/
cipher_secret_keys_data_source.go
122 lines (105 loc) · 4.28 KB
/
cipher_secret_keys_data_source.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
package ciphersecretkey
import (
"context"
"github.com/hashicorp/terraform-plugin-framework/attr"
"github.com/hashicorp/terraform-plugin-framework/datasource"
"github.com/hashicorp/terraform-plugin-framework/datasource/schema"
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/hashicorp/terraform-plugin-log/tflog"
client "github.com/pingidentity/pingdirectory-go-client/v10000/configurationapi"
"github.com/pingidentity/terraform-provider-pingdirectory/internal/resource/config"
internaltypes "github.com/pingidentity/terraform-provider-pingdirectory/internal/types"
)
// Ensure the implementation satisfies the expected interfaces.
var (
_ datasource.DataSource = &cipherSecretKeysDataSource{}
_ datasource.DataSourceWithConfigure = &cipherSecretKeysDataSource{}
)
// Create a Cipher Secret Keys data source
func NewCipherSecretKeysDataSource() datasource.DataSource {
return &cipherSecretKeysDataSource{}
}
// cipherSecretKeysDataSource is the datasource implementation.
type cipherSecretKeysDataSource struct {
providerConfig internaltypes.ProviderConfiguration
apiClient *client.APIClient
}
// Metadata returns the data source type name.
func (r *cipherSecretKeysDataSource) Metadata(_ context.Context, req datasource.MetadataRequest, resp *datasource.MetadataResponse) {
resp.TypeName = req.ProviderTypeName + "_cipher_secret_keys"
}
// Configure adds the provider configured client to the data source.
func (r *cipherSecretKeysDataSource) Configure(_ context.Context, req datasource.ConfigureRequest, _ *datasource.ConfigureResponse) {
if req.ProviderData == nil {
return
}
providerCfg := req.ProviderData.(internaltypes.ResourceConfiguration)
r.providerConfig = providerCfg.ProviderConfig
r.apiClient = providerCfg.ApiClient
}
type cipherSecretKeysDataSourceModel struct {
Id types.String `tfsdk:"id"`
Filter types.String `tfsdk:"filter"`
Ids types.Set `tfsdk:"ids"`
ServerInstanceName types.String `tfsdk:"server_instance_name"`
}
// GetSchema defines the schema for the datasource.
func (r *cipherSecretKeysDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, resp *datasource.SchemaResponse) {
schemaDef := schema.Schema{
Description: "Lists Cipher Secret Key objects in the server configuration.",
Attributes: map[string]schema.Attribute{
"server_instance_name": schema.StringAttribute{
Description: "Name of the parent Server Instance",
Required: true,
},
"filter": schema.StringAttribute{
Description: "SCIM filter used when searching the configuration.",
Optional: true,
},
"ids": schema.SetAttribute{
Description: "Cipher Secret Key IDs found in the configuration",
Required: false,
Optional: false,
Computed: true,
ElementType: types.StringType,
},
},
}
config.AddCommonDataSourceSchema(&schemaDef, false)
resp.Schema = schemaDef
}
// Read resource information
func (r *cipherSecretKeysDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse) {
// Get current state
var state cipherSecretKeysDataSourceModel
diags := req.Config.Get(ctx, &state)
resp.Diagnostics.Append(diags...)
if resp.Diagnostics.HasError() {
return
}
listRequest := r.apiClient.CipherSecretKeyAPI.ListCipherSecretKeys(config.ProviderBasicAuthContext(ctx, r.providerConfig), state.ServerInstanceName.ValueString())
if internaltypes.IsDefined(state.Filter) {
listRequest = listRequest.Filter(state.Filter.ValueString())
}
readResponse, httpResp, err := r.apiClient.CipherSecretKeyAPI.ListCipherSecretKeysExecute(listRequest)
if err != nil {
config.ReportHttpError(ctx, &resp.Diagnostics, "An error occurred while listing the Cipher Secret Key objects", err, httpResp)
return
}
// Log response JSON
responseJson, err := readResponse.MarshalJSON()
if err == nil {
tflog.Debug(ctx, "Read response: "+string(responseJson))
}
// Read the response into the state
ids := []attr.Value{}
for _, response := range readResponse.Resources {
ids = append(ids, types.StringValue(response.Id))
}
state.Ids, diags = types.SetValue(types.StringType, ids)
resp.Diagnostics.Append(diags...)
state.Id = types.StringValue("id")
// Set refreshed state
diags = resp.State.Set(ctx, &state)
resp.Diagnostics.Append(diags...)
}