mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-08 15:13:56 -06:00
987b910828
* vendor: update gopkg.in/ns1/ns1-go.v2 * provider/ns1: Port the ns1 provider to Terraform core * docs/ns1: Document the ns1 provider * ns1: rename remaining nsone -> ns1 (#10805) * Ns1 provider (#11300) * provider/ns1: Flesh out support for meta structs. Following the structure outlined by @pashap. Using reflection to reduce copy/paste. Putting metas inside single-item lists. This is clunky, but I couldn't figure out how else to have a nested struct. Maybe the Terraform people know a better way? Inside the meta struct, all fields are always written to the state; I can't figure out how to omit fields that aren't used. This is not just verbose, it actually causes issues because you can't have both "up" and "up_feed" set). Also some minor other changes: - Add "terraform" import support to records and zones. - Create helper class StringEnum. * provider/ns1: Make fmt * provider/ns1: Remove stubbed out RecordRead (used for testing metadata change). * provider/ns1: Need to get interface that m contains from Ptr Value with Elem() * provider/ns1: Use empty string to indicate no feed given. * provider/ns1: Remove old record.regions fields. * provider/ns1: Removes redundant testAccCheckRecordState * provider/ns1: Moves account permissions logic to permissions.go * provider/ns1: Adds tests for team resource. * provider/ns1: Move remaining permissions logic to permissions.go * ns1/provider: Adds datasource.config * provider/ns1: Small clean up of datafeed resource tests * provider/ns1: removes testAccCheckZoneState in favor of explicit name check * provider/ns1: More renaming of nsone -> ns1 * provider/ns1: Comment out metadata for the moment. * Ns1 provider (#11347) * Fix the removal of empty containers from a flatmap Removal of empty nested containers from a flatmap would sometimes fail a sanity check when removed in the wrong order. This would only fail sometimes due to map iteration. There was also an off-by-one error in the prefix check which could match the incorrect keys. * provider/ns1: Adds ns1 go client through govendor. * provider/ns1: Removes unused debug line * docs/ns1: Adds docs around apikey/datasource/datafeed/team/user/record. * provider/ns1: Gets go vet green
110 lines
2.5 KiB
Go
110 lines
2.5 KiB
Go
package ns1
|
|
|
|
import (
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
ns1 "gopkg.in/ns1/ns1-go.v2/rest"
|
|
"gopkg.in/ns1/ns1-go.v2/rest/model/account"
|
|
)
|
|
|
|
func apikeyResource() *schema.Resource {
|
|
s := map[string]*schema.Schema{
|
|
"id": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
"name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
"key": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
"teams": &schema.Schema{
|
|
Type: schema.TypeList,
|
|
Optional: true,
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
},
|
|
}
|
|
s = addPermsSchema(s)
|
|
return &schema.Resource{
|
|
Schema: s,
|
|
Create: ApikeyCreate,
|
|
Read: ApikeyRead,
|
|
Update: ApikeyUpdate,
|
|
Delete: ApikeyDelete,
|
|
}
|
|
}
|
|
|
|
func apikeyToResourceData(d *schema.ResourceData, k *account.APIKey) error {
|
|
d.SetId(k.ID)
|
|
d.Set("name", k.Name)
|
|
d.Set("key", k.Key)
|
|
d.Set("teams", k.TeamIDs)
|
|
permissionsToResourceData(d, k.Permissions)
|
|
return nil
|
|
}
|
|
|
|
func resourceDataToApikey(k *account.APIKey, d *schema.ResourceData) error {
|
|
k.ID = d.Id()
|
|
k.Name = d.Get("name").(string)
|
|
if v, ok := d.GetOk("teams"); ok {
|
|
teamsRaw := v.([]interface{})
|
|
k.TeamIDs = make([]string, len(teamsRaw))
|
|
for i, team := range teamsRaw {
|
|
k.TeamIDs[i] = team.(string)
|
|
}
|
|
} else {
|
|
k.TeamIDs = make([]string, 0)
|
|
}
|
|
k.Permissions = resourceDataToPermissions(d)
|
|
return nil
|
|
}
|
|
|
|
// ApikeyCreate creates ns1 API key
|
|
func ApikeyCreate(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ns1.Client)
|
|
k := account.APIKey{}
|
|
if err := resourceDataToApikey(&k, d); err != nil {
|
|
return err
|
|
}
|
|
if _, err := client.APIKeys.Create(&k); err != nil {
|
|
return err
|
|
}
|
|
return apikeyToResourceData(d, &k)
|
|
}
|
|
|
|
// ApikeyRead reads API key from ns1
|
|
func ApikeyRead(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ns1.Client)
|
|
k, _, err := client.APIKeys.Get(d.Id())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return apikeyToResourceData(d, k)
|
|
}
|
|
|
|
//ApikeyDelete deletes the given ns1 api key
|
|
func ApikeyDelete(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ns1.Client)
|
|
_, err := client.APIKeys.Delete(d.Id())
|
|
d.SetId("")
|
|
return err
|
|
}
|
|
|
|
//ApikeyUpdate updates the given api key in ns1
|
|
func ApikeyUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ns1.Client)
|
|
k := account.APIKey{
|
|
ID: d.Id(),
|
|
}
|
|
if err := resourceDataToApikey(&k, d); err != nil {
|
|
return err
|
|
}
|
|
if _, err := client.APIKeys.Update(&k); err != nil {
|
|
return err
|
|
}
|
|
return apikeyToResourceData(d, &k)
|
|
}
|