-
Notifications
You must be signed in to change notification settings - Fork 10
/
data_source_appgate_global_settings.go
116 lines (109 loc) · 3.97 KB
/
data_source_appgate_global_settings.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
package appgate
import (
"context"
"fmt"
"github.com/appgate/sdp-api-client-go/api/v14/openapi"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
)
func dataSourceGlobalSettings() *schema.Resource {
return &schema.Resource{
Read: dataSourceAppgateGlobalSettingsRead,
Schema: map[string]*schema.Schema{
"claims_token_expiration": {
Type: schema.TypeInt,
Description: "Number of minutes the Claims Token is valid both for administrators and clients.",
Computed: true,
},
"entitlement_token_expiration": {
Type: schema.TypeInt,
Description: "Number of minutes the Entitlement Token is valid for clients.",
Computed: true,
},
"administration_token_expiration": {
Type: schema.TypeInt,
Description: "Number of minutes the administration Token is valid for administrators.",
Computed: true,
},
"vpn_certificate_expiration": {
Type: schema.TypeInt,
Description: "Number of minutes the VPN certificates is valid for clients.",
Computed: true,
},
"login_banner_message": {
Type: schema.TypeString,
Description: "The configured message will be displayed on the login UI.",
Computed: true,
},
"message_of_the_day": {
Type: schema.TypeString,
Description: "The configured message will be displayed after a successful logging.",
Computed: true,
},
"backup_api_enabled": {
Type: schema.TypeBool,
Description: "Whether the backup API is enabled or not.",
Computed: true,
},
"has_backup_passphrase": {
Type: schema.TypeBool,
Deprecated: "Whether there is a backup passphrase set or not. Deprecated as of 5.0. Use backupApiEnabled instead.",
Computed: true,
},
"fips": {
Type: schema.TypeBool,
Description: "FIPS 140-2 Compliant Tunneling.",
Computed: true,
},
"geo_ip_updates": {
Type: schema.TypeBool,
Description: "Whether the automatic GeoIp updates are enabled or not.",
Computed: true,
},
"audit_log_persistence_mode": {
Type: schema.TypeString,
Description: "Audit Log persistence mode.",
Computed: true,
},
"app_discovery_domains": {
Type: schema.TypeSet,
Description: "Domains to monitor for for App Discovery feature.",
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
"collective_id": {
Type: schema.TypeString,
Description: "A randomly generated ID during first installation to identify the Collective.",
Computed: true,
},
},
}
}
func dataSourceAppgateGlobalSettingsRead(d *schema.ResourceData, meta interface{}) error {
token := meta.(*Client).Token
api := meta.(*Client).API.GlobalSettingsApi
settings, err := getGlobalSettings(api, token)
if err != nil {
return fmt.Errorf("Could not read global settings %s", err)
}
d.SetId(settings.GetCollectiveId())
d.Set("claims_token_expiration", settings.GetClaimsTokenExpiration())
d.Set("entitlement_token_expiration", settings.GetEntitlementTokenExpiration())
d.Set("administration_token_expiration", settings.GetAdministrationTokenExpiration())
d.Set("vpn_certificate_expiration", settings.GetVpnCertificateExpiration())
d.Set("login_banner_message", settings.GetLoginBannerMessage())
d.Set("message_of_the_day", settings.GetMessageOfTheDay())
d.Set("backup_api_enabled", settings.GetBackupApiEnabled())
d.Set("fips", settings.GetFips())
d.Set("geo_ip_updates", settings.GetGeoIpUpdates())
d.Set("audit_log_persistence_mode", settings.GetAuditLogPersistenceMode())
d.Set("app_discovery_domains", settings.GetAppDiscoveryDomains())
d.Set("collective_id", settings.GetCollectiveId())
return nil
}
func getGlobalSettings(api *openapi.GlobalSettingsApiService, token string) (*openapi.GlobalSettings, error) {
globalSettings, _, err := api.GlobalSettingsGet(context.Background()).Authorization(token).Execute()
if err != nil {
return nil, err
}
return &globalSettings, nil
}