema.TypeString,
Required: true,
},
"handle": {
Type: schema.TypeString,
Required: true,
},
"is_admin": {
Type: schema.TypeBool,
Optional: true,
Default: false,
},
"name": {
Type: schema.TypeString,
Required: true,
},
"role": {
Type: schema.TypeString,
Optional: true,
},
"verified": {
Type: schema.TypeBool,
Optional: true,
},
},
}
}
func resourceDatadogUserExists(d *schema.ResourceData, meta interface{}) (b bool, e error) {
// Exists - This is called to verify a resource still exists. It is called prior to Read,
// and lowers the burden of Read to be able to assume the resource exists.
client := meta.(*datadog.Client)
if _, err := client.GetUser(d.Id()); err != nil {
if strings.Contains(err.Error(), "404 Not Found") {
return false, nil
}
return false, err
}
return true, nil
}
func resourceDatadogUserCreate(d *schema.ResourceData, meta interface{}) error {
client := meta.(*datadog.Client)
var u datadog.User
u.SetDisabled(d.Get("disabled").(bool))
u.SetEmail(d.Get("email").(string))
u.SetHandle(d.Get("handle").(string))
u.SetIsAdmin(d.Get("is_admin").(bool))
u.SetName(d.Get("name").(string))
u.SetRole(d.Get("role").(string))
// Datadog does not actually delete users, so CreateUser might return a 409.
// We ignore that case and proceed, likely re-enabling the user.
if _, err := client.CreateUser(u.Handle, u.Name); err != nil {
if !strings.Contains(err.Error(), "API error 409 Conflict") {
return fmt.Errorf("error creating user: %s", err.Error())
}
log.Printf("[INFO] Updating existing Datadog user %q", u.Handle)
}
if err := client.UpdateUser(u); err != nil {
return fmt.Errorf("error creating user: %s", err.Error())
}
d.SetId(u.GetHandle())
return nil
}
func resourceDatadogUserRead(d *schema.ResourceData, meta interface{}) error {
client := meta.(*datadog.Client)
u, err := client.GetUser(d.Id())
if err != nil {
return err
}
log.Printf("[DEBUG] user: %v", u)
d.Set("disabled", u.GetDisabled())
d.Set("email", u.GetEmail())
d.Set("handle", u.GetHandle())
d.Set("is_admin", u.GetIsAdmin())
d.Set("name", u.GetName())
d.Set("role", u.GetRole())
d.Set("verified", u.GetVerified())
return nil
}
func resourceDatadogUserUpdate(d *schema.ResourceData, meta interface{}) error {
client := meta.(*datadog.Client)
var u datadog.User
u.SetDisabled(d.Get("disabled").(bool))
u.SetEmail(d.Get("email").(string))
u.SetHandle(d.Id())
u.SetIsAdmin(d.Get("is_admin").(bool))
u.SetName(d.Get("name").(string))
u.SetRole(d.Get("role").(string))
if err := client.UpdateUser(u); err != nil {
return fmt.Errorf("error updating user: %s", err.Error())
}
return resourceDatadogUserRead(d, meta)
}
func resourceDatadogUserDelete(d *schema.ResourceData, meta interface{}) error {
client := meta.(*datadog.Client)
// Datadog does not actually delete users, but instead marks them as disabled.
// Bypass DeleteUser if GetUser returns User.Disabled == true, otherwise it will 400.
if u, err := client.GetUser(d.Id()); err == nil && u.GetDisabled() {
return nil
}
if err := client.DeleteUser(d.Id()); err != nil {
return err
}
return nil
}
func resourceDatadogUserImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
if err := resourceDatadogUserRead(d, meta); err != nil {
return nil, err
}
return []*schema.ResourceData{d}, nil
}