0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-01 19:12:59 +00:00
terraform-provider-proxmox/proxmoxtf/data_source_virtual_environment_user.go
Pavel Boldyrev 192cbd5e3d
Upgrade the provider codebase to use Terraform SDK v2 (#91)
* Update TF SDK using `tf-sdk-migrator v2upgrade`
Address some linter issues
Clean up `resource_virtual_environment_file.go` (still, error handling is not ideal)

* few minor cleanups

* Clean up, add context and diagnostics to `resource_virtual_environment_vm.go`

* Clean up, add context and diagnostics to `resource_virtual_environment_container.go`

* Clean up, add context and diagnostics to `resource_virtual_environment_container.go`

* Update remaining resources and data sources

* fix `make example`... now it actually uses the built provider 🤦

* propagate Context everywhere
use tflog.* for logging

* add support for debug flag

* fix old issues with:
- setting `resource_virtual_environment_file.changed` attribute
- setting `resource_virtual_environment_cluster_ipset.cidr` attributes
- setting `data_source_virtual_environment_user.groups` and `.keys` attributes

* bump dependencies

* minor cleanups

* Bump Go to v1.18
Dropped support for TF v0.x

* more cleanups

* update README.md

* update PR template

* update release.yml
2022-07-14 12:20:30 -04:00

217 lines
6.6 KiB
Go

/* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/. */
package proxmoxtf
import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"time"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
)
const (
mkDataSourceVirtualEnvironmentUserACL = "acl"
mkDataSourceVirtualEnvironmentUserACLPath = "path"
mkDataSourceVirtualEnvironmentUserACLPropagate = "propagate"
mkDataSourceVirtualEnvironmentUserACLRoleID = "role_id"
mkDataSourceVirtualEnvironmentUserComment = "comment"
mkDataSourceVirtualEnvironmentUserEmail = "email"
mkDataSourceVirtualEnvironmentUserEnabled = "enabled"
mkDataSourceVirtualEnvironmentUserExpirationDate = "expiration_date"
mkDataSourceVirtualEnvironmentUserFirstName = "first_name"
mkDataSourceVirtualEnvironmentUserGroups = "groups"
mkDataSourceVirtualEnvironmentUserKeys = "keys"
mkDataSourceVirtualEnvironmentUserLastName = "last_name"
mkDataSourceVirtualEnvironmentUserUserID = "user_id"
)
func dataSourceVirtualEnvironmentUser() *schema.Resource {
return &schema.Resource{
Schema: map[string]*schema.Schema{
mkDataSourceVirtualEnvironmentUserACL: {
Type: schema.TypeSet,
Description: "The access control list",
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
mkDataSourceVirtualEnvironmentUserACLPath: {
Type: schema.TypeString,
Computed: true,
Description: "The path",
},
mkDataSourceVirtualEnvironmentUserACLPropagate: {
Type: schema.TypeBool,
Computed: true,
Description: "Whether to propagate to child paths",
},
mkDataSourceVirtualEnvironmentUserACLRoleID: {
Type: schema.TypeString,
Computed: true,
Description: "The role id",
},
},
},
},
mkDataSourceVirtualEnvironmentUserComment: {
Type: schema.TypeString,
Description: "The user comment",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserEmail: {
Type: schema.TypeString,
Description: "The user's email address",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserEnabled: {
Type: schema.TypeBool,
Description: "Whether the user account is enabled",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserExpirationDate: {
Type: schema.TypeString,
Description: "The user account's expiration date",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserFirstName: {
Type: schema.TypeString,
Description: "The user's first name",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserGroups: {
Type: schema.TypeList,
Description: "The user's groups",
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
mkDataSourceVirtualEnvironmentUserKeys: {
Type: schema.TypeString,
Description: "The user's keys",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserLastName: {
Type: schema.TypeString,
Description: "The user's last name",
Computed: true,
},
mkDataSourceVirtualEnvironmentUserUserID: {
Type: schema.TypeString,
Description: "The user id",
Required: true,
},
},
ReadContext: dataSourceVirtualEnvironmentUserRead,
}
}
func dataSourceVirtualEnvironmentUserRead(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
var diags diag.Diagnostics
config := m.(providerConfiguration)
veClient, err := config.GetVEClient()
if err != nil {
return diag.FromErr(err)
}
userID := d.Get(mkDataSourceVirtualEnvironmentUserUserID).(string)
v, err := veClient.GetUser(ctx, userID)
if err != nil {
return diag.FromErr(err)
}
acl, err := veClient.GetACL(ctx)
if err != nil {
return diag.FromErr(err)
}
d.SetId(userID)
var aclParsed []interface{}
for _, v := range acl {
if v.Type == "user" && v.UserOrGroupID == userID {
aclEntry := map[string]interface{}{}
aclEntry[mkDataSourceVirtualEnvironmentUserACLPath] = v.Path
if v.Propagate != nil {
aclEntry[mkDataSourceVirtualEnvironmentUserACLPropagate] = bool(*v.Propagate)
} else {
aclEntry[mkDataSourceVirtualEnvironmentUserACLPropagate] = false
}
aclEntry[mkDataSourceVirtualEnvironmentUserACLRoleID] = v.RoleID
aclParsed = append(aclParsed, aclEntry)
}
}
err = d.Set(mkDataSourceVirtualEnvironmentUserACL, aclParsed)
diags = append(diags, diag.FromErr(err)...)
if v.Comment != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserComment, v.Comment)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserComment, "")
}
diags = append(diags, diag.FromErr(err)...)
if v.Email != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserEmail, v.Email)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserEmail, "")
}
diags = append(diags, diag.FromErr(err)...)
if v.Enabled != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserEnabled, v.Enabled)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserEnabled, true)
}
diags = append(diags, diag.FromErr(err)...)
if v.ExpirationDate != nil {
t := time.Time(*v.ExpirationDate)
if t.Unix() > 0 {
err = d.Set(mkDataSourceVirtualEnvironmentUserExpirationDate, t.UTC().Format(time.RFC3339))
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserExpirationDate, time.Unix(0, 0).UTC().Format(time.RFC3339))
}
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserExpirationDate, time.Unix(0, 0).UTC().Format(time.RFC3339))
}
diags = append(diags, diag.FromErr(err)...)
if v.FirstName != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserFirstName, v.FirstName)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserFirstName, "")
}
diags = append(diags, diag.FromErr(err)...)
if v.Groups != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserGroups, v.Groups)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserGroups, []string{})
}
diags = append(diags, diag.FromErr(err)...)
if v.Keys != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUsersKeys, v.Keys)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUsersKeys, "")
}
diags = append(diags, diag.FromErr(err)...)
if v.LastName != nil {
err = d.Set(mkDataSourceVirtualEnvironmentUserLastName, v.LastName)
} else {
err = d.Set(mkDataSourceVirtualEnvironmentUserLastName, "")
}
diags = append(diags, diag.FromErr(err)...)
return diags
}