-
Notifications
You must be signed in to change notification settings - Fork 33
/
Copy pathdatasource_permission_template.go
127 lines (92 loc) · 3.9 KB
/
datasource_permission_template.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
// © Broadcom. All Rights Reserved.
// The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries.
// SPDX-License-Identifier: MPL-2.0
package permissiontemplate
import (
"context"
"encoding/base64"
"encoding/json"
"strings"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/pkg/errors"
"github.com/vmware/terraform-provider-tanzu-mission-control/internal/authctx"
clienterrors "github.com/vmware/terraform-provider-tanzu-mission-control/internal/client/errors"
permissiontemplatemodels "github.com/vmware/terraform-provider-tanzu-mission-control/internal/models/permissiontemplate"
)
func DataSourcePermissionTemplate() *schema.Resource {
return &schema.Resource{
ReadContext: dataSourcePermissionTemplateRead,
Schema: permissionTemplateSchema,
}
}
func validateSchema(data *schema.ResourceData) (err error) {
capability := data.Get(CapabilityKey).(string)
provider := data.Get(ProviderKey).(string)
capabilityMatchingProvider := capabilityProviderMap[capability]
if provider != capabilityMatchingProvider {
return errors.Errorf("When %s is set to '%s' %s must be set to '%s'.\nProvider is '%s'.", CapabilityKey, capability, ProviderKey, capabilityMatchingProvider, provider)
}
return err
}
func dataSourcePermissionTemplateRead(ctx context.Context, data *schema.ResourceData, m interface{}) (diags diag.Diagnostics) {
var response *permissiontemplatemodels.VmwareTanzuManageV1alpha1AccountCredentialPermissionTemplateResponse
err := validateSchema(data)
if err != nil {
return diag.FromErr(errors.Wrapf(err, "Schema validation failed."))
}
config := m.(authctx.TanzuContext)
request, err := tfModelRequestConverter.ConvertTFSchemaToAPIModel(data, []string{CredentialsNameKey, CapabilityKey, ProviderKey})
if err != nil {
return diag.FromErr(errors.Wrapf(err, "Couldn't read permission template."))
}
response, err = config.TMCConnection.PermissionTemplateService.PermissionTemplateResourceServiceGet(request)
if err != nil {
if !clienterrors.IsNotFoundError(err) {
return diag.FromErr(errors.Wrapf(err, "Couldn't read permission template."))
}
response, err = config.TMCConnection.PermissionTemplateService.PermissionTemplateResourceServiceGenerate(request)
if err != nil {
diags = diag.FromErr(errors.Wrapf(err, "Couldn't read permission template."))
}
}
if len(response.TemplateValues) > 0 {
// This is necessary because sometimes the template parameters definition and the template values returned from the API do not match.
err = removeUndefinedTemplateValues(response)
if err != nil {
diags = diag.FromErr(errors.Wrapf(err, "Couldn't read permission template."))
}
}
err = tfModelResponseConverter.FillTFSchema(response, data)
if err != nil {
diags = diag.FromErr(errors.Wrapf(err, "Couldn't read permission template."))
}
idFields := []string{request.FullName.Name, request.Capability, string(*request.Provider)}
data.SetId(strings.Join(idFields, "/"))
return diags
}
func removeUndefinedTemplateValues(response *permissiontemplatemodels.VmwareTanzuManageV1alpha1AccountCredentialPermissionTemplateResponse) error {
var templateJSON map[string]interface{}
templateBytes, err := base64.StdEncoding.DecodeString(response.PermissionTemplate)
if err != nil {
return err
}
err = json.Unmarshal(templateBytes, &templateJSON)
if err != nil {
return err
}
definedTemplateValues := make(map[string]string)
undefinedTemplateValues := make(map[string]string)
templateParametersDefinition := templateJSON["Parameters"].(map[string]interface{})
for key, value := range response.TemplateValues {
_, keyExists := templateParametersDefinition[key]
if keyExists {
definedTemplateValues[key] = value
} else {
undefinedTemplateValues[key] = value
}
}
response.TemplateValues = definedTemplateValues
response.UndefinedTemplateValues = undefinedTemplateValues
return nil
}