0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-01 19:12:59 +00:00
terraform-provider-proxmox/proxmoxtf/data_source_virtual_environment_roles.go
Pavel Boldyrev 192cbd5e3d
Upgrade the provider codebase to use Terraform SDK v2 (#91)
* Update TF SDK using `tf-sdk-migrator v2upgrade`
Address some linter issues
Clean up `resource_virtual_environment_file.go` (still, error handling is not ideal)

* few minor cleanups

* Clean up, add context and diagnostics to `resource_virtual_environment_vm.go`

* Clean up, add context and diagnostics to `resource_virtual_environment_container.go`

* Clean up, add context and diagnostics to `resource_virtual_environment_container.go`

* Update remaining resources and data sources

* fix `make example`... now it actually uses the built provider 🤦

* propagate Context everywhere
use tflog.* for logging

* add support for debug flag

* fix old issues with:
- setting `resource_virtual_environment_file.changed` attribute
- setting `resource_virtual_environment_cluster_ipset.cidr` attributes
- setting `data_source_virtual_environment_user.groups` and `.keys` attributes

* bump dependencies

* minor cleanups

* Bump Go to v1.18
Dropped support for TF v0.x

* more cleanups

* update README.md

* update PR template

* update release.yml
2022-07-14 12:20:30 -04:00

99 lines
2.6 KiB
Go

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
package proxmoxtf
import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
)
const (
mkDataSourceVirtualEnvironmentRolesPrivileges = "privileges"
mkDataSourceVirtualEnvironmentRolesRoleIDs = "role_ids"
mkDataSourceVirtualEnvironmentRolesSpecial = "special"
)
func dataSourceVirtualEnvironmentRoles() *schema.Resource {
return &schema.Resource{
Schema: map[string]*schema.Schema{
mkDataSourceVirtualEnvironmentRolesPrivileges: {
Type: schema.TypeList,
Description: "The role privileges",
Computed: true,
Elem: &schema.Schema{
Type: schema.TypeSet,
Elem: &schema.Schema{Type: schema.TypeString},
},
},
mkDataSourceVirtualEnvironmentRolesRoleIDs: {
Type: schema.TypeList,
Description: "The role ids",
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
mkDataSourceVirtualEnvironmentRolesSpecial: {
Type: schema.TypeList,
Description: "Whether the role is special (built-in)",
Computed: true,
Elem: &schema.Schema{Type: schema.TypeBool},
},
},
ReadContext: dataSourceVirtualEnvironmentRolesRead,
}
}
func dataSourceVirtualEnvironmentRolesRead(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
var diags diag.Diagnostics
config := m.(providerConfiguration)
veClient, err := config.GetVEClient()
if err != nil {
return diag.FromErr(err)
}
list, err := veClient.ListRoles(ctx)
if err != nil {
return diag.FromErr(err)
}
privileges := make([]interface{}, len(list))
roleIDs := make([]interface{}, len(list))
special := make([]interface{}, len(list))
for i, v := range list {
if v.Privileges != nil {
p := schema.NewSet(schema.HashString, []interface{}{})
for _, v := range *v.Privileges {
p.Add(v)
}
privileges[i] = p
} else {
privileges[i] = map[string]interface{}{}
}
roleIDs[i] = v.ID
if v.Special != nil {
special[i] = v.Special
} else {
special[i] = false
}
}
d.SetId("roles")
err = d.Set(mkDataSourceVirtualEnvironmentRolesPrivileges, privileges)
diags = append(diags, diag.FromErr(err)...)
err = d.Set(mkDataSourceVirtualEnvironmentRolesRoleIDs, roleIDs)
diags = append(diags, diag.FromErr(err)...)
err = d.Set(mkDataSourceVirtualEnvironmentRolesSpecial, special)
diags = append(diags, diag.FromErr(err)...)
return diags
}