-
Notifications
You must be signed in to change notification settings - Fork 75
/
data_source_opentelekomcloud_compute_keypair_v2.go
117 lines (103 loc) · 3.18 KB
/
data_source_opentelekomcloud_compute_keypair_v2.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
package ecs
import (
"context"
"log"
"regexp"
"github.com/hashicorp/go-multierror"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
golangsdk "github.com/opentelekomcloud/gophertelekomcloud"
"github.com/opentelekomcloud/gophertelekomcloud/openstack/compute/v2/extensions/keypairs"
"github.com/opentelekomcloud/terraform-provider-opentelekomcloud/opentelekomcloud/common/cfg"
"github.com/opentelekomcloud/terraform-provider-opentelekomcloud/opentelekomcloud/common/fmterr"
)
func DataSourceComputeKeypairV2() *schema.Resource {
return &schema.Resource{
ReadContext: dataSourceComputeKeypairV2Read,
Schema: map[string]*schema.Schema{
"region": {
Type: schema.TypeString,
Optional: true,
Computed: true,
},
"name": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
},
"name_regex": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
ValidateFunc: validation.StringIsValidRegExp,
},
"fingerprint": {
Type: schema.TypeString,
Computed: true,
},
"user_id": {
Type: schema.TypeString,
Computed: true,
},
"public_key": {
Type: schema.TypeString,
Computed: true,
},
},
}
}
func dataSourceComputeKeypairV2Read(_ context.Context, d *schema.ResourceData, meta interface{}) diag.Diagnostics {
config := meta.(*cfg.Config)
client, err := config.ComputeV2Client(config.GetRegion(d))
if err != nil {
return fmterr.Errorf(errCreateV2Client, err)
}
var allKeyPairs []keypairs.KeyPair
if keypairName := d.Get("name").(string); keypairName != "" {
kp, err := keypairs.Get(client, keypairName).Extract()
if err != nil {
if _, ok := err.(golangsdk.ErrDefault404); ok {
return fmterr.Errorf("no keypair found")
}
return fmterr.Errorf("unable to retrieve OpenTelekomCloud %s keypair: %w", keypairName, err)
}
allKeyPairs = append(allKeyPairs, *kp)
} else {
allPages, err := keypairs.List(client).AllPages()
if err != nil {
return fmterr.Errorf("Unable to query OpenTelekomCloud keypairs: %w", err)
}
allKeyPairs, err = keypairs.ExtractKeyPairs(allPages)
if err != nil {
return fmterr.Errorf("Unable to retrieve OpenTelekomCloud keypairs: %w", err)
}
}
var filteredKeyPairs []keypairs.KeyPair
if nameRegex, ok := d.GetOk("name_regex"); ok {
r := regexp.MustCompile(nameRegex.(string))
for _, kp := range allKeyPairs {
if r.MatchString(kp.Name) {
filteredKeyPairs = append(filteredKeyPairs, kp)
}
}
allKeyPairs = filteredKeyPairs
}
if len(allKeyPairs) < 1 {
return fmterr.Errorf("Your query returned no results. " +
"Please change your search criteria and try again.")
}
keypair := allKeyPairs[0]
log.Printf("[DEBUG] Retrieved opentelekoncloud_compute_keypair_v2 %s: %#v", keypair.Name, keypair)
d.SetId(keypair.Name)
mErr := multierror.Append(
d.Set("name", keypair.Name),
d.Set("user_id", keypair.UserID),
d.Set("fingerprint", keypair.Fingerprint),
d.Set("public_key", keypair.PublicKey),
)
if err := mErr.ErrorOrNil(); err != nil {
return diag.FromErr(err)
}
return nil
}