0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-06-30 02:31:10 +00:00
terraform-provider-proxmox/proxmoxtf/provider/provider.go
Pavel Boldyrev ab54aa1092
feat(core): Add API Token authentication (#350)
* feat(core): Add API Token authentication

* fix linter errrors

* update docs
2023-05-29 21:56:21 -04:00

141 lines
3.9 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package provider
import (
"context"
"strings"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/bpg/terraform-provider-proxmox/proxmox/api"
"github.com/bpg/terraform-provider-proxmox/proxmox/ssh"
"github.com/bpg/terraform-provider-proxmox/proxmoxtf"
)
const (
dvProviderOTP = ""
mkProviderVirtualEnvironment = "virtual_environment"
mkProviderEndpoint = "endpoint"
mkProviderInsecure = "insecure"
mkProviderOTP = "otp"
mkProviderPassword = "password"
mkProviderUsername = "username"
mkProviderAPIToken = "api_token"
mkProviderSSH = "ssh"
mkProviderSSHUsername = "username"
mkProviderSSHPassword = "password"
mkProviderSSHAgent = "agent"
mkProviderSSHAgentSocket = "agent_socket"
)
// ProxmoxVirtualEnvironment returns the object for this provider.
func ProxmoxVirtualEnvironment() *schema.Provider {
return &schema.Provider{
ConfigureContextFunc: providerConfigure,
DataSourcesMap: createDatasourceMap(),
ResourcesMap: createResourceMap(),
Schema: createSchema(),
}
}
func providerConfigure(ctx context.Context, d *schema.ResourceData) (interface{}, diag.Diagnostics) {
var err error
var diags diag.Diagnostics
var apiClient api.Client
var sshClient ssh.Client
var creds *api.Credentials
var conn *api.Connection
// Legacy configuration, wrapped in the deprecated `virtual_environment` block
veConfigBlock := d.Get(mkProviderVirtualEnvironment).([]interface{})
if len(veConfigBlock) > 0 {
veConfig := veConfigBlock[0].(map[string]interface{})
creds, err = api.NewCredentials(
veConfig[mkProviderUsername].(string),
veConfig[mkProviderPassword].(string),
veConfig[mkProviderOTP].(string),
"",
)
diags = append(diags, diag.FromErr(err)...)
conn, err = api.NewConnection(
veConfig[mkProviderEndpoint].(string),
veConfig[mkProviderInsecure].(bool),
)
diags = append(diags, diag.FromErr(err)...)
} else {
creds, err = api.NewCredentials(
d.Get(mkProviderUsername).(string),
d.Get(mkProviderPassword).(string),
d.Get(mkProviderOTP).(string),
d.Get(mkProviderAPIToken).(string),
)
diags = append(diags, diag.FromErr(err)...)
conn, err = api.NewConnection(
d.Get(mkProviderEndpoint).(string),
d.Get(mkProviderInsecure).(bool),
)
diags = append(diags, diag.FromErr(err)...)
}
if diags.HasError() {
return nil, diags
}
apiClient, err = api.NewClient(ctx, creds, conn)
if err != nil {
return nil, diag.Errorf("error creating virtual environment client: %s", err)
}
// ////////////////////////////////////////////////////////////////////////////////////
sshConf := map[string]interface{}{}
sshBlock := d.Get(mkProviderSSH).([]interface{})
if len(sshBlock) > 0 {
sshConf = sshBlock[0].(map[string]interface{})
}
if v, ok := sshConf[mkProviderSSHUsername]; !ok || v.(string) == "" {
sshConf[mkProviderSSHUsername] = strings.Split(creds.Username, "@")[0]
}
if v, ok := sshConf[mkProviderSSHPassword]; !ok || v.(string) == "" {
sshConf[mkProviderSSHPassword] = creds.Password
}
if _, ok := sshConf[mkProviderSSHAgent]; !ok {
sshConf[mkProviderSSHAgent] = false
}
if _, ok := sshConf[mkProviderSSHAgentSocket]; !ok {
sshConf[mkProviderSSHAgentSocket] = ""
}
sshClient, err = ssh.NewClient(
sshConf[mkProviderSSHUsername].(string),
sshConf[mkProviderSSHPassword].(string),
sshConf[mkProviderSSHAgent].(bool),
sshConf[mkProviderSSHAgentSocket].(string),
)
if err != nil {
return nil, diag.Errorf("error creating SSH client: %s", err)
}
config := proxmoxtf.NewProviderConfiguration(apiClient, sshClient)
return config, nil
}