From e414adc8545bae9e1633e64f20e906a87e668929 Mon Sep 17 00:00:00 2001 From: Emond Papegaaij Date: Fri, 13 Oct 2023 08:44:18 +0200 Subject: [PATCH] First generated resources --- docs/resources/group.md | 110 ++--- docs/resources/vaultrecord.md | 2 +- .../provider-install-verification/main.tf | 45 +- internal/provider/full-data-struct-ds.go | 70 +-- internal/provider/full-data-struct-rs.go | 70 +-- internal/provider/full-helpers.go | 101 ++-- internal/provider/full-object-attrs-ds.go | 70 +-- internal/provider/full-object-attrs-rs.go | 70 +-- internal/provider/full-schema-ds.go | 188 ++++---- internal/provider/full-schema-rs.go | 440 +++++++++++++----- .../provider/full-tf-to-data-struct-ds.go | 70 +-- .../provider/full-tf-to-data-struct-rs.go | 70 +-- internal/provider/full-tf-to-tkh-ds.go | 282 +++++------ internal/provider/full-tf-to-tkh-rs.go | 282 +++++------ internal/provider/full-tkh-to-tf-ds.go | 282 +++++------ internal/provider/full-tkh-to-tf-rs.go | 282 +++++------ internal/provider/provider.go | 3 +- .../{group_resource.go => resource-group.go} | 106 ++--- .../provider/resource-group_vaultrecord.go | 225 +++++++++ internal/provider/resource-grouponsystem.go | 167 +++++++ internal/provider/resource-vaultrecord.go | 262 ----------- main.go | 5 +- 22 files changed, 1771 insertions(+), 1431 deletions(-) rename internal/provider/{group_resource.go => resource-group.go} (52%) create mode 100644 internal/provider/resource-group_vaultrecord.go create mode 100644 internal/provider/resource-grouponsystem.go delete mode 100644 internal/provider/resource-vaultrecord.go diff --git a/docs/resources/group.md b/docs/resources/group.md index d2c5c60..14b0e90 100644 --- a/docs/resources/group.md +++ b/docs/resources/group.md @@ -104,16 +104,16 @@ Required: Optional: -- `directory_uuid` (String) - `end_date` (String) -- `two_factor_status` (String) Read-Only: +- `directory_uuid` (String) - `disconnected_nested` (Boolean) - `last_used` (String) - `nested` (Boolean) - `provisioning_end_time` (String) +- `two_factor_status` (String) - `visible_for_provisioning` (Boolean) @@ -135,16 +135,16 @@ Required: Optional: -- `directory_uuid` (String) - `end_date` (String) -- `two_factor_status` (String) Read-Only: +- `directory_uuid` (String) - `disconnected_nested` (Boolean) - `last_used` (String) - `nested` (Boolean) - `provisioning_end_time` (String) +- `two_factor_status` (String) - `visible_for_provisioning` (Boolean) @@ -187,13 +187,13 @@ Optional: - `initiate_login_uri` (String) - `resource_uris` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) - `show_landing_page` (Boolean) - `use_client_credentials` (Boolean) Read-Only: - `account_permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--client_permissions--items--permissions--account_permissions)) +- `shared_secret_uuid` (String) ### Nested Schema for `additional_objects.client_permissions.items.permissions.attributes` @@ -214,7 +214,7 @@ Optional: ### Nested Schema for `additional_objects.client_permissions.items.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -247,7 +247,6 @@ Optional: Required: -- `client_client_application_primer_type` (String) - `name` (String) Optional: @@ -262,6 +261,7 @@ Optional: Read-Only: +- `client_client_application_primer_type` (String) - `last_modified_at` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--administered_clients--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--administered_clients--items--permissions)) @@ -275,11 +275,11 @@ Optional: - `client_certificate_uuid` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) Read-Only: - `bind_dn` (String) +- `shared_secret_uuid` (String) - `used_for_provisioning` (Boolean) @@ -296,13 +296,13 @@ Optional: - `initiate_login_uri` (String) - `resource_uris` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) - `show_landing_page` (Boolean) - `use_client_credentials` (Boolean) Read-Only: - `account_permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--administered_clients--items--uuid--account_permissions)) +- `shared_secret_uuid` (String) ### Nested Schema for `additional_objects.administered_clients.items.uuid.attributes` @@ -341,7 +341,7 @@ Optional: ### Nested Schema for `additional_objects.administered_clients.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -391,7 +391,6 @@ Optional: - `provisioned_internal_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--administered_systems--items--provisioned_internal_ldap)) - `provisioned_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--administered_systems--items--provisioned_ldap)) - `provisioned_ldap_directory` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--administered_systems--items--provisioned_ldap_directory)) -- `provisioning_provisioned_system_primer_type` (String) - `self_service_existing_groups` (Boolean) - `self_service_new_groups` (Boolean) - `self_service_service_accounts` (Boolean) @@ -404,6 +403,7 @@ Read-Only: - `external_uuid` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--administered_systems--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--administered_systems--items--permissions)) +- `provisioning_provisioned_system_primer_type` (String) - `uuid` (String) @@ -492,11 +492,11 @@ Optional: - `client_certificate_uuid` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) Read-Only: - `bind_dn` (String) +- `shared_secret_uuid` (String) - `used_for_provisioning` (Boolean) @@ -533,7 +533,7 @@ Read-Only: ### Nested Schema for `additional_objects.administered_systems.items.uuid.numbering.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -566,7 +566,7 @@ Required: ### Nested Schema for `additional_objects.administered_systems.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -659,7 +659,7 @@ Read-Only: ### Nested Schema for `additional_objects.authorized_groups.items.uuid.links` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -682,7 +682,7 @@ Optional: ### Nested Schema for `additional_objects.authorized_groups.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -716,20 +716,20 @@ Optional: Optional: - `activation_required` (Boolean) -- `owner_uuid` (String) -- `technical_administrator_uuid` (String) Read-Only: - `client_uuid` (String) - `group_uuid` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--clients--items--links)) +- `owner_uuid` (String) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--clients--items--permissions)) +- `technical_administrator_uuid` (String) -### Nested Schema for `additional_objects.clients.items.permissions` +### Nested Schema for `additional_objects.clients.items.technical_administrator_uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -738,7 +738,7 @@ Optional: -### Nested Schema for `additional_objects.clients.items.permissions` +### Nested Schema for `additional_objects.clients.items.technical_administrator_uuid` Optional: @@ -779,7 +779,6 @@ Optional: - `provisioned_internal_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--content_administered_systems--items--provisioned_internal_ldap)) - `provisioned_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--content_administered_systems--items--provisioned_ldap)) - `provisioned_ldap_directory` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--content_administered_systems--items--provisioned_ldap_directory)) -- `provisioning_provisioned_system_primer_type` (String) - `self_service_existing_groups` (Boolean) - `self_service_new_groups` (Boolean) - `self_service_service_accounts` (Boolean) @@ -792,6 +791,7 @@ Read-Only: - `external_uuid` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--content_administered_systems--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--content_administered_systems--items--permissions)) +- `provisioning_provisioned_system_primer_type` (String) - `uuid` (String) @@ -880,11 +880,11 @@ Optional: - `client_certificate_uuid` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) Read-Only: - `bind_dn` (String) +- `shared_secret_uuid` (String) - `used_for_provisioning` (Boolean) @@ -921,7 +921,7 @@ Read-Only: ### Nested Schema for `additional_objects.content_administered_systems.items.uuid.numbering.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -954,7 +954,7 @@ Required: ### Nested Schema for `additional_objects.content_administered_systems.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1040,7 +1040,7 @@ Optional: ### Nested Schema for `additional_objects.helpdesk.items.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1093,16 +1093,16 @@ Required: Optional: -- `directory_uuid` (String) - `end_date` (String) -- `two_factor_status` (String) Read-Only: +- `directory_uuid` (String) - `disconnected_nested` (Boolean) - `last_used` (String) - `nested` (Boolean) - `provisioning_end_time` (String) +- `two_factor_status` (String) - `visible_for_provisioning` (Boolean) @@ -1116,16 +1116,16 @@ Required: Optional: -- `directory_uuid` (String) - `end_date` (String) -- `two_factor_status` (String) Read-Only: +- `directory_uuid` (String) - `disconnected_nested` (Boolean) - `last_used` (String) - `nested` (Boolean) - `provisioning_end_time` (String) +- `two_factor_status` (String) - `visible_for_provisioning` (Boolean) @@ -1149,7 +1149,6 @@ Optional: Required: -- `client_client_application_primer_type` (String) - `name` (String) Optional: @@ -1164,6 +1163,7 @@ Optional: Read-Only: +- `client_client_application_primer_type` (String) - `last_modified_at` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_clients--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_clients--items--permissions)) @@ -1177,11 +1177,11 @@ Optional: - `client_certificate_uuid` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) Read-Only: - `bind_dn` (String) +- `shared_secret_uuid` (String) - `used_for_provisioning` (Boolean) @@ -1198,13 +1198,13 @@ Optional: - `initiate_login_uri` (String) - `resource_uris` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) - `show_landing_page` (Boolean) - `use_client_credentials` (Boolean) Read-Only: - `account_permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_clients--items--uuid--account_permissions)) +- `shared_secret_uuid` (String) ### Nested Schema for `additional_objects.owned_clients.items.uuid.attributes` @@ -1243,7 +1243,7 @@ Optional: ### Nested Schema for `additional_objects.owned_clients.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1284,7 +1284,6 @@ Optional: - `active` (Boolean) - `default_directory` (Boolean) -- `directory_account_directory_primer_type` (String) - `helpdesk_group_uuid` (String) - `internal_directory` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--owned_directories--items--internal_directory)) - `l_d_a_p_directory` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--owned_directories--items--l_d_a_p_directory)) @@ -1296,6 +1295,7 @@ Optional: Read-Only: - `account_validity_supported` (Boolean) +- `directory_account_directory_primer_type` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_directories--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_directories--items--permissions)) - `uuid` (String) @@ -1363,7 +1363,7 @@ Read-Only: ### Nested Schema for `additional_objects.owned_directories.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1415,7 +1415,7 @@ Read-Only: ### Nested Schema for `additional_objects.owned_groups_on_system.items.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1454,19 +1454,19 @@ Required: Optional: - `description` (String) -- `parent_uuid` (String) Read-Only: - `depth` (Number) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_organizational_units--items--links)) +- `parent_uuid` (String) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_organizational_units--items--permissions)) - `uuid` (String) ### Nested Schema for `additional_objects.owned_organizational_units.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1516,7 +1516,6 @@ Optional: - `provisioned_internal_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--owned_systems--items--provisioned_internal_ldap)) - `provisioned_ldap` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--owned_systems--items--provisioned_ldap)) - `provisioned_ldap_directory` (Attributes) (see [below for nested schema](#nestedatt--additional_objects--owned_systems--items--provisioned_ldap_directory)) -- `provisioning_provisioned_system_primer_type` (String) - `self_service_existing_groups` (Boolean) - `self_service_new_groups` (Boolean) - `self_service_service_accounts` (Boolean) @@ -1529,6 +1528,7 @@ Read-Only: - `external_uuid` (String) - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_systems--items--links)) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--owned_systems--items--permissions)) +- `provisioning_provisioned_system_primer_type` (String) - `uuid` (String) @@ -1617,11 +1617,11 @@ Optional: - `client_certificate_uuid` (String) - `share_secret_in_vault` (Boolean) -- `shared_secret_uuid` (String) Read-Only: - `bind_dn` (String) +- `shared_secret_uuid` (String) - `used_for_provisioning` (Boolean) @@ -1658,7 +1658,7 @@ Read-Only: ### Nested Schema for `additional_objects.owned_systems.items.uuid.numbering.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1691,7 +1691,7 @@ Required: ### Nested Schema for `additional_objects.owned_systems.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1752,7 +1752,6 @@ Optional: - `account_uuid` (String) - `action` (String) - `comment` (String) -- `rights` (String) Read-Only: @@ -1765,12 +1764,13 @@ Read-Only: - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--recent_audits--items--submitted_by--links)) - `nested` (Boolean) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--recent_audits--items--submitted_by--permissions)) +- `rights` (String) - `username` (String) ### Nested Schema for `additional_objects.recent_audits.items.submitted_by.links` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1793,7 +1793,7 @@ Optional: ### Nested Schema for `additional_objects.recent_audits.items.submitted_by` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1834,12 +1834,12 @@ Optional: - `active` (Boolean) - `description` (String) -- `password_uuid` (String) - `technical_administrator_uuid` (String) Read-Only: - `links` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--service_accounts--items--links)) +- `password_uuid` (String) - `permissions` (Attributes List) (see [below for nested schema](#nestedatt--additional_objects--service_accounts--items--permissions)) - `username` (String) - `uuid` (String) @@ -1847,7 +1847,7 @@ Read-Only: ### Nested Schema for `additional_objects.service_accounts.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1912,7 +1912,7 @@ Read-Only: ### Nested Schema for `additional_objects.systems.items.permissions.links` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1935,7 +1935,7 @@ Optional: ### Nested Schema for `additional_objects.systems.items.permissions` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -1998,7 +1998,7 @@ Read-Only: ### Nested Schema for `additional_objects.vault.records.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -2021,7 +2021,7 @@ Optional: ### Nested Schema for `additional_objects.vault.links` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -2086,7 +2086,7 @@ Read-Only: ### Nested Schema for `additional_objects.webhooks.items.uuid` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -2123,7 +2123,7 @@ Read-Only: ### Nested Schema for `audit_config.links` -Optional: +Read-Only: - `href` (String) - `id` (Number) @@ -2146,7 +2146,7 @@ Optional: ### Nested Schema for `links` -Optional: +Read-Only: - `href` (String) - `id` (Number) diff --git a/docs/resources/vaultrecord.md b/docs/resources/vaultrecord.md index 6219b4d..d499572 100644 --- a/docs/resources/vaultrecord.md +++ b/docs/resources/vaultrecord.md @@ -143,7 +143,7 @@ Optional: ### Nested Schema for `links` -Optional: +Read-Only: - `href` (String) - `id` (Number) diff --git a/examples/provider-install-verification/main.tf b/examples/provider-install-verification/main.tf index 508cf8a..a158767 100644 --- a/examples/provider-install-verification/main.tf +++ b/examples/provider-install-verification/main.tf @@ -24,11 +24,11 @@ provider "keyhubpreview" { clientsecret = var.keyhub_secret_local } -data "keyhubpreview_group" "test" { - # uuid = "2fb85263-6406-44f9-9e8a-b1a6d1f43250" - uuid = "c6c98d08-2cbf-45e9-937a-c5c0427348e2" - additional = ["accounts"] -} +#data "keyhubpreview_group" "test" { +# # uuid = "2fb85263-6406-44f9-9e8a-b1a6d1f43250" +# uuid = "c6c98d08-2cbf-45e9-937a-c5c0427348e2" +# additional = ["accounts"] +#} #output "data_group" { # value = data.keyhubpreview_group.test @@ -42,29 +42,28 @@ data "keyhubpreview_group" "test" { # value = data.keyhubpreview_client.test #} -resource "keyhubpreview_vaultrecord" "terrarecord" { - name = "Terraform Record" - group_uuid = data.keyhubpreview_group.test.uuid +#resource "keyhubpreview_vaultrecord" "terrarecord" { +# name = "Terraform Record" +# group_uuid = data.keyhubpreview_group.test.uuid +# additional_objects = { +# secret = { +# password = "test3" +# } +# } +#} + +resource "keyhubpreview_group" "terra" { + name = "Terraform x" additional_objects = { - secret = { - password = "test3" + accounts = { + items = [{ + uuid = "7ea6622b-f9d2-4e52-a799-217b26f88376" + rights = "MANAGER" + }] } } } -#resource "keyhubpreview_group" "terra" { -# name = "Terraform" -# additional_objects = { -# accounts = { -# items = [{ -# uuid = "7ea6622b-f9d2-4e52-a799-217b26f88376" -# rights = "MANAGER" -# }] -# } -# } -# admin = true -#} -# #output "resource_group" { # value = resource.keyhubpreview_group.terra #} diff --git a/internal/provider/full-data-struct-ds.go b/internal/provider/full-data-struct-ds.go index d3f3edf..006c563 100644 --- a/internal/provider/full-data-struct-ds.go +++ b/internal/provider/full-data-struct-ds.go @@ -644,10 +644,10 @@ type directoryAccountDirectoryDataDS struct { Restrict2fa types.Bool `tfsdk:"restrict2fa"` RotatingPassword types.String `tfsdk:"rotating_password"` UsernameCustomizable types.Bool `tfsdk:"username_customizable"` - InternalDirectory types.Object `tfsdk:"internal_directory"` + MaintenanceDirectory types.Object `tfsdk:"maintenance_directory"` OIDCDirectory types.Object `tfsdk:"o_id_c_directory"` LDAPDirectory types.Object `tfsdk:"l_d_a_p_directory"` - MaintenanceDirectory types.Object `tfsdk:"maintenance_directory"` + InternalDirectory types.Object `tfsdk:"internal_directory"` } var directoryAccountDirectoryLinkableWrapperAttrTypesDS = objectAttrsTypeDSDirectoryAccountDirectoryLinkableWrapper(false) @@ -1265,8 +1265,8 @@ type launchpadLaunchpadTileDataDS struct { LaunchpadLaunchpadTileType types.String `tfsdk:"launchpad_launchpad_tile_type"` Logo types.List `tfsdk:"logo"` VaultRecord types.Object `tfsdk:"vault_record"` - VaultRecordLaunchpadTile types.Object `tfsdk:"vault_record_launchpad_tile"` SsoApplicationLaunchpadTile types.Object `tfsdk:"sso_application_launchpad_tile"` + VaultRecordLaunchpadTile types.Object `tfsdk:"vault_record_launchpad_tile"` ManualLaunchpadTile types.Object `tfsdk:"manual_launchpad_tile"` } @@ -2077,14 +2077,14 @@ type provisioningProvisionedSystemDataDS struct { ShouldDestroyUnknownAccounts types.Bool `tfsdk:"should_destroy_unknown_accounts"` TechnicalAdministrator types.Object `tfsdk:"technical_administrator"` UsernamePrefix types.String `tfsdk:"username_prefix"` + ProvisionedAzureOIDCDirectory types.Object `tfsdk:"provisioned_azure_oidc_directory"` + ProvisionedInternalLDAP types.Object `tfsdk:"provisioned_internal_ldap"` AbstractProvisionedLDAP types.Object `tfsdk:"abstract_provisioned_ldap"` ProvisionedLDAP types.Object `tfsdk:"provisioned_ldap"` - ProvisionedAzureTenant types.Object `tfsdk:"provisioned_azure_tenant"` - ProvisionedInternalLDAP types.Object `tfsdk:"provisioned_internal_ldap"` - ProvisionedAzureOIDCDirectory types.Object `tfsdk:"provisioned_azure_oidc_directory"` + ProvisionedAzureSyncLDAPDirectory types.Object `tfsdk:"provisioned_azure_sync_ldap_directory"` ProvisionedLDAPDirectory types.Object `tfsdk:"provisioned_ldap_directory"` ProvisionedAD types.Object `tfsdk:"provisioned_a_d"` - ProvisionedAzureSyncLDAPDirectory types.Object `tfsdk:"provisioned_azure_sync_ldap_directory"` + ProvisionedAzureTenant types.Object `tfsdk:"provisioned_azure_tenant"` } var provisioningProvisionedSystemLinkableWrapperAttrTypesDS = objectAttrsTypeDSProvisioningProvisionedSystemLinkableWrapper(false) @@ -2353,43 +2353,43 @@ type requestModificationRequestDataDS struct { MailKey types.String `tfsdk:"mail_key"` RequestModificationRequestType types.String `tfsdk:"request_modification_request_type"` Status types.String `tfsdk:"status"` - AbstractProvisionedSystemModificationRequest types.Object `tfsdk:"abstract_provisioned_system_modification_request"` - TransferProvisionedSystemAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_administration_request"` - TransferProvisionedSystemOwnershipRequest types.Object `tfsdk:"transfer_provisioned_system_ownership_request"` - PasswordResetRequest types.Object `tfsdk:"password_reset_request"` - RevokeAdminRequest types.Object `tfsdk:"revoke_admin_request"` - GrantGroupOnSystemRequestRequest types.Object `tfsdk:"grant_group_on_system_request_request"` - AbstractApplicationModificationRequest types.Object `tfsdk:"abstract_application_modification_request"` - TransferApplicationAdministrationRequest types.Object `tfsdk:"transfer_application_administration_request"` - CreateServiceAccountRequest types.Object `tfsdk:"create_service_account_request"` - RemoveProvisionedSystemRequest types.Object `tfsdk:"remove_provisioned_system_request"` - ReviewAuditRequest types.Object `tfsdk:"review_audit_request"` AbstractOrganizationalUnitModificationRequest types.Object `tfsdk:"abstract_organizational_unit_modification_request"` CreateGroupRequest types.Object `tfsdk:"create_group_request"` - GrantGroupOnSystemRequest types.Object `tfsdk:"grant_group_on_system_request"` - VerifyInternalAccountRequest types.Object `tfsdk:"verify_internal_account_request"` + AbstractApplicationModificationRequest types.Object `tfsdk:"abstract_application_modification_request"` + TransferApplicationOwnershipRequest types.Object `tfsdk:"transfer_application_ownership_request"` GrantClientPermissionRequest types.Object `tfsdk:"grant_client_permission_request"` - TransferOrganizationalUnitOwnershipRequest types.Object `tfsdk:"transfer_organizational_unit_ownership_request"` - SetupNestedGroupRequest types.Object `tfsdk:"setup_nested_group_request"` - JoinVaultRequest types.Object `tfsdk:"join_vault_request"` + JoinGroupRequest types.Object `tfsdk:"join_group_request"` + AbstractProvisionedSystemModificationRequest types.Object `tfsdk:"abstract_provisioned_system_modification_request"` + TransferProvisionedSystemContentAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_content_administration_request"` + GrantGroupOnSystemRequest types.Object `tfsdk:"grant_group_on_system_request"` + TransferProvisionedSystemOwnershipRequest types.Object `tfsdk:"transfer_provisioned_system_ownership_request"` + GrantServiceAccountGroupRequest types.Object `tfsdk:"grant_service_account_group_request"` + Disable2FARequest types.Object `tfsdk:"disable2fa_request"` + RemoveProvisionedSystemRequest types.Object `tfsdk:"remove_provisioned_system_request"` TransferServiceAccountAdministrationRequest types.Object `tfsdk:"transfer_service_account_administration_request"` - GrantApplicationRequest types.Object `tfsdk:"grant_application_request"` - GrantAccessRequest types.Object `tfsdk:"grant_access_request"` - TransferGroupOnSystemOwnershipRequest types.Object `tfsdk:"transfer_group_on_system_ownership_request"` + PasswordResetRequest types.Object `tfsdk:"password_reset_request"` + TransferAuditorGroupRequest types.Object `tfsdk:"transfer_auditor_group_request"` + UpdateGroupMembershipRequest types.Object `tfsdk:"update_group_membership_request"` AddGroupAdminRequest types.Object `tfsdk:"add_group_admin_request"` + RemoveOrganizationalUnitRequest types.Object `tfsdk:"remove_organizational_unit_request"` + TransferProvisionedSystemAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_administration_request"` + VerifyInternalAccountRequest types.Object `tfsdk:"verify_internal_account_request"` + TransferApplicationAdministrationRequest types.Object `tfsdk:"transfer_application_administration_request"` ExtendAccessRequest types.Object `tfsdk:"extend_access_request"` - TransferProvisionedSystemContentAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_content_administration_request"` - UpdateGroupMembershipRequest types.Object `tfsdk:"update_group_membership_request"` - TransferAuditorGroupRequest types.Object `tfsdk:"transfer_auditor_group_request"` - TransferApplicationOwnershipRequest types.Object `tfsdk:"transfer_application_ownership_request"` - RemoveGroupRequest types.Object `tfsdk:"remove_group_request"` + GrantGroupOnSystemRequestRequest types.Object `tfsdk:"grant_group_on_system_request_request"` + JoinVaultRequest types.Object `tfsdk:"join_vault_request"` + GrantAccessRequest types.Object `tfsdk:"grant_access_request"` + RevokeAdminRequest types.Object `tfsdk:"revoke_admin_request"` SetupAuthorizingGroupRequest types.Object `tfsdk:"setup_authorizing_group_request"` + TransferOrganizationalUnitOwnershipRequest types.Object `tfsdk:"transfer_organizational_unit_ownership_request"` + CreateServiceAccountRequest types.Object `tfsdk:"create_service_account_request"` CreateGroupOnSystemRequest types.Object `tfsdk:"create_group_on_system_request"` - RemoveOrganizationalUnitRequest types.Object `tfsdk:"remove_organizational_unit_request"` - GrantServiceAccountGroupRequest types.Object `tfsdk:"grant_service_account_group_request"` - Disable2FARequest types.Object `tfsdk:"disable2fa_request"` - JoinGroupRequest types.Object `tfsdk:"join_group_request"` + ReviewAuditRequest types.Object `tfsdk:"review_audit_request"` EnableTechnicalAdministrationRequest types.Object `tfsdk:"enable_technical_administration_request"` + SetupNestedGroupRequest types.Object `tfsdk:"setup_nested_group_request"` + TransferGroupOnSystemOwnershipRequest types.Object `tfsdk:"transfer_group_on_system_ownership_request"` + RemoveGroupRequest types.Object `tfsdk:"remove_group_request"` + GrantApplicationRequest types.Object `tfsdk:"grant_application_request"` } var requestModificationRequestLinkableWrapperAttrTypesDS = objectAttrsTypeDSRequestModificationRequestLinkableWrapper(false) diff --git a/internal/provider/full-data-struct-rs.go b/internal/provider/full-data-struct-rs.go index a97a206..427567a 100644 --- a/internal/provider/full-data-struct-rs.go +++ b/internal/provider/full-data-struct-rs.go @@ -609,10 +609,10 @@ type directoryAccountDirectoryDataRS struct { Restrict2fa types.Bool `tfsdk:"restrict2fa"` RotatingPassword types.String `tfsdk:"rotating_password"` UsernameCustomizable types.Bool `tfsdk:"username_customizable"` - InternalDirectory types.Object `tfsdk:"internal_directory"` + MaintenanceDirectory types.Object `tfsdk:"maintenance_directory"` OIDCDirectory types.Object `tfsdk:"o_id_c_directory"` LDAPDirectory types.Object `tfsdk:"l_d_a_p_directory"` - MaintenanceDirectory types.Object `tfsdk:"maintenance_directory"` + InternalDirectory types.Object `tfsdk:"internal_directory"` } var directoryAccountDirectoryLinkableWrapperAttrTypesRS = objectAttrsTypeRSDirectoryAccountDirectoryLinkableWrapper(false) @@ -1210,8 +1210,8 @@ type launchpadLaunchpadTileDataRS struct { LaunchpadLaunchpadTileType types.String `tfsdk:"launchpad_launchpad_tile_type"` Logo types.List `tfsdk:"logo"` VaultRecordUUID types.String `tfsdk:"vault_record_uuid"` - VaultRecordLaunchpadTile types.Object `tfsdk:"vault_record_launchpad_tile"` SsoApplicationLaunchpadTile types.Object `tfsdk:"sso_application_launchpad_tile"` + VaultRecordLaunchpadTile types.Object `tfsdk:"vault_record_launchpad_tile"` ManualLaunchpadTile types.Object `tfsdk:"manual_launchpad_tile"` } @@ -1939,14 +1939,14 @@ type provisioningProvisionedSystemDataRS struct { ShouldDestroyUnknownAccounts types.Bool `tfsdk:"should_destroy_unknown_accounts"` TechnicalAdministratorUUID types.String `tfsdk:"technical_administrator_uuid"` UsernamePrefix types.String `tfsdk:"username_prefix"` + ProvisionedAzureOIDCDirectory types.Object `tfsdk:"provisioned_azure_oidc_directory"` + ProvisionedInternalLDAP types.Object `tfsdk:"provisioned_internal_ldap"` AbstractProvisionedLDAP types.Object `tfsdk:"abstract_provisioned_ldap"` ProvisionedLDAP types.Object `tfsdk:"provisioned_ldap"` - ProvisionedAzureTenant types.Object `tfsdk:"provisioned_azure_tenant"` - ProvisionedInternalLDAP types.Object `tfsdk:"provisioned_internal_ldap"` - ProvisionedAzureOIDCDirectory types.Object `tfsdk:"provisioned_azure_oidc_directory"` + ProvisionedAzureSyncLDAPDirectory types.Object `tfsdk:"provisioned_azure_sync_ldap_directory"` ProvisionedLDAPDirectory types.Object `tfsdk:"provisioned_ldap_directory"` ProvisionedAD types.Object `tfsdk:"provisioned_a_d"` - ProvisionedAzureSyncLDAPDirectory types.Object `tfsdk:"provisioned_azure_sync_ldap_directory"` + ProvisionedAzureTenant types.Object `tfsdk:"provisioned_azure_tenant"` } var provisioningProvisionedSystemLinkableWrapperAttrTypesRS = objectAttrsTypeRSProvisioningProvisionedSystemLinkableWrapper(false) @@ -2213,43 +2213,43 @@ type requestModificationRequestDataRS struct { MailKey types.String `tfsdk:"mail_key"` RequestModificationRequestType types.String `tfsdk:"request_modification_request_type"` Status types.String `tfsdk:"status"` - AbstractProvisionedSystemModificationRequest types.Object `tfsdk:"abstract_provisioned_system_modification_request"` - TransferProvisionedSystemAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_administration_request"` - TransferProvisionedSystemOwnershipRequest types.Object `tfsdk:"transfer_provisioned_system_ownership_request"` - PasswordResetRequest types.Object `tfsdk:"password_reset_request"` - RevokeAdminRequest types.Object `tfsdk:"revoke_admin_request"` - GrantGroupOnSystemRequestRequest types.Object `tfsdk:"grant_group_on_system_request_request"` - AbstractApplicationModificationRequest types.Object `tfsdk:"abstract_application_modification_request"` - TransferApplicationAdministrationRequest types.Object `tfsdk:"transfer_application_administration_request"` - CreateServiceAccountRequest types.Object `tfsdk:"create_service_account_request"` - RemoveProvisionedSystemRequest types.Object `tfsdk:"remove_provisioned_system_request"` - ReviewAuditRequest types.Object `tfsdk:"review_audit_request"` AbstractOrganizationalUnitModificationRequest types.Object `tfsdk:"abstract_organizational_unit_modification_request"` CreateGroupRequest types.Object `tfsdk:"create_group_request"` - GrantGroupOnSystemRequest types.Object `tfsdk:"grant_group_on_system_request"` - VerifyInternalAccountRequest types.Object `tfsdk:"verify_internal_account_request"` + AbstractApplicationModificationRequest types.Object `tfsdk:"abstract_application_modification_request"` + TransferApplicationOwnershipRequest types.Object `tfsdk:"transfer_application_ownership_request"` GrantClientPermissionRequest types.Object `tfsdk:"grant_client_permission_request"` - TransferOrganizationalUnitOwnershipRequest types.Object `tfsdk:"transfer_organizational_unit_ownership_request"` - SetupNestedGroupRequest types.Object `tfsdk:"setup_nested_group_request"` - JoinVaultRequest types.Object `tfsdk:"join_vault_request"` + JoinGroupRequest types.Object `tfsdk:"join_group_request"` + AbstractProvisionedSystemModificationRequest types.Object `tfsdk:"abstract_provisioned_system_modification_request"` + TransferProvisionedSystemContentAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_content_administration_request"` + GrantGroupOnSystemRequest types.Object `tfsdk:"grant_group_on_system_request"` + TransferProvisionedSystemOwnershipRequest types.Object `tfsdk:"transfer_provisioned_system_ownership_request"` + GrantServiceAccountGroupRequest types.Object `tfsdk:"grant_service_account_group_request"` + Disable2FARequest types.Object `tfsdk:"disable2fa_request"` + RemoveProvisionedSystemRequest types.Object `tfsdk:"remove_provisioned_system_request"` TransferServiceAccountAdministrationRequest types.Object `tfsdk:"transfer_service_account_administration_request"` - GrantApplicationRequest types.Object `tfsdk:"grant_application_request"` - GrantAccessRequest types.Object `tfsdk:"grant_access_request"` - TransferGroupOnSystemOwnershipRequest types.Object `tfsdk:"transfer_group_on_system_ownership_request"` + PasswordResetRequest types.Object `tfsdk:"password_reset_request"` + TransferAuditorGroupRequest types.Object `tfsdk:"transfer_auditor_group_request"` + UpdateGroupMembershipRequest types.Object `tfsdk:"update_group_membership_request"` AddGroupAdminRequest types.Object `tfsdk:"add_group_admin_request"` + RemoveOrganizationalUnitRequest types.Object `tfsdk:"remove_organizational_unit_request"` + TransferProvisionedSystemAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_administration_request"` + VerifyInternalAccountRequest types.Object `tfsdk:"verify_internal_account_request"` + TransferApplicationAdministrationRequest types.Object `tfsdk:"transfer_application_administration_request"` ExtendAccessRequest types.Object `tfsdk:"extend_access_request"` - TransferProvisionedSystemContentAdministrationRequest types.Object `tfsdk:"transfer_provisioned_system_content_administration_request"` - UpdateGroupMembershipRequest types.Object `tfsdk:"update_group_membership_request"` - TransferAuditorGroupRequest types.Object `tfsdk:"transfer_auditor_group_request"` - TransferApplicationOwnershipRequest types.Object `tfsdk:"transfer_application_ownership_request"` - RemoveGroupRequest types.Object `tfsdk:"remove_group_request"` + GrantGroupOnSystemRequestRequest types.Object `tfsdk:"grant_group_on_system_request_request"` + JoinVaultRequest types.Object `tfsdk:"join_vault_request"` + GrantAccessRequest types.Object `tfsdk:"grant_access_request"` + RevokeAdminRequest types.Object `tfsdk:"revoke_admin_request"` SetupAuthorizingGroupRequest types.Object `tfsdk:"setup_authorizing_group_request"` + TransferOrganizationalUnitOwnershipRequest types.Object `tfsdk:"transfer_organizational_unit_ownership_request"` + CreateServiceAccountRequest types.Object `tfsdk:"create_service_account_request"` CreateGroupOnSystemRequest types.Object `tfsdk:"create_group_on_system_request"` - RemoveOrganizationalUnitRequest types.Object `tfsdk:"remove_organizational_unit_request"` - GrantServiceAccountGroupRequest types.Object `tfsdk:"grant_service_account_group_request"` - Disable2FARequest types.Object `tfsdk:"disable2fa_request"` - JoinGroupRequest types.Object `tfsdk:"join_group_request"` + ReviewAuditRequest types.Object `tfsdk:"review_audit_request"` EnableTechnicalAdministrationRequest types.Object `tfsdk:"enable_technical_administration_request"` + SetupNestedGroupRequest types.Object `tfsdk:"setup_nested_group_request"` + TransferGroupOnSystemOwnershipRequest types.Object `tfsdk:"transfer_group_on_system_ownership_request"` + RemoveGroupRequest types.Object `tfsdk:"remove_group_request"` + GrantApplicationRequest types.Object `tfsdk:"grant_application_request"` } var requestModificationRequestLinkableWrapperAttrTypesRS = objectAttrsTypeRSRequestModificationRequestLinkableWrapper(false) diff --git a/internal/provider/full-helpers.go b/internal/provider/full-helpers.go index ff37f4d..7fb0344 100644 --- a/internal/provider/full-helpers.go +++ b/internal/provider/full-helpers.go @@ -21,7 +21,7 @@ import ( keyhubdirectory "github.com/topicuskeyhub/sdk-go/directory" keyhubgroup "github.com/topicuskeyhub/sdk-go/group" keyhubgroupclassification "github.com/topicuskeyhub/sdk-go/groupclassification" - keyhubmodel "github.com/topicuskeyhub/sdk-go/models" + keyhubmodels "github.com/topicuskeyhub/sdk-go/models" keyhuborganizationalunit "github.com/topicuskeyhub/sdk-go/organizationalunit" keyhubserviceaccount "github.com/topicuskeyhub/sdk-go/serviceaccount" keyhubsystem "github.com/topicuskeyhub/sdk-go/system" @@ -155,7 +155,7 @@ func parseCast[T any, Z any](val basetypes.StringValue, parser func(string) (Z, return caster(parsed), diags } -func findFirst[T keyhubmodel.Linkableable](ctx context.Context, wrapper interface{ GetItems() []T }, name string, uuid *string, err error) (T, diag.Diagnostics) { +func findFirst[T keyhubmodels.Linkableable](ctx context.Context, wrapper interface{ GetItems() []T }, name string, uuid *string, err error) (T, diag.Diagnostics) { var diags diag.Diagnostics var noVal T if err != nil { @@ -170,7 +170,7 @@ func findFirst[T keyhubmodel.Linkableable](ctx context.Context, wrapper interfac } -func findGroupGroupPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.GroupGroupPrimerable, diag.Diagnostics) { +func findGroupGroupPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.GroupGroupPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -180,14 +180,14 @@ func findGroupGroupPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel. Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.GroupGroupable](ctx, wrapper, "group", uuid, err) + ret, diag := findFirst[keyhubmodels.GroupGroupable](ctx, wrapper, "group", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.GroupGroup).GroupGroupPrimer, diag + return &ret.(*keyhubmodels.GroupGroup).GroupGroupPrimer, diag } -func findDirectoryAccountDirectoryPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.DirectoryAccountDirectoryPrimerable, diag.Diagnostics) { +func findDirectoryAccountDirectoryPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.DirectoryAccountDirectoryPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -197,14 +197,14 @@ func findDirectoryAccountDirectoryPrimerByUUID(ctx context.Context, uuid *string Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.DirectoryAccountDirectoryable](ctx, wrapper, "directory", uuid, err) + ret, diag := findFirst[keyhubmodels.DirectoryAccountDirectoryable](ctx, wrapper, "directory", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.DirectoryAccountDirectory).DirectoryAccountDirectoryPrimer, diag + return &ret.(*keyhubmodels.DirectoryAccountDirectory).DirectoryAccountDirectoryPrimer, diag } -func findOrganizationOrganizationalUnitPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.OrganizationOrganizationalUnitPrimerable, diag.Diagnostics) { +func findOrganizationOrganizationalUnitPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.OrganizationOrganizationalUnitPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -214,14 +214,14 @@ func findOrganizationOrganizationalUnitPrimerByUUID(ctx context.Context, uuid *s Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.OrganizationOrganizationalUnitable](ctx, wrapper, "organizational unit", uuid, err) + ret, diag := findFirst[keyhubmodels.OrganizationOrganizationalUnitable](ctx, wrapper, "organizational unit", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.OrganizationOrganizationalUnit).OrganizationOrganizationalUnitPrimer, diag + return &ret.(*keyhubmodels.OrganizationOrganizationalUnit).OrganizationOrganizationalUnitPrimer, diag } -func findCertificateCertificatePrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.CertificateCertificatePrimerable, diag.Diagnostics) { +func findCertificateCertificatePrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.CertificateCertificatePrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -231,14 +231,14 @@ func findCertificateCertificatePrimerByUUID(ctx context.Context, uuid *string) ( Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.CertificateCertificateable](ctx, wrapper, "certificate", uuid, err) + ret, diag := findFirst[keyhubmodels.CertificateCertificateable](ctx, wrapper, "certificate", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.CertificateCertificate).CertificateCertificatePrimer, diag + return &ret.(*keyhubmodels.CertificateCertificate).CertificateCertificatePrimer, diag } -func findProvisioningProvisionedSystemPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.ProvisioningProvisionedSystemPrimerable, diag.Diagnostics) { +func findProvisioningProvisionedSystemPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.ProvisioningProvisionedSystemPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -248,14 +248,14 @@ func findProvisioningProvisionedSystemPrimerByUUID(ctx context.Context, uuid *st Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.ProvisioningProvisionedSystemable](ctx, wrapper, "provisioned system", uuid, err) + ret, diag := findFirst[keyhubmodels.ProvisioningProvisionedSystemable](ctx, wrapper, "provisioned system", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.ProvisioningProvisionedSystem).ProvisioningProvisionedSystemPrimer, diag + return &ret.(*keyhubmodels.ProvisioningProvisionedSystem).ProvisioningProvisionedSystemPrimer, diag } -func findGroupGroupClassificationPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.GroupGroupClassificationPrimerable, diag.Diagnostics) { +func findGroupGroupClassificationPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.GroupGroupClassificationPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -265,14 +265,14 @@ func findGroupGroupClassificationPrimerByUUID(ctx context.Context, uuid *string) Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.GroupGroupClassificationable](ctx, wrapper, "group classification", uuid, err) + ret, diag := findFirst[keyhubmodels.GroupGroupClassificationable](ctx, wrapper, "group classification", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.GroupGroupClassification).GroupGroupClassificationPrimer, diag + return &ret.(*keyhubmodels.GroupGroupClassification).GroupGroupClassificationPrimer, diag } -func findClientClientApplicationPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.ClientClientApplicationPrimerable, diag.Diagnostics) { +func findClientClientApplicationPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.ClientClientApplicationPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -282,22 +282,22 @@ func findClientClientApplicationPrimerByUUID(ctx context.Context, uuid *string) Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.ClientClientApplicationable](ctx, wrapper, "client application", uuid, err) + ret, diag := findFirst[keyhubmodels.ClientClientApplicationable](ctx, wrapper, "client application", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.ClientClientApplication).ClientClientApplicationPrimer, diag + return &ret.(*keyhubmodels.ClientClientApplication).ClientClientApplicationPrimer, diag } -func findAuthAccountPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.AuthAccountPrimerable, diag.Diagnostics) { +func findAuthAccountPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.AuthAccountPrimerable, diag.Diagnostics) { account, diag := findAuthAccountByUUID(ctx, uuid) if account == nil { return account, diag } - return &account.(*keyhubmodel.AuthAccount).AuthAccountPrimer, diag + return &account.(*keyhubmodels.AuthAccount).AuthAccountPrimer, diag } -func findAuthAccountByUUID(ctx context.Context, uuid *string) (keyhubmodel.AuthAccountable, diag.Diagnostics) { +func findAuthAccountByUUID(ctx context.Context, uuid *string) (keyhubmodels.AuthAccountable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -307,10 +307,10 @@ func findAuthAccountByUUID(ctx context.Context, uuid *string) (keyhubmodel.AuthA Uuid: []string{*uuid}, }, }) - return findFirst[keyhubmodel.AuthAccountable](ctx, wrapper, "account", uuid, err) + return findFirst[keyhubmodels.AuthAccountable](ctx, wrapper, "account", uuid, err) } -func findServiceaccountServiceAccountPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.ServiceaccountServiceAccountPrimerable, diag.Diagnostics) { +func findServiceaccountServiceAccountPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.ServiceaccountServiceAccountPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -320,14 +320,14 @@ func findServiceaccountServiceAccountPrimerByUUID(ctx context.Context, uuid *str Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.ServiceaccountServiceAccountable](ctx, wrapper, "service account", uuid, err) + ret, diag := findFirst[keyhubmodels.ServiceaccountServiceAccountable](ctx, wrapper, "service account", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.ServiceaccountServiceAccount).ServiceaccountServiceAccountPrimer, diag + return &ret.(*keyhubmodels.ServiceaccountServiceAccount).ServiceaccountServiceAccountPrimer, diag } -func findVaultVaultRecordPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodel.VaultVaultRecordPrimerable, diag.Diagnostics) { +func findVaultVaultRecordPrimerByUUID(ctx context.Context, uuid *string) (keyhubmodels.VaultVaultRecordPrimerable, diag.Diagnostics) { if uuid == nil || *uuid == "" { return nil, diag.Diagnostics{} } @@ -337,15 +337,15 @@ func findVaultVaultRecordPrimerByUUID(ctx context.Context, uuid *string) (keyhub Uuid: []string{*uuid}, }, }) - ret, diag := findFirst[keyhubmodel.VaultVaultRecordable](ctx, wrapper, "vault record", uuid, err) + ret, diag := findFirst[keyhubmodels.VaultVaultRecordable](ctx, wrapper, "vault record", uuid, err) if ret == nil { return ret, diag } - return &ret.(*keyhubmodel.VaultVaultRecord).VaultVaultRecordPrimer, diag + return &ret.(*keyhubmodels.VaultVaultRecord).VaultVaultRecordPrimer, diag } func errorReportToString(ctx context.Context, err error) string { - report, ok := err.(keyhubmodel.ErrorReportable) + report, ok := err.(keyhubmodels.ErrorReportable) if !ok { return err.Error() } @@ -368,3 +368,36 @@ func stringPointerToString(input *string) string { } return "" } + +func getSelfLink(linksAttr basetypes.ListValue) restLinkDataRS { + var links restLinkDataRS + fillDataStructFromTFObjectRSRestLink(&links, linksAttr.Elements()[0].(basetypes.ObjectValue)) + return links +} + +func isHttpStatusCodeOk(ctx context.Context, status int32, err error, diags *diag.Diagnostics) bool { + if err != nil { + report, ok := err.(keyhubmodels.ErrorReportable) + if !ok || *report.GetCode() != status { + diags.AddError("Client Error", fmt.Sprintf("Unexpected status code: %s", errorReportToString(ctx, err))) + return false + } + } + return true +} + +func setAttributeValue(ctx context.Context, tf basetypes.ObjectValue, key string, value attr.Value) basetypes.ObjectValue { + obj := tf.Attributes() + obj[key] = value + return types.ObjectValueMust(tf.AttributeTypes(ctx), obj) +} + +func collectAdditional(additionalObjects basetypes.ObjectValue) []string { + ret := make([]string, 0) + for name, attr := range additionalObjects.Attributes() { + if !attr.IsNull() && !attr.IsUnknown() { + ret = append(ret, name) + } + } + return ret +} diff --git a/internal/provider/full-object-attrs-ds.go b/internal/provider/full-object-attrs-ds.go index eaeb53e..21d19c6 100644 --- a/internal/provider/full-object-attrs-ds.go +++ b/internal/provider/full-object-attrs-ds.go @@ -613,10 +613,10 @@ func objectAttrsTypeDSDirectoryAccountDirectory(recurse bool) map[string]attr.Ty objectAttrs["restrict2fa"] = types.BoolType objectAttrs["rotating_password"] = types.StringType objectAttrs["username_customizable"] = types.BoolType - objectAttrs["internal_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryInternalDirectory(false)} + objectAttrs["maintenance_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryMaintenanceDirectory(false)} objectAttrs["o_id_c_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryOIDCDirectory(false)} objectAttrs["l_d_a_p_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryLDAPDirectory(false)} - objectAttrs["maintenance_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryMaintenanceDirectory(false)} + objectAttrs["internal_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSDirectoryInternalDirectory(false)} return objectAttrs } @@ -1201,8 +1201,8 @@ func objectAttrsTypeDSLaunchpadLaunchpadTile(recurse bool) map[string]attr.Type objectAttrs["launchpad_launchpad_tile_type"] = types.StringType objectAttrs["logo"] = types.ListType{ElemType: types.StringType} objectAttrs["vault_record"] = types.ObjectType{AttrTypes: objectAttrsTypeDSVaultVaultRecordPrimer(false)} - objectAttrs["vault_record_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeDSLaunchpadVaultRecordLaunchpadTile(false)} objectAttrs["sso_application_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeDSLaunchpadSsoApplicationLaunchpadTile(false)} + objectAttrs["vault_record_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeDSLaunchpadVaultRecordLaunchpadTile(false)} objectAttrs["manual_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeDSLaunchpadManualLaunchpadTile(false)} return objectAttrs } @@ -1977,14 +1977,14 @@ func objectAttrsTypeDSProvisioningProvisionedSystem(recurse bool) map[string]att objectAttrs["should_destroy_unknown_accounts"] = types.BoolType objectAttrs["technical_administrator"] = types.ObjectType{AttrTypes: objectAttrsTypeDSGroupGroupPrimer(false)} objectAttrs["username_prefix"] = types.StringType + objectAttrs["provisioned_azure_oidc_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureOIDCDirectory(false)} + objectAttrs["provisioned_internal_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedInternalLDAP(false)} objectAttrs["abstract_provisioned_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningAbstractProvisionedLDAP(false)} objectAttrs["provisioned_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedLDAP(false)} - objectAttrs["provisioned_azure_tenant"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureTenant(false)} - objectAttrs["provisioned_internal_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedInternalLDAP(false)} - objectAttrs["provisioned_azure_oidc_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureOIDCDirectory(false)} + objectAttrs["provisioned_azure_sync_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureSyncLDAPDirectory(false)} objectAttrs["provisioned_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedLDAPDirectory(false)} objectAttrs["provisioned_a_d"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAD(false)} - objectAttrs["provisioned_azure_sync_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureSyncLDAPDirectory(false)} + objectAttrs["provisioned_azure_tenant"] = types.ObjectType{AttrTypes: objectAttrsTypeDSProvisioningProvisionedAzureTenant(false)} return objectAttrs } @@ -2224,43 +2224,43 @@ func objectAttrsTypeDSRequestModificationRequest(recurse bool) map[string]attr.T objectAttrs["mail_key"] = types.StringType objectAttrs["request_modification_request_type"] = types.StringType objectAttrs["status"] = types.StringType - objectAttrs["abstract_provisioned_system_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAbstractProvisionedSystemModificationRequest(false)} - objectAttrs["transfer_provisioned_system_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemAdministrationRequest(false)} - objectAttrs["transfer_provisioned_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemOwnershipRequest(false)} - objectAttrs["password_reset_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestPasswordResetRequest(false)} - objectAttrs["revoke_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRevokeAdminRequest(false)} - objectAttrs["grant_group_on_system_request_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantGroupOnSystemRequestRequest(false)} - objectAttrs["abstract_application_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAbstractApplicationModificationRequest(false)} - objectAttrs["transfer_application_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferApplicationAdministrationRequest(false)} - objectAttrs["create_service_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestCreateServiceAccountRequest(false)} - objectAttrs["remove_provisioned_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveProvisionedSystemRequest(false)} - objectAttrs["review_audit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestReviewAuditRequest(false)} objectAttrs["abstract_organizational_unit_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAbstractOrganizationalUnitModificationRequest(false)} objectAttrs["create_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestCreateGroupRequest(false)} - objectAttrs["grant_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantGroupOnSystemRequest(false)} - objectAttrs["verify_internal_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestVerifyInternalAccountRequest(false)} + objectAttrs["abstract_application_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAbstractApplicationModificationRequest(false)} + objectAttrs["transfer_application_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferApplicationOwnershipRequest(false)} objectAttrs["grant_client_permission_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantClientPermissionRequest(false)} - objectAttrs["transfer_organizational_unit_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferOrganizationalUnitOwnershipRequest(false)} - objectAttrs["setup_nested_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestSetupNestedGroupRequest(false)} - objectAttrs["join_vault_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestJoinVaultRequest(false)} + objectAttrs["join_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestJoinGroupRequest(false)} + objectAttrs["abstract_provisioned_system_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAbstractProvisionedSystemModificationRequest(false)} + objectAttrs["transfer_provisioned_system_content_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemContentAdministrationRequest(false)} + objectAttrs["grant_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantGroupOnSystemRequest(false)} + objectAttrs["transfer_provisioned_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemOwnershipRequest(false)} + objectAttrs["grant_service_account_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantServiceAccountGroupRequest(false)} + objectAttrs["disable2fa_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestDisable2FARequest(false)} + objectAttrs["remove_provisioned_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveProvisionedSystemRequest(false)} objectAttrs["transfer_service_account_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferServiceAccountAdministrationRequest(false)} - objectAttrs["grant_application_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantApplicationRequest(false)} - objectAttrs["grant_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantAccessRequest(false)} - objectAttrs["transfer_group_on_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferGroupOnSystemOwnershipRequest(false)} + objectAttrs["password_reset_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestPasswordResetRequest(false)} + objectAttrs["transfer_auditor_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferAuditorGroupRequest(false)} + objectAttrs["update_group_membership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestUpdateGroupMembershipRequest(false)} objectAttrs["add_group_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestAddGroupAdminRequest(false)} + objectAttrs["remove_organizational_unit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveOrganizationalUnitRequest(false)} + objectAttrs["transfer_provisioned_system_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemAdministrationRequest(false)} + objectAttrs["verify_internal_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestVerifyInternalAccountRequest(false)} + objectAttrs["transfer_application_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferApplicationAdministrationRequest(false)} objectAttrs["extend_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestExtendAccessRequest(false)} - objectAttrs["transfer_provisioned_system_content_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferProvisionedSystemContentAdministrationRequest(false)} - objectAttrs["update_group_membership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestUpdateGroupMembershipRequest(false)} - objectAttrs["transfer_auditor_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferAuditorGroupRequest(false)} - objectAttrs["transfer_application_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferApplicationOwnershipRequest(false)} - objectAttrs["remove_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveGroupRequest(false)} + objectAttrs["grant_group_on_system_request_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantGroupOnSystemRequestRequest(false)} + objectAttrs["join_vault_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestJoinVaultRequest(false)} + objectAttrs["grant_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantAccessRequest(false)} + objectAttrs["revoke_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRevokeAdminRequest(false)} objectAttrs["setup_authorizing_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestSetupAuthorizingGroupRequest(false)} + objectAttrs["transfer_organizational_unit_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferOrganizationalUnitOwnershipRequest(false)} + objectAttrs["create_service_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestCreateServiceAccountRequest(false)} objectAttrs["create_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestCreateGroupOnSystemRequest(false)} - objectAttrs["remove_organizational_unit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveOrganizationalUnitRequest(false)} - objectAttrs["grant_service_account_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantServiceAccountGroupRequest(false)} - objectAttrs["disable2fa_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestDisable2FARequest(false)} - objectAttrs["join_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestJoinGroupRequest(false)} + objectAttrs["review_audit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestReviewAuditRequest(false)} objectAttrs["enable_technical_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestEnableTechnicalAdministrationRequest(false)} + objectAttrs["setup_nested_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestSetupNestedGroupRequest(false)} + objectAttrs["transfer_group_on_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestTransferGroupOnSystemOwnershipRequest(false)} + objectAttrs["remove_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestRemoveGroupRequest(false)} + objectAttrs["grant_application_request"] = types.ObjectType{AttrTypes: objectAttrsTypeDSRequestGrantApplicationRequest(false)} return objectAttrs } diff --git a/internal/provider/full-object-attrs-rs.go b/internal/provider/full-object-attrs-rs.go index 0f9907f..b743374 100644 --- a/internal/provider/full-object-attrs-rs.go +++ b/internal/provider/full-object-attrs-rs.go @@ -576,10 +576,10 @@ func objectAttrsTypeRSDirectoryAccountDirectory(recurse bool) map[string]attr.Ty objectAttrs["restrict2fa"] = types.BoolType objectAttrs["rotating_password"] = types.StringType objectAttrs["username_customizable"] = types.BoolType - objectAttrs["internal_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryInternalDirectory(false)} + objectAttrs["maintenance_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryMaintenanceDirectory(false)} objectAttrs["o_id_c_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryOIDCDirectory(false)} objectAttrs["l_d_a_p_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryLDAPDirectory(false)} - objectAttrs["maintenance_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryMaintenanceDirectory(false)} + objectAttrs["internal_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSDirectoryInternalDirectory(false)} return objectAttrs } @@ -1144,8 +1144,8 @@ func objectAttrsTypeRSLaunchpadLaunchpadTile(recurse bool) map[string]attr.Type objectAttrs["launchpad_launchpad_tile_type"] = types.StringType objectAttrs["logo"] = types.ListType{ElemType: types.StringType} objectAttrs["vault_record_uuid"] = types.StringType - objectAttrs["vault_record_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeRSLaunchpadVaultRecordLaunchpadTile(false)} objectAttrs["sso_application_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeRSLaunchpadSsoApplicationLaunchpadTile(false)} + objectAttrs["vault_record_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeRSLaunchpadVaultRecordLaunchpadTile(false)} objectAttrs["manual_launchpad_tile"] = types.ObjectType{AttrTypes: objectAttrsTypeRSLaunchpadManualLaunchpadTile(false)} return objectAttrs } @@ -1835,14 +1835,14 @@ func objectAttrsTypeRSProvisioningProvisionedSystem(recurse bool) map[string]att objectAttrs["should_destroy_unknown_accounts"] = types.BoolType objectAttrs["technical_administrator_uuid"] = types.StringType objectAttrs["username_prefix"] = types.StringType + objectAttrs["provisioned_azure_oidc_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureOIDCDirectory(false)} + objectAttrs["provisioned_internal_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedInternalLDAP(false)} objectAttrs["abstract_provisioned_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningAbstractProvisionedLDAP(false)} objectAttrs["provisioned_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedLDAP(false)} - objectAttrs["provisioned_azure_tenant"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureTenant(false)} - objectAttrs["provisioned_internal_ldap"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedInternalLDAP(false)} - objectAttrs["provisioned_azure_oidc_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureOIDCDirectory(false)} + objectAttrs["provisioned_azure_sync_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureSyncLDAPDirectory(false)} objectAttrs["provisioned_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedLDAPDirectory(false)} objectAttrs["provisioned_a_d"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAD(false)} - objectAttrs["provisioned_azure_sync_ldap_directory"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureSyncLDAPDirectory(false)} + objectAttrs["provisioned_azure_tenant"] = types.ObjectType{AttrTypes: objectAttrsTypeRSProvisioningProvisionedAzureTenant(false)} return objectAttrs } @@ -2080,43 +2080,43 @@ func objectAttrsTypeRSRequestModificationRequest(recurse bool) map[string]attr.T objectAttrs["mail_key"] = types.StringType objectAttrs["request_modification_request_type"] = types.StringType objectAttrs["status"] = types.StringType - objectAttrs["abstract_provisioned_system_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAbstractProvisionedSystemModificationRequest(false)} - objectAttrs["transfer_provisioned_system_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemAdministrationRequest(false)} - objectAttrs["transfer_provisioned_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemOwnershipRequest(false)} - objectAttrs["password_reset_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestPasswordResetRequest(false)} - objectAttrs["revoke_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRevokeAdminRequest(false)} - objectAttrs["grant_group_on_system_request_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantGroupOnSystemRequestRequest(false)} - objectAttrs["abstract_application_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAbstractApplicationModificationRequest(false)} - objectAttrs["transfer_application_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferApplicationAdministrationRequest(false)} - objectAttrs["create_service_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestCreateServiceAccountRequest(false)} - objectAttrs["remove_provisioned_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveProvisionedSystemRequest(false)} - objectAttrs["review_audit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestReviewAuditRequest(false)} objectAttrs["abstract_organizational_unit_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAbstractOrganizationalUnitModificationRequest(false)} objectAttrs["create_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestCreateGroupRequest(false)} - objectAttrs["grant_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantGroupOnSystemRequest(false)} - objectAttrs["verify_internal_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestVerifyInternalAccountRequest(false)} + objectAttrs["abstract_application_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAbstractApplicationModificationRequest(false)} + objectAttrs["transfer_application_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferApplicationOwnershipRequest(false)} objectAttrs["grant_client_permission_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantClientPermissionRequest(false)} - objectAttrs["transfer_organizational_unit_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferOrganizationalUnitOwnershipRequest(false)} - objectAttrs["setup_nested_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestSetupNestedGroupRequest(false)} - objectAttrs["join_vault_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestJoinVaultRequest(false)} + objectAttrs["join_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestJoinGroupRequest(false)} + objectAttrs["abstract_provisioned_system_modification_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAbstractProvisionedSystemModificationRequest(false)} + objectAttrs["transfer_provisioned_system_content_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemContentAdministrationRequest(false)} + objectAttrs["grant_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantGroupOnSystemRequest(false)} + objectAttrs["transfer_provisioned_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemOwnershipRequest(false)} + objectAttrs["grant_service_account_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantServiceAccountGroupRequest(false)} + objectAttrs["disable2fa_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestDisable2FARequest(false)} + objectAttrs["remove_provisioned_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveProvisionedSystemRequest(false)} objectAttrs["transfer_service_account_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferServiceAccountAdministrationRequest(false)} - objectAttrs["grant_application_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantApplicationRequest(false)} - objectAttrs["grant_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantAccessRequest(false)} - objectAttrs["transfer_group_on_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferGroupOnSystemOwnershipRequest(false)} + objectAttrs["password_reset_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestPasswordResetRequest(false)} + objectAttrs["transfer_auditor_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferAuditorGroupRequest(false)} + objectAttrs["update_group_membership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestUpdateGroupMembershipRequest(false)} objectAttrs["add_group_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestAddGroupAdminRequest(false)} + objectAttrs["remove_organizational_unit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveOrganizationalUnitRequest(false)} + objectAttrs["transfer_provisioned_system_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemAdministrationRequest(false)} + objectAttrs["verify_internal_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestVerifyInternalAccountRequest(false)} + objectAttrs["transfer_application_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferApplicationAdministrationRequest(false)} objectAttrs["extend_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestExtendAccessRequest(false)} - objectAttrs["transfer_provisioned_system_content_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferProvisionedSystemContentAdministrationRequest(false)} - objectAttrs["update_group_membership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestUpdateGroupMembershipRequest(false)} - objectAttrs["transfer_auditor_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferAuditorGroupRequest(false)} - objectAttrs["transfer_application_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferApplicationOwnershipRequest(false)} - objectAttrs["remove_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveGroupRequest(false)} + objectAttrs["grant_group_on_system_request_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantGroupOnSystemRequestRequest(false)} + objectAttrs["join_vault_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestJoinVaultRequest(false)} + objectAttrs["grant_access_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantAccessRequest(false)} + objectAttrs["revoke_admin_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRevokeAdminRequest(false)} objectAttrs["setup_authorizing_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestSetupAuthorizingGroupRequest(false)} + objectAttrs["transfer_organizational_unit_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferOrganizationalUnitOwnershipRequest(false)} + objectAttrs["create_service_account_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestCreateServiceAccountRequest(false)} objectAttrs["create_group_on_system_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestCreateGroupOnSystemRequest(false)} - objectAttrs["remove_organizational_unit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveOrganizationalUnitRequest(false)} - objectAttrs["grant_service_account_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantServiceAccountGroupRequest(false)} - objectAttrs["disable2fa_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestDisable2FARequest(false)} - objectAttrs["join_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestJoinGroupRequest(false)} + objectAttrs["review_audit_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestReviewAuditRequest(false)} objectAttrs["enable_technical_administration_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestEnableTechnicalAdministrationRequest(false)} + objectAttrs["setup_nested_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestSetupNestedGroupRequest(false)} + objectAttrs["transfer_group_on_system_ownership_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestTransferGroupOnSystemOwnershipRequest(false)} + objectAttrs["remove_group_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestRemoveGroupRequest(false)} + objectAttrs["grant_application_request"] = types.ObjectType{AttrTypes: objectAttrsTypeRSRequestGrantApplicationRequest(false)} return objectAttrs } diff --git a/internal/provider/full-schema-ds.go b/internal/provider/full-schema-ds.go index a40f55e..2ced78b 100644 --- a/internal/provider/full-schema-ds.go +++ b/internal/provider/full-schema-ds.go @@ -1534,8 +1534,8 @@ func dataSourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]dss schemaAttrs["username_customizable"] = dsschema.BoolAttribute{ Computed: true, } - schemaAttrs["internal_directory"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsDirectoryInternalDirectory(false), + schemaAttrs["maintenance_directory"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsDirectoryMaintenanceDirectory(false), Computed: true, } schemaAttrs["o_id_c_directory"] = dsschema.SingleNestedAttribute{ @@ -1546,8 +1546,8 @@ func dataSourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]dss Attributes: dataSourceSchemaAttrsDirectoryLDAPDirectory(false), Computed: true, } - schemaAttrs["maintenance_directory"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsDirectoryMaintenanceDirectory(false), + schemaAttrs["internal_directory"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsDirectoryInternalDirectory(false), Computed: true, } return schemaAttrs @@ -3039,14 +3039,14 @@ func dataSourceSchemaAttrsLaunchpadLaunchpadTile(recurse bool) map[string]dssche Attributes: dataSourceSchemaAttrsVaultVaultRecordPrimer(false), Computed: true, } - schemaAttrs["vault_record_launchpad_tile"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsLaunchpadVaultRecordLaunchpadTile(false), - Computed: true, - } schemaAttrs["sso_application_launchpad_tile"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsLaunchpadSsoApplicationLaunchpadTile(false), Computed: true, } + schemaAttrs["vault_record_launchpad_tile"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsLaunchpadVaultRecordLaunchpadTile(false), + Computed: true, + } schemaAttrs["manual_launchpad_tile"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsLaunchpadManualLaunchpadTile(false), Computed: true, @@ -4936,24 +4936,24 @@ func dataSourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string schemaAttrs["username_prefix"] = dsschema.StringAttribute{ Computed: true, } - schemaAttrs["abstract_provisioned_ldap"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningAbstractProvisionedLDAP(false), + schemaAttrs["provisioned_azure_oidc_directory"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureOIDCDirectory(false), Computed: true, } - schemaAttrs["provisioned_ldap"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningProvisionedLDAP(false), + schemaAttrs["provisioned_internal_ldap"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningProvisionedInternalLDAP(false), Computed: true, } - schemaAttrs["provisioned_azure_tenant"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureTenant(false), + schemaAttrs["abstract_provisioned_ldap"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningAbstractProvisionedLDAP(false), Computed: true, } - schemaAttrs["provisioned_internal_ldap"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningProvisionedInternalLDAP(false), + schemaAttrs["provisioned_ldap"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningProvisionedLDAP(false), Computed: true, } - schemaAttrs["provisioned_azure_oidc_directory"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureOIDCDirectory(false), + schemaAttrs["provisioned_azure_sync_ldap_directory"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureSyncLDAPDirectory(false), Computed: true, } schemaAttrs["provisioned_ldap_directory"] = dsschema.SingleNestedAttribute{ @@ -4964,8 +4964,8 @@ func dataSourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string Attributes: dataSourceSchemaAttrsProvisioningProvisionedAD(false), Computed: true, } - schemaAttrs["provisioned_azure_sync_ldap_directory"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureSyncLDAPDirectory(false), + schemaAttrs["provisioned_azure_tenant"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsProvisioningProvisionedAzureTenant(false), Computed: true, } return schemaAttrs @@ -5385,152 +5385,152 @@ func dataSourceSchemaAttrsRequestModificationRequest(recurse bool) map[string]ds schemaAttrs["status"] = dsschema.StringAttribute{ Computed: true, } - schemaAttrs["abstract_provisioned_system_modification_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestAbstractProvisionedSystemModificationRequest(false), - Computed: true, - } - schemaAttrs["transfer_provisioned_system_administration_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemAdministrationRequest(false), - Computed: true, - } - schemaAttrs["transfer_provisioned_system_ownership_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemOwnershipRequest(false), - Computed: true, - } - schemaAttrs["password_reset_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestPasswordResetRequest(false), - Computed: true, - } - schemaAttrs["revoke_admin_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestRevokeAdminRequest(false), + schemaAttrs["abstract_organizational_unit_modification_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestAbstractOrganizationalUnitModificationRequest(false), Computed: true, } - schemaAttrs["grant_group_on_system_request_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestGrantGroupOnSystemRequestRequest(false), + schemaAttrs["create_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestCreateGroupRequest(false), Computed: true, } schemaAttrs["abstract_application_modification_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestAbstractApplicationModificationRequest(false), Computed: true, } - schemaAttrs["transfer_application_administration_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferApplicationAdministrationRequest(false), - Computed: true, - } - schemaAttrs["create_service_account_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestCreateServiceAccountRequest(false), + schemaAttrs["transfer_application_ownership_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferApplicationOwnershipRequest(false), Computed: true, } - schemaAttrs["remove_provisioned_system_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestRemoveProvisionedSystemRequest(false), + schemaAttrs["grant_client_permission_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestGrantClientPermissionRequest(false), Computed: true, } - schemaAttrs["review_audit_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestReviewAuditRequest(false), + schemaAttrs["join_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestJoinGroupRequest(false), Computed: true, } - schemaAttrs["abstract_organizational_unit_modification_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestAbstractOrganizationalUnitModificationRequest(false), + schemaAttrs["abstract_provisioned_system_modification_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestAbstractProvisionedSystemModificationRequest(false), Computed: true, } - schemaAttrs["create_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestCreateGroupRequest(false), + schemaAttrs["transfer_provisioned_system_content_administration_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemContentAdministrationRequest(false), Computed: true, } schemaAttrs["grant_group_on_system_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestGrantGroupOnSystemRequest(false), Computed: true, } - schemaAttrs["verify_internal_account_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestVerifyInternalAccountRequest(false), - Computed: true, - } - schemaAttrs["grant_client_permission_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestGrantClientPermissionRequest(false), + schemaAttrs["transfer_provisioned_system_ownership_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemOwnershipRequest(false), Computed: true, } - schemaAttrs["transfer_organizational_unit_ownership_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferOrganizationalUnitOwnershipRequest(false), + schemaAttrs["grant_service_account_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestGrantServiceAccountGroupRequest(false), Computed: true, } - schemaAttrs["setup_nested_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestSetupNestedGroupRequest(false), + schemaAttrs["disable2fa_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestDisable2FARequest(false), Computed: true, } - schemaAttrs["join_vault_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestJoinVaultRequest(false), + schemaAttrs["remove_provisioned_system_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestRemoveProvisionedSystemRequest(false), Computed: true, } schemaAttrs["transfer_service_account_administration_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestTransferServiceAccountAdministrationRequest(false), Computed: true, } - schemaAttrs["grant_application_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestGrantApplicationRequest(false), + schemaAttrs["password_reset_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestPasswordResetRequest(false), Computed: true, } - schemaAttrs["grant_access_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestGrantAccessRequest(false), + schemaAttrs["transfer_auditor_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferAuditorGroupRequest(false), Computed: true, } - schemaAttrs["transfer_group_on_system_ownership_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferGroupOnSystemOwnershipRequest(false), + schemaAttrs["update_group_membership_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestUpdateGroupMembershipRequest(false), Computed: true, } schemaAttrs["add_group_admin_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestAddGroupAdminRequest(false), Computed: true, } - schemaAttrs["extend_access_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestExtendAccessRequest(false), + schemaAttrs["remove_organizational_unit_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestRemoveOrganizationalUnitRequest(false), Computed: true, } - schemaAttrs["transfer_provisioned_system_content_administration_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemContentAdministrationRequest(false), + schemaAttrs["transfer_provisioned_system_administration_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferProvisionedSystemAdministrationRequest(false), Computed: true, } - schemaAttrs["update_group_membership_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestUpdateGroupMembershipRequest(false), + schemaAttrs["verify_internal_account_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestVerifyInternalAccountRequest(false), Computed: true, } - schemaAttrs["transfer_auditor_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferAuditorGroupRequest(false), + schemaAttrs["transfer_application_administration_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferApplicationAdministrationRequest(false), Computed: true, } - schemaAttrs["transfer_application_ownership_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestTransferApplicationOwnershipRequest(false), + schemaAttrs["extend_access_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestExtendAccessRequest(false), Computed: true, } - schemaAttrs["remove_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestRemoveGroupRequest(false), + schemaAttrs["grant_group_on_system_request_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestGrantGroupOnSystemRequestRequest(false), + Computed: true, + } + schemaAttrs["join_vault_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestJoinVaultRequest(false), + Computed: true, + } + schemaAttrs["grant_access_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestGrantAccessRequest(false), + Computed: true, + } + schemaAttrs["revoke_admin_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestRevokeAdminRequest(false), Computed: true, } schemaAttrs["setup_authorizing_group_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestSetupAuthorizingGroupRequest(false), Computed: true, } + schemaAttrs["transfer_organizational_unit_ownership_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferOrganizationalUnitOwnershipRequest(false), + Computed: true, + } + schemaAttrs["create_service_account_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestCreateServiceAccountRequest(false), + Computed: true, + } schemaAttrs["create_group_on_system_request"] = dsschema.SingleNestedAttribute{ Attributes: dataSourceSchemaAttrsRequestCreateGroupOnSystemRequest(false), Computed: true, } - schemaAttrs["remove_organizational_unit_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestRemoveOrganizationalUnitRequest(false), + schemaAttrs["review_audit_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestReviewAuditRequest(false), Computed: true, } - schemaAttrs["grant_service_account_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestGrantServiceAccountGroupRequest(false), + schemaAttrs["enable_technical_administration_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestEnableTechnicalAdministrationRequest(false), Computed: true, } - schemaAttrs["disable2fa_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestDisable2FARequest(false), + schemaAttrs["setup_nested_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestSetupNestedGroupRequest(false), Computed: true, } - schemaAttrs["join_group_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestJoinGroupRequest(false), + schemaAttrs["transfer_group_on_system_ownership_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestTransferGroupOnSystemOwnershipRequest(false), Computed: true, } - schemaAttrs["enable_technical_administration_request"] = dsschema.SingleNestedAttribute{ - Attributes: dataSourceSchemaAttrsRequestEnableTechnicalAdministrationRequest(false), + schemaAttrs["remove_group_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestRemoveGroupRequest(false), + Computed: true, + } + schemaAttrs["grant_application_request"] = dsschema.SingleNestedAttribute{ + Attributes: dataSourceSchemaAttrsRequestGrantApplicationRequest(false), Computed: true, } return schemaAttrs diff --git a/internal/provider/full-schema-rs.go b/internal/provider/full-schema-rs.go index f7f3dbd..f7167bc 100644 --- a/internal/provider/full-schema-rs.go +++ b/internal/provider/full-schema-rs.go @@ -51,6 +51,7 @@ func resourceSchemaAttrsErrorReport(recurse bool) map[string]rsschema.Attribute ElementType: types.StringType, Optional: true, } + schemaAttrs["exception"] = rsschema.StringAttribute{ Optional: true, } @@ -64,6 +65,7 @@ func resourceSchemaAttrsErrorReport(recurse bool) map[string]rsschema.Attribute ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsErrorReport_applicationErrorParameters(recurse bool) map[string]rsschema.Attribute { @@ -92,6 +94,7 @@ func resourceSchemaAttrsLinkable(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -99,6 +102,7 @@ func resourceSchemaAttrsLinkable(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + return schemaAttrs } func resourceSchemaAttrsNonLinkable(recurse bool) map[string]rsschema.Attribute { @@ -108,16 +112,20 @@ func resourceSchemaAttrsNonLinkable(recurse bool) map[string]rsschema.Attribute func resourceSchemaAttrsRestLink(recurse bool) map[string]rsschema.Attribute { schemaAttrs := make(map[string]rsschema.Attribute) schemaAttrs["href"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, + PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } schemaAttrs["id"] = rsschema.Int64Attribute{ - Optional: true, + Computed: true, + PlanModifiers: []planmodifier.Int64{int64planmodifier.UseStateForUnknown()}, } schemaAttrs["rel"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, + PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } schemaAttrs["type_escaped"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, + PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } return schemaAttrs } @@ -151,6 +159,7 @@ func resourceSchemaAttrsAccountVaultVaultRecord(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -158,6 +167,7 @@ func resourceSchemaAttrsAccountVaultVaultRecord(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -188,6 +198,7 @@ func resourceSchemaAttrsAccountVaultVaultRecord(recurse bool) map[string]rsschem ElementType: types.StringType, Computed: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Optional: true, } @@ -214,6 +225,7 @@ func resourceSchemaAttrsAuditAuditRecord(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -221,6 +233,7 @@ func resourceSchemaAttrsAuditAuditRecord(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["audit_audit_record_type"] = rsschema.StringAttribute{ Computed: true, PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, @@ -307,6 +320,7 @@ func resourceSchemaAttrsAuditAuditRecordLinkableWrapper(recurse bool) map[string }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsAuditAuditRecord_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -332,6 +346,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -339,6 +354,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Computed: true, } @@ -353,7 +369,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } schemaAttrs["validity"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["account_permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ @@ -361,6 +377,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute }, Computed: true, } + schemaAttrs["active"] = rsschema.BoolAttribute{ Computed: true, } @@ -368,7 +385,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, } schemaAttrs["directory_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["directory_name"] = rsschema.StringAttribute{ Computed: true, @@ -377,10 +394,10 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, } schemaAttrs["directory_rotating_password"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["directory_type"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["email"] = rsschema.StringAttribute{ Computed: true, @@ -395,7 +412,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, } schemaAttrs["license_role"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["locale"] = rsschema.StringAttribute{ Computed: true, @@ -407,7 +424,7 @@ func resourceSchemaAttrsAuthAccount(recurse bool) map[string]rsschema.Attribute Computed: true, } schemaAttrs["two_factor_status"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["valid_in_directory"] = rsschema.BoolAttribute{ Computed: true, @@ -428,6 +445,7 @@ func resourceSchemaAttrsAuthAccountBulkUpdate(recurse bool) map[string]rsschema. ElementType: types.Int64Type, Required: true, } + return schemaAttrs } func resourceSchemaAttrsAuthAccountChangeLocale(recurse bool) map[string]rsschema.Attribute { @@ -445,6 +463,7 @@ func resourceSchemaAttrsAuthAccountLinkableWrapper(recurse bool) map[string]rssc }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsAuthAccountPrimer(recurse bool) map[string]rsschema.Attribute { @@ -456,6 +475,7 @@ func resourceSchemaAttrsAuthAccountPrimer(recurse bool) map[string]rsschema.Attr Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -463,6 +483,7 @@ func resourceSchemaAttrsAuthAccountPrimer(recurse bool) map[string]rsschema.Attr Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Computed: true, } @@ -477,7 +498,7 @@ func resourceSchemaAttrsAuthAccountPrimer(recurse bool) map[string]rsschema.Attr PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } schemaAttrs["validity"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } return schemaAttrs } @@ -662,6 +683,7 @@ func resourceSchemaAttrsAuthInternalAccountLinkableWrapper(recurse bool) map[str }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsAuthInternalAccountStatusObject(recurse bool) map[string]rsschema.Attribute { @@ -688,10 +710,12 @@ func resourceSchemaAttrsAuthPermission(recurse bool) map[string]rsschema.Attribu ElementType: types.StringType, Optional: true, } + schemaAttrs["operations"] = rsschema.ListAttribute{ ElementType: types.StringType, Optional: true, } + schemaAttrs["type_escaped"] = rsschema.StringAttribute{ Optional: true, } @@ -715,6 +739,7 @@ func resourceSchemaAttrsAuthStoredAccountAttributes(recurse bool) map[string]rss }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsCertificateCertificate(recurse bool) map[string]rsschema.Attribute { @@ -732,6 +757,7 @@ func resourceSchemaAttrsCertificateCertificate(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -739,6 +765,7 @@ func resourceSchemaAttrsCertificateCertificate(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["alias"] = rsschema.StringAttribute{ Optional: true, } @@ -750,6 +777,7 @@ func resourceSchemaAttrsCertificateCertificate(recurse bool) map[string]rsschema ElementType: types.StringType, Optional: true, } + schemaAttrs["expiration"] = rsschema.StringAttribute{ Computed: true, } @@ -775,6 +803,7 @@ func resourceSchemaAttrsCertificateCertificate(recurse bool) map[string]rsschema ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsCertificateCertificateLinkableWrapper(recurse bool) map[string]rsschema.Attribute { @@ -785,6 +814,7 @@ func resourceSchemaAttrsCertificateCertificateLinkableWrapper(recurse bool) map[ }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsCertificateCertificatePrimer(recurse bool) map[string]rsschema.Attribute { @@ -796,6 +826,7 @@ func resourceSchemaAttrsCertificateCertificatePrimer(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -803,6 +834,7 @@ func resourceSchemaAttrsCertificateCertificatePrimer(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["alias"] = rsschema.StringAttribute{ Optional: true, } @@ -814,6 +846,7 @@ func resourceSchemaAttrsCertificateCertificatePrimer(recurse bool) map[string]rs ElementType: types.StringType, Optional: true, } + schemaAttrs["expiration"] = rsschema.StringAttribute{ Computed: true, } @@ -863,6 +896,7 @@ func resourceSchemaAttrsClientApplicationVaultVaultRecord(recurse bool) map[stri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -870,6 +904,7 @@ func resourceSchemaAttrsClientApplicationVaultVaultRecord(recurse bool) map[stri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -900,6 +935,7 @@ func resourceSchemaAttrsClientApplicationVaultVaultRecord(recurse bool) map[stri ElementType: types.StringType, Computed: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Optional: true, } @@ -926,6 +962,7 @@ func resourceSchemaAttrsClientClientApplication(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -933,6 +970,7 @@ func resourceSchemaAttrsClientClientApplication(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["client_client_application_primer_type"] = rsschema.StringAttribute{ Computed: true, PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, @@ -947,6 +985,7 @@ func resourceSchemaAttrsClientClientApplication(recurse bool) map[string]rsschem ElementType: types.StringType, Optional: true, } + schemaAttrs["sso_application"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -986,6 +1025,7 @@ func resourceSchemaAttrsClientClientApplicationLinkableWrapper(recurse bool) map }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsClientClientApplicationPrimer(recurse bool) map[string]rsschema.Attribute { @@ -997,6 +1037,7 @@ func resourceSchemaAttrsClientClientApplicationPrimer(recurse bool) map[string]r Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1004,6 +1045,7 @@ func resourceSchemaAttrsClientClientApplicationPrimer(recurse bool) map[string]r Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["client_client_application_primer_type"] = rsschema.StringAttribute{ Computed: true, PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, @@ -1018,6 +1060,7 @@ func resourceSchemaAttrsClientClientApplicationPrimer(recurse bool) map[string]r ElementType: types.StringType, Optional: true, } + schemaAttrs["sso_application"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -1072,7 +1115,7 @@ func resourceSchemaAttrsClientLdapClient(recurse bool) map[string]rsschema.Attri Default: booldefault.StaticBool(true), } schemaAttrs["shared_secret_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["used_for_provisioning"] = rsschema.BoolAttribute{ Computed: true, @@ -1087,6 +1130,7 @@ func resourceSchemaAttrsClientOAuth2Client(recurse bool) map[string]rsschema.Att }, Computed: true, } + schemaAttrs["attributes"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsClientOAuth2Client_attributes(recurse), Optional: true, @@ -1119,7 +1163,7 @@ func resourceSchemaAttrsClientOAuth2Client(recurse bool) map[string]rsschema.Att Default: booldefault.StaticBool(true), } schemaAttrs["shared_secret_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["show_landing_page"] = rsschema.BoolAttribute{ Computed: true, @@ -1148,6 +1192,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermission(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1155,6 +1200,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermission(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["for_group_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -1174,6 +1220,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermissionLinkableWrapper(recurse bool }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsClientOAuth2ClientPermissionWithClient(recurse bool) map[string]rsschema.Attribute { @@ -1191,6 +1238,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermissionWithClient(recurse bool) map Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1198,6 +1246,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermissionWithClient(recurse bool) map Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["for_group_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -1221,6 +1270,7 @@ func resourceSchemaAttrsClientOAuth2ClientPermissionWithClientLinkableWrapper(re }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsClientOAuth2ClientPermission_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -1274,6 +1324,7 @@ func resourceSchemaAttrsDeletedVaultHolderVaultVaultRecord(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1281,6 +1332,7 @@ func resourceSchemaAttrsDeletedVaultHolderVaultVaultRecord(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -1311,6 +1363,7 @@ func resourceSchemaAttrsDeletedVaultHolderVaultVaultRecord(recurse bool) map[str ElementType: types.StringType, Computed: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Optional: true, } @@ -1337,6 +1390,7 @@ func resourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]rssch Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1344,6 +1398,7 @@ func resourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]rssch Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_validity_supported"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -1388,8 +1443,8 @@ func resourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]rssch Optional: true, Default: booldefault.StaticBool(false), } - schemaAttrs["internal_directory"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsDirectoryInternalDirectory(false), + schemaAttrs["maintenance_directory"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsDirectoryMaintenanceDirectory(false), Optional: true, } schemaAttrs["o_id_c_directory"] = rsschema.SingleNestedAttribute{ @@ -1400,8 +1455,8 @@ func resourceSchemaAttrsDirectoryAccountDirectory(recurse bool) map[string]rssch Attributes: resourceSchemaAttrsDirectoryLDAPDirectory(false), Optional: true, } - schemaAttrs["maintenance_directory"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsDirectoryMaintenanceDirectory(false), + schemaAttrs["internal_directory"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsDirectoryInternalDirectory(false), Optional: true, } return schemaAttrs @@ -1414,6 +1469,7 @@ func resourceSchemaAttrsDirectoryAccountDirectoryLinkableWrapper(recurse bool) m }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsDirectoryAccountDirectoryPrimer(recurse bool) map[string]rsschema.Attribute { @@ -1425,6 +1481,7 @@ func resourceSchemaAttrsDirectoryAccountDirectoryPrimer(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1432,6 +1489,7 @@ func resourceSchemaAttrsDirectoryAccountDirectoryPrimer(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_validity_supported"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -1478,6 +1536,7 @@ func resourceSchemaAttrsDirectoryAccountDirectorySummary(recurse bool) map[strin Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1485,6 +1544,7 @@ func resourceSchemaAttrsDirectoryAccountDirectorySummary(recurse bool) map[strin Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["directory_account_directory_summary_type"] = rsschema.StringAttribute{ Optional: true, } @@ -1516,6 +1576,7 @@ func resourceSchemaAttrsDirectoryAccountDirectorySummaryLinkableWrapper(recurse }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsDirectoryAccountDirectory_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -1652,7 +1713,7 @@ func resourceSchemaAttrsGroupAccountGroup(recurse bool) map[string]rsschema.Attr } schemaAttrs["folder"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsGroupGroupFolder(false), - Optional: true, + Computed: true, } schemaAttrs["last_used"] = rsschema.StringAttribute{ Computed: true, @@ -1676,6 +1737,7 @@ func resourceSchemaAttrsGroupAccountGroupLinkableWrapper(recurse bool) map[strin }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupAccountGroup_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -1698,6 +1760,7 @@ func resourceSchemaAttrsGroupAuthorizedGroupsWrapper(recurse bool) map[string]rs }, Optional: true, } + schemaAttrs["group_count"] = rsschema.Int64Attribute{ Computed: true, Optional: true, @@ -1720,6 +1783,7 @@ func resourceSchemaAttrsGroupGroup(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1727,6 +1791,7 @@ func resourceSchemaAttrsGroupGroup(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["admin"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -1746,6 +1811,7 @@ func resourceSchemaAttrsGroupGroup(recurse bool) map[string]rsschema.Attribute { schemaAttrs["audit_config"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsGroupGroupAuditConfig(false), Optional: true, + Computed: true, } schemaAttrs["audit_requested"] = rsschema.BoolAttribute{ Computed: true, @@ -1769,7 +1835,9 @@ func resourceSchemaAttrsGroupGroup(recurse bool) map[string]rsschema.Attribute { ElementType: types.StringType, Computed: true, } + schemaAttrs["classification_uuid"] = rsschema.StringAttribute{ + Computed: true, Optional: true, } schemaAttrs["description"] = rsschema.StringAttribute{ @@ -1789,6 +1857,7 @@ func resourceSchemaAttrsGroupGroup(recurse bool) map[string]rsschema.Attribute { Optional: true, } schemaAttrs["organizational_unit_uuid"] = rsschema.StringAttribute{ + Computed: true, Optional: true, } schemaAttrs["private_group"] = rsschema.BoolAttribute{ @@ -1835,7 +1904,7 @@ func resourceSchemaAttrsGroupGroupAccount(recurse bool) map[string]rsschema.Attr Required: true, } schemaAttrs["directory_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["disconnected_nested"] = rsschema.BoolAttribute{ Computed: true, @@ -1856,7 +1925,7 @@ func resourceSchemaAttrsGroupGroupAccount(recurse bool) map[string]rsschema.Attr Required: true, } schemaAttrs["two_factor_status"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["visible_for_provisioning"] = rsschema.BoolAttribute{ Computed: true, @@ -1871,6 +1940,7 @@ func resourceSchemaAttrsGroupGroupAccountLinkableWrapper(recurse bool) map[strin }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupAccountNesting(recurse bool) map[string]rsschema.Attribute { @@ -1923,6 +1993,7 @@ func resourceSchemaAttrsGroupGroupAudit(recurse bool) map[string]rsschema.Attrib Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1930,12 +2001,14 @@ func resourceSchemaAttrsGroupGroupAudit(recurse bool) map[string]rsschema.Attrib Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["accounts"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsGroupGroupAuditAccount(false), }, Optional: true, } + schemaAttrs["comment"] = rsschema.StringAttribute{ Optional: true, } @@ -1977,6 +2050,7 @@ func resourceSchemaAttrsGroupGroupAuditAccount(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -1984,6 +2058,7 @@ func resourceSchemaAttrsGroupGroupAuditAccount(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -2015,7 +2090,7 @@ func resourceSchemaAttrsGroupGroupAuditAccount(recurse bool) map[string]rsschema Computed: true, } schemaAttrs["rights"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["username"] = rsschema.StringAttribute{ Computed: true, @@ -2031,6 +2106,7 @@ func resourceSchemaAttrsGroupGroupAuditConfig(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2038,10 +2114,13 @@ func resourceSchemaAttrsGroupGroupAuditConfig(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["months"] = rsschema.ListAttribute{ ElementType: types.StringType, Optional: true, + Computed: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupAuditLinkableWrapper(recurse bool) map[string]rsschema.Attribute { @@ -2052,6 +2131,7 @@ func resourceSchemaAttrsGroupGroupAuditLinkableWrapper(recurse bool) map[string] }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupAudit_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2117,6 +2197,7 @@ func resourceSchemaAttrsGroupGroupClassification(recurse bool) map[string]rssche Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2124,6 +2205,7 @@ func resourceSchemaAttrsGroupGroupClassification(recurse bool) map[string]rssche Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Required: true, } @@ -2177,6 +2259,7 @@ func resourceSchemaAttrsGroupGroupClassification(recurse bool) map[string]rssche ElementType: types.StringType, Optional: true, } + schemaAttrs["rotating_password_required"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -2206,6 +2289,7 @@ func resourceSchemaAttrsGroupGroupClassificationLinkableWrapper(recurse bool) ma }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupClassificationPrimer(recurse bool) map[string]rsschema.Attribute { @@ -2217,6 +2301,7 @@ func resourceSchemaAttrsGroupGroupClassificationPrimer(recurse bool) map[string] Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2224,6 +2309,7 @@ func resourceSchemaAttrsGroupGroupClassificationPrimer(recurse bool) map[string] Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Required: true, } @@ -2267,6 +2353,7 @@ func resourceSchemaAttrsGroupGroupClient(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2274,6 +2361,7 @@ func resourceSchemaAttrsGroupGroupClient(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["activation_required"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -2288,10 +2376,10 @@ func resourceSchemaAttrsGroupGroupClient(recurse bool) map[string]rsschema.Attri PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, } schemaAttrs["owner_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["technical_administrator_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } return schemaAttrs } @@ -2303,6 +2391,7 @@ func resourceSchemaAttrsGroupGroupClientLinkableWrapper(recurse bool) map[string }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupClient_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2328,6 +2417,7 @@ func resourceSchemaAttrsGroupGroupFolder(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2335,6 +2425,7 @@ func resourceSchemaAttrsGroupGroupFolder(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Required: true, } @@ -2348,6 +2439,7 @@ func resourceSchemaAttrsGroupGroupFolderLinkableWrapper(recurse bool) map[string }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupFolder_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2400,6 +2492,7 @@ func resourceSchemaAttrsGroupGroupLinkableWrapper(recurse bool) map[string]rssch }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupPrimer(recurse bool) map[string]rsschema.Attribute { @@ -2411,6 +2504,7 @@ func resourceSchemaAttrsGroupGroupPrimer(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2418,6 +2512,7 @@ func resourceSchemaAttrsGroupGroupPrimer(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["admin"] = rsschema.BoolAttribute{ Computed: true, PlanModifiers: []planmodifier.Bool{boolplanmodifier.UseStateForUnknown()}, @@ -2437,6 +2532,7 @@ func resourceSchemaAttrsGroupGroupPrimerLinkableWrapper(recurse bool) map[string ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroupSegmentedLinkableWrapper(recurse bool) map[string]rsschema.Attribute { @@ -2447,12 +2543,14 @@ func resourceSchemaAttrsGroupGroupSegmentedLinkableWrapper(recurse bool) map[str }, Optional: true, } + schemaAttrs["segments"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsSegmentCount(recurse), }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupGroup_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2580,6 +2678,7 @@ func resourceSchemaAttrsGroupGroupsAuditStats(recurse bool) map[string]rsschema. }, Optional: true, } + schemaAttrs["overdue_audit_groups"] = rsschema.Int64Attribute{ Computed: true, Optional: true, @@ -2622,6 +2721,7 @@ func resourceSchemaAttrsGroupProvisioningGroup(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2629,6 +2729,7 @@ func resourceSchemaAttrsGroupProvisioningGroup(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["activation_required"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -2653,6 +2754,7 @@ func resourceSchemaAttrsGroupProvisioningGroupLinkableWrapper(recurse bool) map[ }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsGroupProvisioningGroup_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2681,6 +2783,7 @@ func resourceSchemaAttrsGroupVaultVaultRecord(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2688,6 +2791,7 @@ func resourceSchemaAttrsGroupVaultVaultRecord(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -2718,6 +2822,7 @@ func resourceSchemaAttrsGroupVaultVaultRecord(recurse bool) map[string]rsschema. ElementType: types.StringType, Computed: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Optional: true, } @@ -2738,6 +2843,7 @@ func resourceSchemaAttrsLaunchpadDisplayedLaunchpadTile(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2745,6 +2851,7 @@ func resourceSchemaAttrsLaunchpadDisplayedLaunchpadTile(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["group_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -2757,6 +2864,7 @@ func resourceSchemaAttrsLaunchpadDisplayedLaunchpadTile(recurse bool) map[string ElementType: types.StringType, Optional: true, } + schemaAttrs["tile"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsLaunchpadLaunchpadTilePrimer(recurse), Optional: true, @@ -2777,6 +2885,7 @@ func resourceSchemaAttrsLaunchpadDisplayedLaunchpadTiles(recurse bool) map[strin }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsLaunchpadLaunchpadTile(recurse bool) map[string]rsschema.Attribute { @@ -2794,6 +2903,7 @@ func resourceSchemaAttrsLaunchpadLaunchpadTile(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2801,6 +2911,7 @@ func resourceSchemaAttrsLaunchpadLaunchpadTile(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["application_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -2820,17 +2931,18 @@ func resourceSchemaAttrsLaunchpadLaunchpadTile(recurse bool) map[string]rsschema ElementType: types.StringType, Optional: true, } + schemaAttrs["vault_record_uuid"] = rsschema.StringAttribute{ Optional: true, } - schemaAttrs["vault_record_launchpad_tile"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsLaunchpadVaultRecordLaunchpadTile(false), - Optional: true, - } schemaAttrs["sso_application_launchpad_tile"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsLaunchpadSsoApplicationLaunchpadTile(false), Optional: true, } + schemaAttrs["vault_record_launchpad_tile"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsLaunchpadVaultRecordLaunchpadTile(false), + Optional: true, + } schemaAttrs["manual_launchpad_tile"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsLaunchpadManualLaunchpadTile(false), Optional: true, @@ -2845,6 +2957,7 @@ func resourceSchemaAttrsLaunchpadLaunchpadTileLinkableWrapper(recurse bool) map[ }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsLaunchpadLaunchpadTilePrimer(recurse bool) map[string]rsschema.Attribute { @@ -2856,6 +2969,7 @@ func resourceSchemaAttrsLaunchpadLaunchpadTilePrimer(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -2863,6 +2977,7 @@ func resourceSchemaAttrsLaunchpadLaunchpadTilePrimer(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + return schemaAttrs } func resourceSchemaAttrsLaunchpadLaunchpadTile_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -2909,10 +3024,12 @@ func resourceSchemaAttrsLicenseKeyHubLicenseInfo(recurse bool) map[string]rssche ElementType: types.StringType, Optional: true, } + schemaAttrs["details"] = rsschema.ListAttribute{ ElementType: types.StringType, Optional: true, } + schemaAttrs["expiration_time"] = rsschema.StringAttribute{ Optional: true, } @@ -2920,6 +3037,7 @@ func resourceSchemaAttrsLicenseKeyHubLicenseInfo(recurse bool) map[string]rssche ElementType: types.StringType, Optional: true, } + schemaAttrs["issue_time"] = rsschema.StringAttribute{ Optional: true, } @@ -2977,6 +3095,7 @@ func resourceSchemaAttrsMarkItemMarkers(recurse bool) map[string]rsschema.Attrib }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsNestedAuthInternalAccount(recurse bool) map[string]rsschema.Attribute { @@ -3028,6 +3147,7 @@ func resourceSchemaAttrsNestedClientOAuth2ClientPermission(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3035,6 +3155,7 @@ func resourceSchemaAttrsNestedClientOAuth2ClientPermission(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["for_group_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -3065,7 +3186,7 @@ func resourceSchemaAttrsNestedGroupAccountGroup(recurse bool) map[string]rsschem } schemaAttrs["folder"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsGroupGroupFolder(false), - Optional: true, + Computed: true, } schemaAttrs["last_used"] = rsschema.StringAttribute{ Computed: true, @@ -3096,7 +3217,7 @@ func resourceSchemaAttrsNestedGroupGroupAccount(recurse bool) map[string]rsschem Required: true, } schemaAttrs["directory_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["disconnected_nested"] = rsschema.BoolAttribute{ Computed: true, @@ -3117,7 +3238,7 @@ func resourceSchemaAttrsNestedGroupGroupAccount(recurse bool) map[string]rsschem Required: true, } schemaAttrs["two_factor_status"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["visible_for_provisioning"] = rsschema.BoolAttribute{ Computed: true, @@ -3142,6 +3263,7 @@ func resourceSchemaAttrsNestedGroupGroupAudit(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3149,12 +3271,14 @@ func resourceSchemaAttrsNestedGroupGroupAudit(recurse bool) map[string]rsschema. Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["accounts"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsGroupGroupAuditAccount(false), }, Optional: true, } + schemaAttrs["comment"] = rsschema.StringAttribute{ Optional: true, } @@ -3240,6 +3364,7 @@ func resourceSchemaAttrsNestedProvisioningGroupOnSystem(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3247,6 +3372,7 @@ func resourceSchemaAttrsNestedProvisioningGroupOnSystem(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Optional: true, } @@ -3305,6 +3431,7 @@ func resourceSchemaAttrsNestedProvisioningProvisionedSystemSyncLog(recurse bool) Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3312,6 +3439,7 @@ func resourceSchemaAttrsNestedProvisioningProvisionedSystemSyncLog(recurse bool) Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["created_at"] = rsschema.StringAttribute{ Computed: true, PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, @@ -3348,6 +3476,7 @@ func resourceSchemaAttrsNestedServiceaccountServiceAccountGroup(recurse bool) ma Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3355,6 +3484,7 @@ func resourceSchemaAttrsNestedServiceaccountServiceAccountGroup(recurse bool) ma Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Optional: true, } @@ -3387,6 +3517,7 @@ func resourceSchemaAttrsNestedWebhookWebhookDelivery(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3394,6 +3525,7 @@ func resourceSchemaAttrsNestedWebhookWebhookDelivery(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["payload"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsWebhookWebhookPush(false), Optional: true, @@ -3504,10 +3636,12 @@ func resourceSchemaAttrsNotificationModificationRequestNotification(recurse bool ElementType: types.StringType, Optional: true, } + schemaAttrs["groups"] = rsschema.ListAttribute{ ElementType: types.StringType, Optional: true, } + schemaAttrs["request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestModificationRequest(recurse), Optional: true, @@ -3526,6 +3660,7 @@ func resourceSchemaAttrsNotificationNotifications(recurse bool) map[string]rssch }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsNotificationOldApiVersionUsageNotification(recurse bool) map[string]rsschema.Attribute { @@ -3547,6 +3682,7 @@ func resourceSchemaAttrsNotificationProvisionConfigRequiredNotification(recurse ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsNotificationRotatingPasswordRequiredNotification(recurse bool) map[string]rsschema.Attribute { @@ -3555,6 +3691,7 @@ func resourceSchemaAttrsNotificationRotatingPasswordRequiredNotification(recurse ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsNotificationUpdateAvailableNotification(recurse bool) map[string]rsschema.Attribute { @@ -3593,6 +3730,7 @@ func resourceSchemaAttrsOrganizationAccountOrganizationalUnitLinkableWrapper(rec }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsOrganizationAccountOrganizationalUnit_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -3618,6 +3756,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnit(recurse bool) map[string] Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3625,6 +3764,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnit(recurse bool) map[string] Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Required: true, } @@ -3642,7 +3782,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnit(recurse bool) map[string] Required: true, } schemaAttrs["parent_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } return schemaAttrs } @@ -3670,6 +3810,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnitAccountLinkableWrapper(rec }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsOrganizationOrganizationalUnitAccount_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -3688,6 +3829,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnitLinkableWrapper(recurse bo }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsOrganizationOrganizationalUnitPrimer(recurse bool) map[string]rsschema.Attribute { @@ -3699,6 +3841,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnitPrimer(recurse bool) map[s Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3706,6 +3849,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnitPrimer(recurse bool) map[s Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Required: true, } @@ -3721,6 +3865,7 @@ func resourceSchemaAttrsOrganizationOrganizationalUnitPrimerLinkableWrapper(recu ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsOrganizationOrganizationalUnit_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -3818,6 +3963,7 @@ func resourceSchemaAttrsProvisioningAccountProvisioningStatusReport(recurse bool }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningCircuitBreakerStatistics(recurse bool) map[string]rsschema.Attribute { @@ -3857,6 +4003,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystem(recurse bool) map[string]rssch Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3864,6 +4011,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystem(recurse bool) map[string]rssch Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Optional: true, } @@ -3892,6 +4040,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystemLinkableWrapper(recurse bool) m }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningGroupOnSystemPrimer(recurse bool) map[string]rsschema.Attribute { @@ -3903,6 +4052,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystemPrimer(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -3910,6 +4060,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystemPrimer(recurse bool) map[string Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Optional: true, } @@ -3930,6 +4081,7 @@ func resourceSchemaAttrsProvisioningGroupOnSystemTypes(recurse bool) map[string] ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningGroupOnSystem_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -3997,6 +4149,7 @@ func resourceSchemaAttrsProvisioningOwnedGroupOnSystemsWrapper(recurse bool) map }, Optional: true, } + schemaAttrs["unlinked_count"] = rsschema.Int64Attribute{ Computed: true, Optional: true, @@ -4019,6 +4172,7 @@ func resourceSchemaAttrsProvisioningProvisionNumberSequence(recurse bool) map[st Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -4026,6 +4180,7 @@ func resourceSchemaAttrsProvisioningProvisionNumberSequence(recurse bool) map[st Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_count"] = rsschema.Int64Attribute{ Computed: true, } @@ -4047,6 +4202,7 @@ func resourceSchemaAttrsProvisioningProvisionNumberSequenceLinkableWrapper(recur }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningProvisionNumberSequence_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -4093,6 +4249,7 @@ func resourceSchemaAttrsProvisioningProvisionedAccountLinkableWrapper(recurse bo }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningProvisionedAccount_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -4194,6 +4351,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string]r Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -4201,6 +4359,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string]r Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["active"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -4258,24 +4417,24 @@ func resourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string]r schemaAttrs["username_prefix"] = rsschema.StringAttribute{ Optional: true, } - schemaAttrs["abstract_provisioned_ldap"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningAbstractProvisionedLDAP(false), + schemaAttrs["provisioned_azure_oidc_directory"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningProvisionedAzureOIDCDirectory(false), Optional: true, } - schemaAttrs["provisioned_ldap"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningProvisionedLDAP(false), + schemaAttrs["provisioned_internal_ldap"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningProvisionedInternalLDAP(false), Optional: true, } - schemaAttrs["provisioned_azure_tenant"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningProvisionedAzureTenant(false), + schemaAttrs["abstract_provisioned_ldap"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningAbstractProvisionedLDAP(false), Optional: true, } - schemaAttrs["provisioned_internal_ldap"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningProvisionedInternalLDAP(false), + schemaAttrs["provisioned_ldap"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningProvisionedLDAP(false), Optional: true, } - schemaAttrs["provisioned_azure_oidc_directory"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningProvisionedAzureOIDCDirectory(false), + schemaAttrs["provisioned_azure_sync_ldap_directory"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningProvisionedAzureSyncLDAPDirectory(false), Optional: true, } schemaAttrs["provisioned_ldap_directory"] = rsschema.SingleNestedAttribute{ @@ -4286,8 +4445,8 @@ func resourceSchemaAttrsProvisioningProvisionedSystem(recurse bool) map[string]r Attributes: resourceSchemaAttrsProvisioningProvisionedAD(false), Optional: true, } - schemaAttrs["provisioned_azure_sync_ldap_directory"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsProvisioningProvisionedAzureSyncLDAPDirectory(false), + schemaAttrs["provisioned_azure_tenant"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsProvisioningProvisionedAzureTenant(false), Optional: true, } return schemaAttrs @@ -4300,6 +4459,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemLinkableWrapper(recurse boo }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningProvisionedSystemPrimer(recurse bool) map[string]rsschema.Attribute { @@ -4311,6 +4471,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemPrimer(recurse bool) map[st Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -4318,6 +4479,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemPrimer(recurse bool) map[st Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["active"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -4345,6 +4507,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemPrimerLinkableWrapper(recur ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningProvisionedSystemSyncLog(recurse bool) map[string]rsschema.Attribute { @@ -4362,6 +4525,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemSyncLog(recurse bool) map[s Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -4369,6 +4533,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemSyncLog(recurse bool) map[s Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["created_at"] = rsschema.StringAttribute{ Computed: true, PlanModifiers: []planmodifier.String{stringplanmodifier.UseStateForUnknown()}, @@ -4395,6 +4560,7 @@ func resourceSchemaAttrsProvisioningProvisionedSystemSyncLogLinkableWrapper(recu }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsProvisioningProvisionedSystemSyncLog_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -4467,6 +4633,7 @@ func resourceSchemaAttrsProvisioningProvisioningStatus(recurse bool) map[string] }, Optional: true, } + schemaAttrs["ignore_errors"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -4676,6 +4843,7 @@ func resourceSchemaAttrsRequestModificationRequest(recurse bool) map[string]rssc Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -4683,6 +4851,7 @@ func resourceSchemaAttrsRequestModificationRequest(recurse bool) map[string]rssc Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -4706,152 +4875,152 @@ func resourceSchemaAttrsRequestModificationRequest(recurse bool) map[string]rssc schemaAttrs["status"] = rsschema.StringAttribute{ Optional: true, } - schemaAttrs["abstract_provisioned_system_modification_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestAbstractProvisionedSystemModificationRequest(false), - Optional: true, - } - schemaAttrs["transfer_provisioned_system_administration_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemAdministrationRequest(false), - Optional: true, - } - schemaAttrs["transfer_provisioned_system_ownership_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemOwnershipRequest(false), - Optional: true, - } - schemaAttrs["password_reset_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestPasswordResetRequest(false), - Optional: true, - } - schemaAttrs["revoke_admin_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestRevokeAdminRequest(false), + schemaAttrs["abstract_organizational_unit_modification_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestAbstractOrganizationalUnitModificationRequest(false), Optional: true, } - schemaAttrs["grant_group_on_system_request_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestGrantGroupOnSystemRequestRequest(false), + schemaAttrs["create_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestCreateGroupRequest(false), Optional: true, } schemaAttrs["abstract_application_modification_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestAbstractApplicationModificationRequest(false), Optional: true, } - schemaAttrs["transfer_application_administration_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferApplicationAdministrationRequest(false), - Optional: true, - } - schemaAttrs["create_service_account_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestCreateServiceAccountRequest(false), + schemaAttrs["transfer_application_ownership_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferApplicationOwnershipRequest(false), Optional: true, } - schemaAttrs["remove_provisioned_system_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestRemoveProvisionedSystemRequest(false), + schemaAttrs["grant_client_permission_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestGrantClientPermissionRequest(false), Optional: true, } - schemaAttrs["review_audit_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestReviewAuditRequest(false), + schemaAttrs["join_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestJoinGroupRequest(false), Optional: true, } - schemaAttrs["abstract_organizational_unit_modification_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestAbstractOrganizationalUnitModificationRequest(false), + schemaAttrs["abstract_provisioned_system_modification_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestAbstractProvisionedSystemModificationRequest(false), Optional: true, } - schemaAttrs["create_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestCreateGroupRequest(false), + schemaAttrs["transfer_provisioned_system_content_administration_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemContentAdministrationRequest(false), Optional: true, } schemaAttrs["grant_group_on_system_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestGrantGroupOnSystemRequest(false), Optional: true, } - schemaAttrs["verify_internal_account_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestVerifyInternalAccountRequest(false), - Optional: true, - } - schemaAttrs["grant_client_permission_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestGrantClientPermissionRequest(false), + schemaAttrs["transfer_provisioned_system_ownership_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemOwnershipRequest(false), Optional: true, } - schemaAttrs["transfer_organizational_unit_ownership_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferOrganizationalUnitOwnershipRequest(false), + schemaAttrs["grant_service_account_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestGrantServiceAccountGroupRequest(false), Optional: true, } - schemaAttrs["setup_nested_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestSetupNestedGroupRequest(false), + schemaAttrs["disable2fa_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestDisable2FARequest(false), Optional: true, } - schemaAttrs["join_vault_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestJoinVaultRequest(false), + schemaAttrs["remove_provisioned_system_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestRemoveProvisionedSystemRequest(false), Optional: true, } schemaAttrs["transfer_service_account_administration_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestTransferServiceAccountAdministrationRequest(false), Optional: true, } - schemaAttrs["grant_application_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestGrantApplicationRequest(false), + schemaAttrs["password_reset_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestPasswordResetRequest(false), Optional: true, } - schemaAttrs["grant_access_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestGrantAccessRequest(false), + schemaAttrs["transfer_auditor_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferAuditorGroupRequest(false), Optional: true, } - schemaAttrs["transfer_group_on_system_ownership_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferGroupOnSystemOwnershipRequest(false), + schemaAttrs["update_group_membership_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestUpdateGroupMembershipRequest(false), Optional: true, } schemaAttrs["add_group_admin_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestAddGroupAdminRequest(false), Optional: true, } - schemaAttrs["extend_access_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestExtendAccessRequest(false), + schemaAttrs["remove_organizational_unit_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestRemoveOrganizationalUnitRequest(false), Optional: true, } - schemaAttrs["transfer_provisioned_system_content_administration_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemContentAdministrationRequest(false), + schemaAttrs["transfer_provisioned_system_administration_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferProvisionedSystemAdministrationRequest(false), Optional: true, } - schemaAttrs["update_group_membership_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestUpdateGroupMembershipRequest(false), + schemaAttrs["verify_internal_account_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestVerifyInternalAccountRequest(false), Optional: true, } - schemaAttrs["transfer_auditor_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferAuditorGroupRequest(false), + schemaAttrs["transfer_application_administration_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferApplicationAdministrationRequest(false), Optional: true, } - schemaAttrs["transfer_application_ownership_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestTransferApplicationOwnershipRequest(false), + schemaAttrs["extend_access_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestExtendAccessRequest(false), Optional: true, } - schemaAttrs["remove_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestRemoveGroupRequest(false), + schemaAttrs["grant_group_on_system_request_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestGrantGroupOnSystemRequestRequest(false), + Optional: true, + } + schemaAttrs["join_vault_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestJoinVaultRequest(false), + Optional: true, + } + schemaAttrs["grant_access_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestGrantAccessRequest(false), + Optional: true, + } + schemaAttrs["revoke_admin_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestRevokeAdminRequest(false), Optional: true, } schemaAttrs["setup_authorizing_group_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestSetupAuthorizingGroupRequest(false), Optional: true, } + schemaAttrs["transfer_organizational_unit_ownership_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferOrganizationalUnitOwnershipRequest(false), + Optional: true, + } + schemaAttrs["create_service_account_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestCreateServiceAccountRequest(false), + Optional: true, + } schemaAttrs["create_group_on_system_request"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsRequestCreateGroupOnSystemRequest(false), Optional: true, } - schemaAttrs["remove_organizational_unit_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestRemoveOrganizationalUnitRequest(false), + schemaAttrs["review_audit_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestReviewAuditRequest(false), Optional: true, } - schemaAttrs["grant_service_account_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestGrantServiceAccountGroupRequest(false), + schemaAttrs["enable_technical_administration_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestEnableTechnicalAdministrationRequest(false), Optional: true, } - schemaAttrs["disable2fa_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestDisable2FARequest(false), + schemaAttrs["setup_nested_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestSetupNestedGroupRequest(false), Optional: true, } - schemaAttrs["join_group_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestJoinGroupRequest(false), + schemaAttrs["transfer_group_on_system_ownership_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestTransferGroupOnSystemOwnershipRequest(false), Optional: true, } - schemaAttrs["enable_technical_administration_request"] = rsschema.SingleNestedAttribute{ - Attributes: resourceSchemaAttrsRequestEnableTechnicalAdministrationRequest(false), + schemaAttrs["remove_group_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestRemoveGroupRequest(false), + Optional: true, + } + schemaAttrs["grant_application_request"] = rsschema.SingleNestedAttribute{ + Attributes: resourceSchemaAttrsRequestGrantApplicationRequest(false), Optional: true, } return schemaAttrs @@ -4864,6 +5033,7 @@ func resourceSchemaAttrsRequestModificationRequestLinkableWrapper(recurse bool) }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsRequestModificationRequest_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -4906,6 +5076,7 @@ func resourceSchemaAttrsRequestPasswordResetRequestStatus(recurse bool) map[stri ElementType: types.StringType, Optional: true, } + schemaAttrs["nr_accepted"] = rsschema.Int64Attribute{ Computed: true, Optional: true, @@ -5030,7 +5201,7 @@ func resourceSchemaAttrsRequestUpdateGroupMembershipRequest(recurse bool) map[st Computed: true, } schemaAttrs["current_rights"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["end_date"] = rsschema.StringAttribute{ Optional: true, @@ -5065,6 +5236,7 @@ func resourceSchemaAttrsServiceaccountServiceAccount(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5072,6 +5244,7 @@ func resourceSchemaAttrsServiceaccountServiceAccount(recurse bool) map[string]rs Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["active"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -5095,7 +5268,7 @@ func resourceSchemaAttrsServiceaccountServiceAccount(recurse bool) map[string]rs Optional: true, } schemaAttrs["password_uuid"] = rsschema.StringAttribute{ - Optional: true, + Computed: true, } schemaAttrs["password_rotation"] = rsschema.StringAttribute{ Required: true, @@ -5120,6 +5293,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountGroup(recurse bool) map[stri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5127,6 +5301,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountGroup(recurse bool) map[stri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["display_name"] = rsschema.StringAttribute{ Optional: true, } @@ -5149,6 +5324,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountGroupLinkableWrapper(recurse }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsServiceaccountServiceAccountGroup_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -5167,6 +5343,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountLinkableWrapper(recurse bool }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsServiceaccountServiceAccountPrimer(recurse bool) map[string]rsschema.Attribute { @@ -5178,6 +5355,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountPrimer(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5185,6 +5363,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountPrimer(recurse bool) map[str Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["active"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -5212,6 +5391,7 @@ func resourceSchemaAttrsServiceaccountServiceAccountPrimerLinkableWrapper(recurs ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsServiceaccountServiceAccountStatus(recurse bool) map[string]rsschema.Attribute { @@ -5273,6 +5453,7 @@ func resourceSchemaAttrsSimpleVersionInfo(recurse bool) map[string]rsschema.Attr ElementType: types.Int64Type, Optional: true, } + schemaAttrs["key_hub_version"] = rsschema.StringAttribute{ Optional: true, } @@ -5293,6 +5474,7 @@ func resourceSchemaAttrsVaultDeletedVaultHolder(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5300,6 +5482,7 @@ func resourceSchemaAttrsVaultDeletedVaultHolder(recurse bool) map[string]rsschem Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["name"] = rsschema.StringAttribute{ Optional: true, } @@ -5321,6 +5504,7 @@ func resourceSchemaAttrsVaultDeletedVaultHolderLinkableWrapper(recurse bool) map }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsVaultDeletedVaultHolder_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -5433,6 +5617,7 @@ func resourceSchemaAttrsVaultVault(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5440,6 +5625,7 @@ func resourceSchemaAttrsVaultVault(recurse bool) map[string]rsschema.Attribute { Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["access_available"] = rsschema.BoolAttribute{ Computed: true, Optional: true, @@ -5454,6 +5640,7 @@ func resourceSchemaAttrsVaultVault(recurse bool) map[string]rsschema.Attribute { }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsVaultVaultHolder(recurse bool) map[string]rsschema.Attribute { @@ -5475,6 +5662,7 @@ func resourceSchemaAttrsVaultVaultRecord(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5482,6 +5670,7 @@ func resourceSchemaAttrsVaultVaultRecord(recurse bool) map[string]rsschema.Attri Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -5512,6 +5701,7 @@ func resourceSchemaAttrsVaultVaultRecord(recurse bool) map[string]rsschema.Attri ElementType: types.StringType, Computed: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Optional: true, } @@ -5531,6 +5721,7 @@ func resourceSchemaAttrsVaultVaultRecordLinkableWrapper(recurse bool) map[string }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsVaultVaultRecordPrimer(recurse bool) map[string]rsschema.Attribute { @@ -5542,6 +5733,7 @@ func resourceSchemaAttrsVaultVaultRecordPrimer(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5549,6 +5741,7 @@ func resourceSchemaAttrsVaultVaultRecordPrimer(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["color"] = rsschema.StringAttribute{ Computed: true, Optional: true, @@ -5573,6 +5766,7 @@ func resourceSchemaAttrsVaultVaultRecordPrimerLinkableWrapper(recurse bool) map[ ElementType: types.StringType, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsVaultVaultRecordSecrets(recurse bool) map[string]rsschema.Attribute { @@ -5614,6 +5808,7 @@ func resourceSchemaAttrsVaultVaultRecordShareSummary(recurse bool) map[string]rs }, Optional: true, } + schemaAttrs["parent"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsVaultVaultRecordShare(recurse), Optional: true, @@ -5700,6 +5895,7 @@ func resourceSchemaAttrsWebhookWebhook(recurse bool) map[string]rsschema.Attribu Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5707,6 +5903,7 @@ func resourceSchemaAttrsWebhookWebhook(recurse bool) map[string]rsschema.Attribu Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["account_uuid"] = rsschema.StringAttribute{ Optional: true, } @@ -5770,6 +5967,7 @@ func resourceSchemaAttrsWebhookWebhook(recurse bool) map[string]rsschema.Attribu ElementType: types.StringType, Optional: true, } + schemaAttrs["url"] = rsschema.StringAttribute{ Required: true, } @@ -5799,6 +5997,7 @@ func resourceSchemaAttrsWebhookWebhookDelivery(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["permissions"] = rsschema.ListNestedAttribute{ NestedObject: rsschema.NestedAttributeObject{ Attributes: resourceSchemaAttrsAuthPermission(recurse), @@ -5806,6 +6005,7 @@ func resourceSchemaAttrsWebhookWebhookDelivery(recurse bool) map[string]rsschema Computed: true, PlanModifiers: []planmodifier.List{listplanmodifier.UseStateForUnknown()}, } + schemaAttrs["payload"] = rsschema.SingleNestedAttribute{ Attributes: resourceSchemaAttrsWebhookWebhookPush(false), Optional: true, @@ -5838,6 +6038,7 @@ func resourceSchemaAttrsWebhookWebhookDeliveryLinkableWrapper(recurse bool) map[ }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsWebhookWebhookDelivery_additionalObjects(recurse bool) map[string]rsschema.Attribute { @@ -5856,6 +6057,7 @@ func resourceSchemaAttrsWebhookWebhookLinkableWrapper(recurse bool) map[string]r }, Optional: true, } + return schemaAttrs } func resourceSchemaAttrsWebhookWebhookNameUuid(recurse bool) map[string]rsschema.Attribute { diff --git a/internal/provider/full-tf-to-data-struct-ds.go b/internal/provider/full-tf-to-data-struct-ds.go index 2353ef2..29ba992 100644 --- a/internal/provider/full-tf-to-data-struct-ds.go +++ b/internal/provider/full-tf-to-data-struct-ds.go @@ -486,10 +486,10 @@ func fillDataStructFromTFObjectDSDirectoryAccountDirectory(data *directoryAccoun data.Restrict2fa = obj.Attributes()["restrict2fa"].(basetypes.BoolValue) data.RotatingPassword = obj.Attributes()["rotating_password"].(basetypes.StringValue) data.UsernameCustomizable = obj.Attributes()["username_customizable"].(basetypes.BoolValue) - data.InternalDirectory = obj.Attributes()["internal_directory"].(basetypes.ObjectValue) + data.MaintenanceDirectory = obj.Attributes()["maintenance_directory"].(basetypes.ObjectValue) data.OIDCDirectory = obj.Attributes()["o_id_c_directory"].(basetypes.ObjectValue) data.LDAPDirectory = obj.Attributes()["l_d_a_p_directory"].(basetypes.ObjectValue) - data.MaintenanceDirectory = obj.Attributes()["maintenance_directory"].(basetypes.ObjectValue) + data.InternalDirectory = obj.Attributes()["internal_directory"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectDSDirectoryAccountDirectoryLinkableWrapper(data *directoryAccountDirectoryLinkableWrapperDataDS, obj types.Object) { @@ -948,8 +948,8 @@ func fillDataStructFromTFObjectDSLaunchpadLaunchpadTile(data *launchpadLaunchpad data.LaunchpadLaunchpadTileType = obj.Attributes()["launchpad_launchpad_tile_type"].(basetypes.StringValue) data.Logo = obj.Attributes()["logo"].(basetypes.ListValue) data.VaultRecord = obj.Attributes()["vault_record"].(basetypes.ObjectValue) - data.VaultRecordLaunchpadTile = obj.Attributes()["vault_record_launchpad_tile"].(basetypes.ObjectValue) data.SsoApplicationLaunchpadTile = obj.Attributes()["sso_application_launchpad_tile"].(basetypes.ObjectValue) + data.VaultRecordLaunchpadTile = obj.Attributes()["vault_record_launchpad_tile"].(basetypes.ObjectValue) data.ManualLaunchpadTile = obj.Attributes()["manual_launchpad_tile"].(basetypes.ObjectValue) } @@ -1538,14 +1538,14 @@ func fillDataStructFromTFObjectDSProvisioningProvisionedSystem(data *provisionin data.ShouldDestroyUnknownAccounts = obj.Attributes()["should_destroy_unknown_accounts"].(basetypes.BoolValue) data.TechnicalAdministrator = obj.Attributes()["technical_administrator"].(basetypes.ObjectValue) data.UsernamePrefix = obj.Attributes()["username_prefix"].(basetypes.StringValue) + data.ProvisionedAzureOIDCDirectory = obj.Attributes()["provisioned_azure_oidc_directory"].(basetypes.ObjectValue) + data.ProvisionedInternalLDAP = obj.Attributes()["provisioned_internal_ldap"].(basetypes.ObjectValue) data.AbstractProvisionedLDAP = obj.Attributes()["abstract_provisioned_ldap"].(basetypes.ObjectValue) data.ProvisionedLDAP = obj.Attributes()["provisioned_ldap"].(basetypes.ObjectValue) - data.ProvisionedAzureTenant = obj.Attributes()["provisioned_azure_tenant"].(basetypes.ObjectValue) - data.ProvisionedInternalLDAP = obj.Attributes()["provisioned_internal_ldap"].(basetypes.ObjectValue) - data.ProvisionedAzureOIDCDirectory = obj.Attributes()["provisioned_azure_oidc_directory"].(basetypes.ObjectValue) + data.ProvisionedAzureSyncLDAPDirectory = obj.Attributes()["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue) data.ProvisionedLDAPDirectory = obj.Attributes()["provisioned_ldap_directory"].(basetypes.ObjectValue) data.ProvisionedAD = obj.Attributes()["provisioned_a_d"].(basetypes.ObjectValue) - data.ProvisionedAzureSyncLDAPDirectory = obj.Attributes()["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue) + data.ProvisionedAzureTenant = obj.Attributes()["provisioned_azure_tenant"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectDSProvisioningProvisionedSystemLinkableWrapper(data *provisioningProvisionedSystemLinkableWrapperDataDS, obj types.Object) { @@ -1715,43 +1715,43 @@ func fillDataStructFromTFObjectDSRequestModificationRequest(data *requestModific data.MailKey = obj.Attributes()["mail_key"].(basetypes.StringValue) data.RequestModificationRequestType = obj.Attributes()["request_modification_request_type"].(basetypes.StringValue) data.Status = obj.Attributes()["status"].(basetypes.StringValue) - data.AbstractProvisionedSystemModificationRequest = obj.Attributes()["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemAdministrationRequest = obj.Attributes()["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemOwnershipRequest = obj.Attributes()["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue) - data.PasswordResetRequest = obj.Attributes()["password_reset_request"].(basetypes.ObjectValue) - data.RevokeAdminRequest = obj.Attributes()["revoke_admin_request"].(basetypes.ObjectValue) - data.GrantGroupOnSystemRequestRequest = obj.Attributes()["grant_group_on_system_request_request"].(basetypes.ObjectValue) - data.AbstractApplicationModificationRequest = obj.Attributes()["abstract_application_modification_request"].(basetypes.ObjectValue) - data.TransferApplicationAdministrationRequest = obj.Attributes()["transfer_application_administration_request"].(basetypes.ObjectValue) - data.CreateServiceAccountRequest = obj.Attributes()["create_service_account_request"].(basetypes.ObjectValue) - data.RemoveProvisionedSystemRequest = obj.Attributes()["remove_provisioned_system_request"].(basetypes.ObjectValue) - data.ReviewAuditRequest = obj.Attributes()["review_audit_request"].(basetypes.ObjectValue) data.AbstractOrganizationalUnitModificationRequest = obj.Attributes()["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue) data.CreateGroupRequest = obj.Attributes()["create_group_request"].(basetypes.ObjectValue) - data.GrantGroupOnSystemRequest = obj.Attributes()["grant_group_on_system_request"].(basetypes.ObjectValue) - data.VerifyInternalAccountRequest = obj.Attributes()["verify_internal_account_request"].(basetypes.ObjectValue) + data.AbstractApplicationModificationRequest = obj.Attributes()["abstract_application_modification_request"].(basetypes.ObjectValue) + data.TransferApplicationOwnershipRequest = obj.Attributes()["transfer_application_ownership_request"].(basetypes.ObjectValue) data.GrantClientPermissionRequest = obj.Attributes()["grant_client_permission_request"].(basetypes.ObjectValue) - data.TransferOrganizationalUnitOwnershipRequest = obj.Attributes()["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue) - data.SetupNestedGroupRequest = obj.Attributes()["setup_nested_group_request"].(basetypes.ObjectValue) - data.JoinVaultRequest = obj.Attributes()["join_vault_request"].(basetypes.ObjectValue) + data.JoinGroupRequest = obj.Attributes()["join_group_request"].(basetypes.ObjectValue) + data.AbstractProvisionedSystemModificationRequest = obj.Attributes()["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemContentAdministrationRequest = obj.Attributes()["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue) + data.GrantGroupOnSystemRequest = obj.Attributes()["grant_group_on_system_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemOwnershipRequest = obj.Attributes()["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue) + data.GrantServiceAccountGroupRequest = obj.Attributes()["grant_service_account_group_request"].(basetypes.ObjectValue) + data.Disable2FARequest = obj.Attributes()["disable2fa_request"].(basetypes.ObjectValue) + data.RemoveProvisionedSystemRequest = obj.Attributes()["remove_provisioned_system_request"].(basetypes.ObjectValue) data.TransferServiceAccountAdministrationRequest = obj.Attributes()["transfer_service_account_administration_request"].(basetypes.ObjectValue) - data.GrantApplicationRequest = obj.Attributes()["grant_application_request"].(basetypes.ObjectValue) - data.GrantAccessRequest = obj.Attributes()["grant_access_request"].(basetypes.ObjectValue) - data.TransferGroupOnSystemOwnershipRequest = obj.Attributes()["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue) + data.PasswordResetRequest = obj.Attributes()["password_reset_request"].(basetypes.ObjectValue) + data.TransferAuditorGroupRequest = obj.Attributes()["transfer_auditor_group_request"].(basetypes.ObjectValue) + data.UpdateGroupMembershipRequest = obj.Attributes()["update_group_membership_request"].(basetypes.ObjectValue) data.AddGroupAdminRequest = obj.Attributes()["add_group_admin_request"].(basetypes.ObjectValue) + data.RemoveOrganizationalUnitRequest = obj.Attributes()["remove_organizational_unit_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemAdministrationRequest = obj.Attributes()["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue) + data.VerifyInternalAccountRequest = obj.Attributes()["verify_internal_account_request"].(basetypes.ObjectValue) + data.TransferApplicationAdministrationRequest = obj.Attributes()["transfer_application_administration_request"].(basetypes.ObjectValue) data.ExtendAccessRequest = obj.Attributes()["extend_access_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemContentAdministrationRequest = obj.Attributes()["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue) - data.UpdateGroupMembershipRequest = obj.Attributes()["update_group_membership_request"].(basetypes.ObjectValue) - data.TransferAuditorGroupRequest = obj.Attributes()["transfer_auditor_group_request"].(basetypes.ObjectValue) - data.TransferApplicationOwnershipRequest = obj.Attributes()["transfer_application_ownership_request"].(basetypes.ObjectValue) - data.RemoveGroupRequest = obj.Attributes()["remove_group_request"].(basetypes.ObjectValue) + data.GrantGroupOnSystemRequestRequest = obj.Attributes()["grant_group_on_system_request_request"].(basetypes.ObjectValue) + data.JoinVaultRequest = obj.Attributes()["join_vault_request"].(basetypes.ObjectValue) + data.GrantAccessRequest = obj.Attributes()["grant_access_request"].(basetypes.ObjectValue) + data.RevokeAdminRequest = obj.Attributes()["revoke_admin_request"].(basetypes.ObjectValue) data.SetupAuthorizingGroupRequest = obj.Attributes()["setup_authorizing_group_request"].(basetypes.ObjectValue) + data.TransferOrganizationalUnitOwnershipRequest = obj.Attributes()["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue) + data.CreateServiceAccountRequest = obj.Attributes()["create_service_account_request"].(basetypes.ObjectValue) data.CreateGroupOnSystemRequest = obj.Attributes()["create_group_on_system_request"].(basetypes.ObjectValue) - data.RemoveOrganizationalUnitRequest = obj.Attributes()["remove_organizational_unit_request"].(basetypes.ObjectValue) - data.GrantServiceAccountGroupRequest = obj.Attributes()["grant_service_account_group_request"].(basetypes.ObjectValue) - data.Disable2FARequest = obj.Attributes()["disable2fa_request"].(basetypes.ObjectValue) - data.JoinGroupRequest = obj.Attributes()["join_group_request"].(basetypes.ObjectValue) + data.ReviewAuditRequest = obj.Attributes()["review_audit_request"].(basetypes.ObjectValue) data.EnableTechnicalAdministrationRequest = obj.Attributes()["enable_technical_administration_request"].(basetypes.ObjectValue) + data.SetupNestedGroupRequest = obj.Attributes()["setup_nested_group_request"].(basetypes.ObjectValue) + data.TransferGroupOnSystemOwnershipRequest = obj.Attributes()["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue) + data.RemoveGroupRequest = obj.Attributes()["remove_group_request"].(basetypes.ObjectValue) + data.GrantApplicationRequest = obj.Attributes()["grant_application_request"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectDSRequestModificationRequestLinkableWrapper(data *requestModificationRequestLinkableWrapperDataDS, obj types.Object) { diff --git a/internal/provider/full-tf-to-data-struct-rs.go b/internal/provider/full-tf-to-data-struct-rs.go index 3777f29..bb36a6e 100644 --- a/internal/provider/full-tf-to-data-struct-rs.go +++ b/internal/provider/full-tf-to-data-struct-rs.go @@ -451,10 +451,10 @@ func fillDataStructFromTFObjectRSDirectoryAccountDirectory(data *directoryAccoun data.Restrict2fa = obj.Attributes()["restrict2fa"].(basetypes.BoolValue) data.RotatingPassword = obj.Attributes()["rotating_password"].(basetypes.StringValue) data.UsernameCustomizable = obj.Attributes()["username_customizable"].(basetypes.BoolValue) - data.InternalDirectory = obj.Attributes()["internal_directory"].(basetypes.ObjectValue) + data.MaintenanceDirectory = obj.Attributes()["maintenance_directory"].(basetypes.ObjectValue) data.OIDCDirectory = obj.Attributes()["o_id_c_directory"].(basetypes.ObjectValue) data.LDAPDirectory = obj.Attributes()["l_d_a_p_directory"].(basetypes.ObjectValue) - data.MaintenanceDirectory = obj.Attributes()["maintenance_directory"].(basetypes.ObjectValue) + data.InternalDirectory = obj.Attributes()["internal_directory"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectRSDirectoryAccountDirectoryLinkableWrapper(data *directoryAccountDirectoryLinkableWrapperDataRS, obj types.Object) { @@ -893,8 +893,8 @@ func fillDataStructFromTFObjectRSLaunchpadLaunchpadTile(data *launchpadLaunchpad data.LaunchpadLaunchpadTileType = obj.Attributes()["launchpad_launchpad_tile_type"].(basetypes.StringValue) data.Logo = obj.Attributes()["logo"].(basetypes.ListValue) data.VaultRecordUUID = obj.Attributes()["vault_record_uuid"].(basetypes.StringValue) - data.VaultRecordLaunchpadTile = obj.Attributes()["vault_record_launchpad_tile"].(basetypes.ObjectValue) data.SsoApplicationLaunchpadTile = obj.Attributes()["sso_application_launchpad_tile"].(basetypes.ObjectValue) + data.VaultRecordLaunchpadTile = obj.Attributes()["vault_record_launchpad_tile"].(basetypes.ObjectValue) data.ManualLaunchpadTile = obj.Attributes()["manual_launchpad_tile"].(basetypes.ObjectValue) } @@ -1400,14 +1400,14 @@ func fillDataStructFromTFObjectRSProvisioningProvisionedSystem(data *provisionin data.ShouldDestroyUnknownAccounts = obj.Attributes()["should_destroy_unknown_accounts"].(basetypes.BoolValue) data.TechnicalAdministratorUUID = obj.Attributes()["technical_administrator_uuid"].(basetypes.StringValue) data.UsernamePrefix = obj.Attributes()["username_prefix"].(basetypes.StringValue) + data.ProvisionedAzureOIDCDirectory = obj.Attributes()["provisioned_azure_oidc_directory"].(basetypes.ObjectValue) + data.ProvisionedInternalLDAP = obj.Attributes()["provisioned_internal_ldap"].(basetypes.ObjectValue) data.AbstractProvisionedLDAP = obj.Attributes()["abstract_provisioned_ldap"].(basetypes.ObjectValue) data.ProvisionedLDAP = obj.Attributes()["provisioned_ldap"].(basetypes.ObjectValue) - data.ProvisionedAzureTenant = obj.Attributes()["provisioned_azure_tenant"].(basetypes.ObjectValue) - data.ProvisionedInternalLDAP = obj.Attributes()["provisioned_internal_ldap"].(basetypes.ObjectValue) - data.ProvisionedAzureOIDCDirectory = obj.Attributes()["provisioned_azure_oidc_directory"].(basetypes.ObjectValue) + data.ProvisionedAzureSyncLDAPDirectory = obj.Attributes()["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue) data.ProvisionedLDAPDirectory = obj.Attributes()["provisioned_ldap_directory"].(basetypes.ObjectValue) data.ProvisionedAD = obj.Attributes()["provisioned_a_d"].(basetypes.ObjectValue) - data.ProvisionedAzureSyncLDAPDirectory = obj.Attributes()["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue) + data.ProvisionedAzureTenant = obj.Attributes()["provisioned_azure_tenant"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectRSProvisioningProvisionedSystemLinkableWrapper(data *provisioningProvisionedSystemLinkableWrapperDataRS, obj types.Object) { @@ -1575,43 +1575,43 @@ func fillDataStructFromTFObjectRSRequestModificationRequest(data *requestModific data.MailKey = obj.Attributes()["mail_key"].(basetypes.StringValue) data.RequestModificationRequestType = obj.Attributes()["request_modification_request_type"].(basetypes.StringValue) data.Status = obj.Attributes()["status"].(basetypes.StringValue) - data.AbstractProvisionedSystemModificationRequest = obj.Attributes()["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemAdministrationRequest = obj.Attributes()["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemOwnershipRequest = obj.Attributes()["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue) - data.PasswordResetRequest = obj.Attributes()["password_reset_request"].(basetypes.ObjectValue) - data.RevokeAdminRequest = obj.Attributes()["revoke_admin_request"].(basetypes.ObjectValue) - data.GrantGroupOnSystemRequestRequest = obj.Attributes()["grant_group_on_system_request_request"].(basetypes.ObjectValue) - data.AbstractApplicationModificationRequest = obj.Attributes()["abstract_application_modification_request"].(basetypes.ObjectValue) - data.TransferApplicationAdministrationRequest = obj.Attributes()["transfer_application_administration_request"].(basetypes.ObjectValue) - data.CreateServiceAccountRequest = obj.Attributes()["create_service_account_request"].(basetypes.ObjectValue) - data.RemoveProvisionedSystemRequest = obj.Attributes()["remove_provisioned_system_request"].(basetypes.ObjectValue) - data.ReviewAuditRequest = obj.Attributes()["review_audit_request"].(basetypes.ObjectValue) data.AbstractOrganizationalUnitModificationRequest = obj.Attributes()["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue) data.CreateGroupRequest = obj.Attributes()["create_group_request"].(basetypes.ObjectValue) - data.GrantGroupOnSystemRequest = obj.Attributes()["grant_group_on_system_request"].(basetypes.ObjectValue) - data.VerifyInternalAccountRequest = obj.Attributes()["verify_internal_account_request"].(basetypes.ObjectValue) + data.AbstractApplicationModificationRequest = obj.Attributes()["abstract_application_modification_request"].(basetypes.ObjectValue) + data.TransferApplicationOwnershipRequest = obj.Attributes()["transfer_application_ownership_request"].(basetypes.ObjectValue) data.GrantClientPermissionRequest = obj.Attributes()["grant_client_permission_request"].(basetypes.ObjectValue) - data.TransferOrganizationalUnitOwnershipRequest = obj.Attributes()["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue) - data.SetupNestedGroupRequest = obj.Attributes()["setup_nested_group_request"].(basetypes.ObjectValue) - data.JoinVaultRequest = obj.Attributes()["join_vault_request"].(basetypes.ObjectValue) + data.JoinGroupRequest = obj.Attributes()["join_group_request"].(basetypes.ObjectValue) + data.AbstractProvisionedSystemModificationRequest = obj.Attributes()["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemContentAdministrationRequest = obj.Attributes()["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue) + data.GrantGroupOnSystemRequest = obj.Attributes()["grant_group_on_system_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemOwnershipRequest = obj.Attributes()["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue) + data.GrantServiceAccountGroupRequest = obj.Attributes()["grant_service_account_group_request"].(basetypes.ObjectValue) + data.Disable2FARequest = obj.Attributes()["disable2fa_request"].(basetypes.ObjectValue) + data.RemoveProvisionedSystemRequest = obj.Attributes()["remove_provisioned_system_request"].(basetypes.ObjectValue) data.TransferServiceAccountAdministrationRequest = obj.Attributes()["transfer_service_account_administration_request"].(basetypes.ObjectValue) - data.GrantApplicationRequest = obj.Attributes()["grant_application_request"].(basetypes.ObjectValue) - data.GrantAccessRequest = obj.Attributes()["grant_access_request"].(basetypes.ObjectValue) - data.TransferGroupOnSystemOwnershipRequest = obj.Attributes()["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue) + data.PasswordResetRequest = obj.Attributes()["password_reset_request"].(basetypes.ObjectValue) + data.TransferAuditorGroupRequest = obj.Attributes()["transfer_auditor_group_request"].(basetypes.ObjectValue) + data.UpdateGroupMembershipRequest = obj.Attributes()["update_group_membership_request"].(basetypes.ObjectValue) data.AddGroupAdminRequest = obj.Attributes()["add_group_admin_request"].(basetypes.ObjectValue) + data.RemoveOrganizationalUnitRequest = obj.Attributes()["remove_organizational_unit_request"].(basetypes.ObjectValue) + data.TransferProvisionedSystemAdministrationRequest = obj.Attributes()["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue) + data.VerifyInternalAccountRequest = obj.Attributes()["verify_internal_account_request"].(basetypes.ObjectValue) + data.TransferApplicationAdministrationRequest = obj.Attributes()["transfer_application_administration_request"].(basetypes.ObjectValue) data.ExtendAccessRequest = obj.Attributes()["extend_access_request"].(basetypes.ObjectValue) - data.TransferProvisionedSystemContentAdministrationRequest = obj.Attributes()["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue) - data.UpdateGroupMembershipRequest = obj.Attributes()["update_group_membership_request"].(basetypes.ObjectValue) - data.TransferAuditorGroupRequest = obj.Attributes()["transfer_auditor_group_request"].(basetypes.ObjectValue) - data.TransferApplicationOwnershipRequest = obj.Attributes()["transfer_application_ownership_request"].(basetypes.ObjectValue) - data.RemoveGroupRequest = obj.Attributes()["remove_group_request"].(basetypes.ObjectValue) + data.GrantGroupOnSystemRequestRequest = obj.Attributes()["grant_group_on_system_request_request"].(basetypes.ObjectValue) + data.JoinVaultRequest = obj.Attributes()["join_vault_request"].(basetypes.ObjectValue) + data.GrantAccessRequest = obj.Attributes()["grant_access_request"].(basetypes.ObjectValue) + data.RevokeAdminRequest = obj.Attributes()["revoke_admin_request"].(basetypes.ObjectValue) data.SetupAuthorizingGroupRequest = obj.Attributes()["setup_authorizing_group_request"].(basetypes.ObjectValue) + data.TransferOrganizationalUnitOwnershipRequest = obj.Attributes()["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue) + data.CreateServiceAccountRequest = obj.Attributes()["create_service_account_request"].(basetypes.ObjectValue) data.CreateGroupOnSystemRequest = obj.Attributes()["create_group_on_system_request"].(basetypes.ObjectValue) - data.RemoveOrganizationalUnitRequest = obj.Attributes()["remove_organizational_unit_request"].(basetypes.ObjectValue) - data.GrantServiceAccountGroupRequest = obj.Attributes()["grant_service_account_group_request"].(basetypes.ObjectValue) - data.Disable2FARequest = obj.Attributes()["disable2fa_request"].(basetypes.ObjectValue) - data.JoinGroupRequest = obj.Attributes()["join_group_request"].(basetypes.ObjectValue) + data.ReviewAuditRequest = obj.Attributes()["review_audit_request"].(basetypes.ObjectValue) data.EnableTechnicalAdministrationRequest = obj.Attributes()["enable_technical_administration_request"].(basetypes.ObjectValue) + data.SetupNestedGroupRequest = obj.Attributes()["setup_nested_group_request"].(basetypes.ObjectValue) + data.TransferGroupOnSystemOwnershipRequest = obj.Attributes()["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue) + data.RemoveGroupRequest = obj.Attributes()["remove_group_request"].(basetypes.ObjectValue) + data.GrantApplicationRequest = obj.Attributes()["grant_application_request"].(basetypes.ObjectValue) } func fillDataStructFromTFObjectRSRequestModificationRequestLinkableWrapper(data *requestModificationRequestLinkableWrapperDataRS, obj types.Object) { diff --git a/internal/provider/full-tf-to-tkh-ds.go b/internal/provider/full-tf-to-tkh-ds.go index 12c1617..4451bf8 100644 --- a/internal/provider/full-tf-to-tkh-ds.go +++ b/internal/provider/full-tf-to-tkh-ds.go @@ -1792,11 +1792,11 @@ func tfObjectToTKHDSDirectoryAccountDirectory(ctx context.Context, recurse bool, tkh.SetRotatingPassword(val) } tkh.SetUsernameCustomizable(objAttrs["username_customizable"].(basetypes.BoolValue).ValueBoolPointer()) - if !objAttrs["internal_directory"].IsNull() { - val, d := tfObjectToTKHDSDirectoryInternalDirectory(ctx, false, objAttrs["internal_directory"].(basetypes.ObjectValue)) + if !objAttrs["maintenance_directory"].IsNull() { + val, d := tfObjectToTKHDSDirectoryMaintenanceDirectory(ctx, false, objAttrs["maintenance_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.DirectoryInternalDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) + (*val.(*keyhubmodel.DirectoryMaintenanceDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) val.SetTypeEscaped(dtype) tkh = val } @@ -1816,11 +1816,11 @@ func tfObjectToTKHDSDirectoryAccountDirectory(ctx context.Context, recurse bool, val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["maintenance_directory"].IsNull() { - val, d := tfObjectToTKHDSDirectoryMaintenanceDirectory(ctx, false, objAttrs["maintenance_directory"].(basetypes.ObjectValue)) + if !objAttrs["internal_directory"].IsNull() { + val, d := tfObjectToTKHDSDirectoryInternalDirectory(ctx, false, objAttrs["internal_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.DirectoryMaintenanceDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) + (*val.(*keyhubmodel.DirectoryInternalDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) val.SetTypeEscaped(dtype) tkh = val } @@ -3638,19 +3638,19 @@ func tfObjectToTKHDSLaunchpadLaunchpadTile(ctx context.Context, recurse bool, ob diags.Append(d...) tkh.SetVaultRecord(val) } - if !objAttrs["vault_record_launchpad_tile"].IsNull() { - val, d := tfObjectToTKHDSLaunchpadVaultRecordLaunchpadTile(ctx, false, objAttrs["vault_record_launchpad_tile"].(basetypes.ObjectValue)) + if !objAttrs["sso_application_launchpad_tile"].IsNull() { + val, d := tfObjectToTKHDSLaunchpadSsoApplicationLaunchpadTile(ctx, false, objAttrs["sso_application_launchpad_tile"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.LaunchpadVaultRecordLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) + (*val.(*keyhubmodel.LaunchpadSsoApplicationLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["sso_application_launchpad_tile"].IsNull() { - val, d := tfObjectToTKHDSLaunchpadSsoApplicationLaunchpadTile(ctx, false, objAttrs["sso_application_launchpad_tile"].(basetypes.ObjectValue)) + if !objAttrs["vault_record_launchpad_tile"].IsNull() { + val, d := tfObjectToTKHDSLaunchpadVaultRecordLaunchpadTile(ctx, false, objAttrs["vault_record_launchpad_tile"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.LaunchpadSsoApplicationLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) + (*val.(*keyhubmodel.LaunchpadVaultRecordLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) val.SetTypeEscaped(dtype) tkh = val } @@ -5938,43 +5938,43 @@ func tfObjectToTKHDSProvisioningProvisionedSystem(ctx context.Context, recurse b tkh.SetTechnicalAdministrator(val) } tkh.SetUsernamePrefix(objAttrs["username_prefix"].(basetypes.StringValue).ValueStringPointer()) - if !objAttrs["abstract_provisioned_ldap"].IsNull() { - val, d := tfObjectToTKHDSProvisioningAbstractProvisionedLDAP(ctx, false, objAttrs["abstract_provisioned_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_oidc_directory"].IsNull() { + val, d := tfObjectToTKHDSProvisioningProvisionedAzureOIDCDirectory(ctx, false, objAttrs["provisioned_azure_oidc_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningAbstractProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureOIDCDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_ldap"].IsNull() { - val, d := tfObjectToTKHDSProvisioningProvisionedLDAP(ctx, false, objAttrs["provisioned_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_internal_ldap"].IsNull() { + val, d := tfObjectToTKHDSProvisioningProvisionedInternalLDAP(ctx, false, objAttrs["provisioned_internal_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedInternalLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_tenant"].IsNull() { - val, d := tfObjectToTKHDSProvisioningProvisionedAzureTenant(ctx, false, objAttrs["provisioned_azure_tenant"].(basetypes.ObjectValue)) + if !objAttrs["abstract_provisioned_ldap"].IsNull() { + val, d := tfObjectToTKHDSProvisioningAbstractProvisionedLDAP(ctx, false, objAttrs["abstract_provisioned_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureTenant)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningAbstractProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_internal_ldap"].IsNull() { - val, d := tfObjectToTKHDSProvisioningProvisionedInternalLDAP(ctx, false, objAttrs["provisioned_internal_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_ldap"].IsNull() { + val, d := tfObjectToTKHDSProvisioningProvisionedLDAP(ctx, false, objAttrs["provisioned_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedInternalLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_oidc_directory"].IsNull() { - val, d := tfObjectToTKHDSProvisioningProvisionedAzureOIDCDirectory(ctx, false, objAttrs["provisioned_azure_oidc_directory"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_sync_ldap_directory"].IsNull() { + val, d := tfObjectToTKHDSProvisioningProvisionedAzureSyncLDAPDirectory(ctx, false, objAttrs["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureOIDCDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } @@ -5994,11 +5994,11 @@ func tfObjectToTKHDSProvisioningProvisionedSystem(ctx context.Context, recurse b val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_sync_ldap_directory"].IsNull() { - val, d := tfObjectToTKHDSProvisioningProvisionedAzureSyncLDAPDirectory(ctx, false, objAttrs["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_tenant"].IsNull() { + val, d := tfObjectToTKHDSProvisioningProvisionedAzureTenant(ctx, false, objAttrs["provisioned_azure_tenant"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureTenant)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } @@ -6645,299 +6645,299 @@ func tfObjectToTKHDSRequestModificationRequest(ctx context.Context, recurse bool diags.Append(d...) tkh.SetStatus(val) } - if !objAttrs["abstract_provisioned_system_modification_request"].IsNull() { - val, d := tfObjectToTKHDSRequestAbstractProvisionedSystemModificationRequest(ctx, false, objAttrs["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_organizational_unit_modification_request"].IsNull() { + val, d := tfObjectToTKHDSRequestAbstractOrganizationalUnitModificationRequest(ctx, false, objAttrs["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractProvisionedSystemModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractOrganizationalUnitModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_administration_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferProvisionedSystemAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["create_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestCreateGroupRequest(ctx, false, objAttrs["create_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_ownership_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferProvisionedSystemOwnershipRequest(ctx, false, objAttrs["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_application_modification_request"].IsNull() { + val, d := tfObjectToTKHDSRequestAbstractApplicationModificationRequest(ctx, false, objAttrs["abstract_application_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractApplicationModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["password_reset_request"].IsNull() { - val, d := tfObjectToTKHDSRequestPasswordResetRequest(ctx, false, objAttrs["password_reset_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_application_ownership_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferApplicationOwnershipRequest(ctx, false, objAttrs["transfer_application_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestPasswordResetRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferApplicationOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["revoke_admin_request"].IsNull() { - val, d := tfObjectToTKHDSRequestRevokeAdminRequest(ctx, false, objAttrs["revoke_admin_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_client_permission_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantClientPermissionRequest(ctx, false, objAttrs["grant_client_permission_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRevokeAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantClientPermissionRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_group_on_system_request_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantGroupOnSystemRequestRequest(ctx, false, objAttrs["grant_group_on_system_request_request"].(basetypes.ObjectValue)) + if !objAttrs["join_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestJoinGroupRequest(ctx, false, objAttrs["join_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequestRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestJoinGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["abstract_application_modification_request"].IsNull() { - val, d := tfObjectToTKHDSRequestAbstractApplicationModificationRequest(ctx, false, objAttrs["abstract_application_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_provisioned_system_modification_request"].IsNull() { + val, d := tfObjectToTKHDSRequestAbstractProvisionedSystemModificationRequest(ctx, false, objAttrs["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractApplicationModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractProvisionedSystemModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_application_administration_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferApplicationAdministrationRequest(ctx, false, objAttrs["transfer_application_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_content_administration_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferProvisionedSystemContentAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferApplicationAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_service_account_request"].IsNull() { - val, d := tfObjectToTKHDSRequestCreateServiceAccountRequest(ctx, false, objAttrs["create_service_account_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_group_on_system_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantGroupOnSystemRequest(ctx, false, objAttrs["grant_group_on_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateServiceAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_provisioned_system_request"].IsNull() { - val, d := tfObjectToTKHDSRequestRemoveProvisionedSystemRequest(ctx, false, objAttrs["remove_provisioned_system_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_ownership_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferProvisionedSystemOwnershipRequest(ctx, false, objAttrs["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveProvisionedSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["review_audit_request"].IsNull() { - val, d := tfObjectToTKHDSRequestReviewAuditRequest(ctx, false, objAttrs["review_audit_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_service_account_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantServiceAccountGroupRequest(ctx, false, objAttrs["grant_service_account_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestReviewAuditRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantServiceAccountGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["abstract_organizational_unit_modification_request"].IsNull() { - val, d := tfObjectToTKHDSRequestAbstractOrganizationalUnitModificationRequest(ctx, false, objAttrs["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["disable2fa_request"].IsNull() { + val, d := tfObjectToTKHDSRequestDisable2FARequest(ctx, false, objAttrs["disable2fa_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractOrganizationalUnitModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestDisable2FARequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestCreateGroupRequest(ctx, false, objAttrs["create_group_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_provisioned_system_request"].IsNull() { + val, d := tfObjectToTKHDSRequestRemoveProvisionedSystemRequest(ctx, false, objAttrs["remove_provisioned_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveProvisionedSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_group_on_system_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantGroupOnSystemRequest(ctx, false, objAttrs["grant_group_on_system_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_service_account_administration_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferServiceAccountAdministrationRequest(ctx, false, objAttrs["transfer_service_account_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferServiceAccountAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["verify_internal_account_request"].IsNull() { - val, d := tfObjectToTKHDSRequestVerifyInternalAccountRequest(ctx, false, objAttrs["verify_internal_account_request"].(basetypes.ObjectValue)) + if !objAttrs["password_reset_request"].IsNull() { + val, d := tfObjectToTKHDSRequestPasswordResetRequest(ctx, false, objAttrs["password_reset_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestVerifyInternalAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestPasswordResetRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_client_permission_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantClientPermissionRequest(ctx, false, objAttrs["grant_client_permission_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_auditor_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferAuditorGroupRequest(ctx, false, objAttrs["transfer_auditor_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantClientPermissionRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferAuditorGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_organizational_unit_ownership_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferOrganizationalUnitOwnershipRequest(ctx, false, objAttrs["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["update_group_membership_request"].IsNull() { + val, d := tfObjectToTKHDSRequestUpdateGroupMembershipRequest(ctx, false, objAttrs["update_group_membership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestUpdateGroupMembershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["setup_nested_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestSetupNestedGroupRequest(ctx, false, objAttrs["setup_nested_group_request"].(basetypes.ObjectValue)) + if !objAttrs["add_group_admin_request"].IsNull() { + val, d := tfObjectToTKHDSRequestAddGroupAdminRequest(ctx, false, objAttrs["add_group_admin_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestSetupNestedGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAddGroupAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["join_vault_request"].IsNull() { - val, d := tfObjectToTKHDSRequestJoinVaultRequest(ctx, false, objAttrs["join_vault_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_organizational_unit_request"].IsNull() { + val, d := tfObjectToTKHDSRequestRemoveOrganizationalUnitRequest(ctx, false, objAttrs["remove_organizational_unit_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestJoinVaultRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveOrganizationalUnitRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_service_account_administration_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferServiceAccountAdministrationRequest(ctx, false, objAttrs["transfer_service_account_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_administration_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferProvisionedSystemAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferServiceAccountAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_application_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantApplicationRequest(ctx, false, objAttrs["grant_application_request"].(basetypes.ObjectValue)) + if !objAttrs["verify_internal_account_request"].IsNull() { + val, d := tfObjectToTKHDSRequestVerifyInternalAccountRequest(ctx, false, objAttrs["verify_internal_account_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantApplicationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestVerifyInternalAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_access_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantAccessRequest(ctx, false, objAttrs["grant_access_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_application_administration_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferApplicationAdministrationRequest(ctx, false, objAttrs["transfer_application_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferApplicationAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_group_on_system_ownership_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferGroupOnSystemOwnershipRequest(ctx, false, objAttrs["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["extend_access_request"].IsNull() { + val, d := tfObjectToTKHDSRequestExtendAccessRequest(ctx, false, objAttrs["extend_access_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferGroupOnSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestExtendAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["add_group_admin_request"].IsNull() { - val, d := tfObjectToTKHDSRequestAddGroupAdminRequest(ctx, false, objAttrs["add_group_admin_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_group_on_system_request_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantGroupOnSystemRequestRequest(ctx, false, objAttrs["grant_group_on_system_request_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAddGroupAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequestRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["extend_access_request"].IsNull() { - val, d := tfObjectToTKHDSRequestExtendAccessRequest(ctx, false, objAttrs["extend_access_request"].(basetypes.ObjectValue)) + if !objAttrs["join_vault_request"].IsNull() { + val, d := tfObjectToTKHDSRequestJoinVaultRequest(ctx, false, objAttrs["join_vault_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestExtendAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestJoinVaultRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_content_administration_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferProvisionedSystemContentAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_access_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantAccessRequest(ctx, false, objAttrs["grant_access_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["update_group_membership_request"].IsNull() { - val, d := tfObjectToTKHDSRequestUpdateGroupMembershipRequest(ctx, false, objAttrs["update_group_membership_request"].(basetypes.ObjectValue)) + if !objAttrs["revoke_admin_request"].IsNull() { + val, d := tfObjectToTKHDSRequestRevokeAdminRequest(ctx, false, objAttrs["revoke_admin_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestUpdateGroupMembershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRevokeAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_auditor_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferAuditorGroupRequest(ctx, false, objAttrs["transfer_auditor_group_request"].(basetypes.ObjectValue)) + if !objAttrs["setup_authorizing_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestSetupAuthorizingGroupRequest(ctx, false, objAttrs["setup_authorizing_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferAuditorGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestSetupAuthorizingGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_application_ownership_request"].IsNull() { - val, d := tfObjectToTKHDSRequestTransferApplicationOwnershipRequest(ctx, false, objAttrs["transfer_application_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_organizational_unit_ownership_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferOrganizationalUnitOwnershipRequest(ctx, false, objAttrs["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferApplicationOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestRemoveGroupRequest(ctx, false, objAttrs["remove_group_request"].(basetypes.ObjectValue)) + if !objAttrs["create_service_account_request"].IsNull() { + val, d := tfObjectToTKHDSRequestCreateServiceAccountRequest(ctx, false, objAttrs["create_service_account_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateServiceAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["setup_authorizing_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestSetupAuthorizingGroupRequest(ctx, false, objAttrs["setup_authorizing_group_request"].(basetypes.ObjectValue)) + if !objAttrs["create_group_on_system_request"].IsNull() { + val, d := tfObjectToTKHDSRequestCreateGroupOnSystemRequest(ctx, false, objAttrs["create_group_on_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestSetupAuthorizingGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_group_on_system_request"].IsNull() { - val, d := tfObjectToTKHDSRequestCreateGroupOnSystemRequest(ctx, false, objAttrs["create_group_on_system_request"].(basetypes.ObjectValue)) + if !objAttrs["review_audit_request"].IsNull() { + val, d := tfObjectToTKHDSRequestReviewAuditRequest(ctx, false, objAttrs["review_audit_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestReviewAuditRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_organizational_unit_request"].IsNull() { - val, d := tfObjectToTKHDSRequestRemoveOrganizationalUnitRequest(ctx, false, objAttrs["remove_organizational_unit_request"].(basetypes.ObjectValue)) + if !objAttrs["enable_technical_administration_request"].IsNull() { + val, d := tfObjectToTKHDSRequestEnableTechnicalAdministrationRequest(ctx, false, objAttrs["enable_technical_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveOrganizationalUnitRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestEnableTechnicalAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_service_account_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestGrantServiceAccountGroupRequest(ctx, false, objAttrs["grant_service_account_group_request"].(basetypes.ObjectValue)) + if !objAttrs["setup_nested_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestSetupNestedGroupRequest(ctx, false, objAttrs["setup_nested_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantServiceAccountGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestSetupNestedGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["disable2fa_request"].IsNull() { - val, d := tfObjectToTKHDSRequestDisable2FARequest(ctx, false, objAttrs["disable2fa_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_group_on_system_ownership_request"].IsNull() { + val, d := tfObjectToTKHDSRequestTransferGroupOnSystemOwnershipRequest(ctx, false, objAttrs["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestDisable2FARequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferGroupOnSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["join_group_request"].IsNull() { - val, d := tfObjectToTKHDSRequestJoinGroupRequest(ctx, false, objAttrs["join_group_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_group_request"].IsNull() { + val, d := tfObjectToTKHDSRequestRemoveGroupRequest(ctx, false, objAttrs["remove_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestJoinGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["enable_technical_administration_request"].IsNull() { - val, d := tfObjectToTKHDSRequestEnableTechnicalAdministrationRequest(ctx, false, objAttrs["enable_technical_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_application_request"].IsNull() { + val, d := tfObjectToTKHDSRequestGrantApplicationRequest(ctx, false, objAttrs["grant_application_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestEnableTechnicalAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantApplicationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } diff --git a/internal/provider/full-tf-to-tkh-rs.go b/internal/provider/full-tf-to-tkh-rs.go index a096a00..7a8246a 100644 --- a/internal/provider/full-tf-to-tkh-rs.go +++ b/internal/provider/full-tf-to-tkh-rs.go @@ -1717,11 +1717,11 @@ func tfObjectToTKHRSDirectoryAccountDirectory(ctx context.Context, recurse bool, tkh.SetRotatingPassword(val) } tkh.SetUsernameCustomizable(objAttrs["username_customizable"].(basetypes.BoolValue).ValueBoolPointer()) - if !objAttrs["internal_directory"].IsNull() { - val, d := tfObjectToTKHRSDirectoryInternalDirectory(ctx, false, objAttrs["internal_directory"].(basetypes.ObjectValue)) + if !objAttrs["maintenance_directory"].IsNull() { + val, d := tfObjectToTKHRSDirectoryMaintenanceDirectory(ctx, false, objAttrs["maintenance_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.DirectoryInternalDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) + (*val.(*keyhubmodel.DirectoryMaintenanceDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) val.SetTypeEscaped(dtype) tkh = val } @@ -1741,11 +1741,11 @@ func tfObjectToTKHRSDirectoryAccountDirectory(ctx context.Context, recurse bool, val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["maintenance_directory"].IsNull() { - val, d := tfObjectToTKHRSDirectoryMaintenanceDirectory(ctx, false, objAttrs["maintenance_directory"].(basetypes.ObjectValue)) + if !objAttrs["internal_directory"].IsNull() { + val, d := tfObjectToTKHRSDirectoryInternalDirectory(ctx, false, objAttrs["internal_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.DirectoryMaintenanceDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) + (*val.(*keyhubmodel.DirectoryInternalDirectory)).DirectoryAccountDirectory = *tkh.(*keyhubmodel.DirectoryAccountDirectory) val.SetTypeEscaped(dtype) tkh = val } @@ -3568,19 +3568,19 @@ func tfObjectToTKHRSLaunchpadLaunchpadTile(ctx context.Context, recurse bool, ob diags.Append(d...) tkh.SetVaultRecord(val) } - if !objAttrs["vault_record_launchpad_tile"].IsNull() { - val, d := tfObjectToTKHRSLaunchpadVaultRecordLaunchpadTile(ctx, false, objAttrs["vault_record_launchpad_tile"].(basetypes.ObjectValue)) + if !objAttrs["sso_application_launchpad_tile"].IsNull() { + val, d := tfObjectToTKHRSLaunchpadSsoApplicationLaunchpadTile(ctx, false, objAttrs["sso_application_launchpad_tile"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.LaunchpadVaultRecordLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) + (*val.(*keyhubmodel.LaunchpadSsoApplicationLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["sso_application_launchpad_tile"].IsNull() { - val, d := tfObjectToTKHRSLaunchpadSsoApplicationLaunchpadTile(ctx, false, objAttrs["sso_application_launchpad_tile"].(basetypes.ObjectValue)) + if !objAttrs["vault_record_launchpad_tile"].IsNull() { + val, d := tfObjectToTKHRSLaunchpadVaultRecordLaunchpadTile(ctx, false, objAttrs["vault_record_launchpad_tile"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.LaunchpadSsoApplicationLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) + (*val.(*keyhubmodel.LaunchpadVaultRecordLaunchpadTile)).LaunchpadLaunchpadTile = *tkh.(*keyhubmodel.LaunchpadLaunchpadTile) val.SetTypeEscaped(dtype) tkh = val } @@ -5656,43 +5656,43 @@ func tfObjectToTKHRSProvisioningProvisionedSystem(ctx context.Context, recurse b tkh.SetTechnicalAdministrator(val) } tkh.SetUsernamePrefix(objAttrs["username_prefix"].(basetypes.StringValue).ValueStringPointer()) - if !objAttrs["abstract_provisioned_ldap"].IsNull() { - val, d := tfObjectToTKHRSProvisioningAbstractProvisionedLDAP(ctx, false, objAttrs["abstract_provisioned_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_oidc_directory"].IsNull() { + val, d := tfObjectToTKHRSProvisioningProvisionedAzureOIDCDirectory(ctx, false, objAttrs["provisioned_azure_oidc_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningAbstractProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureOIDCDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_ldap"].IsNull() { - val, d := tfObjectToTKHRSProvisioningProvisionedLDAP(ctx, false, objAttrs["provisioned_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_internal_ldap"].IsNull() { + val, d := tfObjectToTKHRSProvisioningProvisionedInternalLDAP(ctx, false, objAttrs["provisioned_internal_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedInternalLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_tenant"].IsNull() { - val, d := tfObjectToTKHRSProvisioningProvisionedAzureTenant(ctx, false, objAttrs["provisioned_azure_tenant"].(basetypes.ObjectValue)) + if !objAttrs["abstract_provisioned_ldap"].IsNull() { + val, d := tfObjectToTKHRSProvisioningAbstractProvisionedLDAP(ctx, false, objAttrs["abstract_provisioned_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureTenant)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningAbstractProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_internal_ldap"].IsNull() { - val, d := tfObjectToTKHRSProvisioningProvisionedInternalLDAP(ctx, false, objAttrs["provisioned_internal_ldap"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_ldap"].IsNull() { + val, d := tfObjectToTKHRSProvisioningProvisionedLDAP(ctx, false, objAttrs["provisioned_ldap"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedInternalLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedLDAP)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_oidc_directory"].IsNull() { - val, d := tfObjectToTKHRSProvisioningProvisionedAzureOIDCDirectory(ctx, false, objAttrs["provisioned_azure_oidc_directory"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_sync_ldap_directory"].IsNull() { + val, d := tfObjectToTKHRSProvisioningProvisionedAzureSyncLDAPDirectory(ctx, false, objAttrs["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureOIDCDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } @@ -5712,11 +5712,11 @@ func tfObjectToTKHRSProvisioningProvisionedSystem(ctx context.Context, recurse b val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["provisioned_azure_sync_ldap_directory"].IsNull() { - val, d := tfObjectToTKHRSProvisioningProvisionedAzureSyncLDAPDirectory(ctx, false, objAttrs["provisioned_azure_sync_ldap_directory"].(basetypes.ObjectValue)) + if !objAttrs["provisioned_azure_tenant"].IsNull() { + val, d := tfObjectToTKHRSProvisioningProvisionedAzureTenant(ctx, false, objAttrs["provisioned_azure_tenant"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectory)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) + (*val.(*keyhubmodel.ProvisioningProvisionedAzureTenant)).ProvisioningProvisionedSystem = *tkh.(*keyhubmodel.ProvisioningProvisionedSystem) val.SetTypeEscaped(dtype) tkh = val } @@ -6366,299 +6366,299 @@ func tfObjectToTKHRSRequestModificationRequest(ctx context.Context, recurse bool diags.Append(d...) tkh.SetStatus(val) } - if !objAttrs["abstract_provisioned_system_modification_request"].IsNull() { - val, d := tfObjectToTKHRSRequestAbstractProvisionedSystemModificationRequest(ctx, false, objAttrs["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_organizational_unit_modification_request"].IsNull() { + val, d := tfObjectToTKHRSRequestAbstractOrganizationalUnitModificationRequest(ctx, false, objAttrs["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractProvisionedSystemModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractOrganizationalUnitModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_administration_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferProvisionedSystemAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["create_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestCreateGroupRequest(ctx, false, objAttrs["create_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_ownership_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferProvisionedSystemOwnershipRequest(ctx, false, objAttrs["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_application_modification_request"].IsNull() { + val, d := tfObjectToTKHRSRequestAbstractApplicationModificationRequest(ctx, false, objAttrs["abstract_application_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractApplicationModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["password_reset_request"].IsNull() { - val, d := tfObjectToTKHRSRequestPasswordResetRequest(ctx, false, objAttrs["password_reset_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_application_ownership_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferApplicationOwnershipRequest(ctx, false, objAttrs["transfer_application_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestPasswordResetRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferApplicationOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["revoke_admin_request"].IsNull() { - val, d := tfObjectToTKHRSRequestRevokeAdminRequest(ctx, false, objAttrs["revoke_admin_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_client_permission_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantClientPermissionRequest(ctx, false, objAttrs["grant_client_permission_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRevokeAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantClientPermissionRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_group_on_system_request_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantGroupOnSystemRequestRequest(ctx, false, objAttrs["grant_group_on_system_request_request"].(basetypes.ObjectValue)) + if !objAttrs["join_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestJoinGroupRequest(ctx, false, objAttrs["join_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequestRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestJoinGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["abstract_application_modification_request"].IsNull() { - val, d := tfObjectToTKHRSRequestAbstractApplicationModificationRequest(ctx, false, objAttrs["abstract_application_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["abstract_provisioned_system_modification_request"].IsNull() { + val, d := tfObjectToTKHRSRequestAbstractProvisionedSystemModificationRequest(ctx, false, objAttrs["abstract_provisioned_system_modification_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractApplicationModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAbstractProvisionedSystemModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_application_administration_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferApplicationAdministrationRequest(ctx, false, objAttrs["transfer_application_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_content_administration_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferProvisionedSystemContentAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferApplicationAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_service_account_request"].IsNull() { - val, d := tfObjectToTKHRSRequestCreateServiceAccountRequest(ctx, false, objAttrs["create_service_account_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_group_on_system_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantGroupOnSystemRequest(ctx, false, objAttrs["grant_group_on_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateServiceAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_provisioned_system_request"].IsNull() { - val, d := tfObjectToTKHRSRequestRemoveProvisionedSystemRequest(ctx, false, objAttrs["remove_provisioned_system_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_ownership_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferProvisionedSystemOwnershipRequest(ctx, false, objAttrs["transfer_provisioned_system_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveProvisionedSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["review_audit_request"].IsNull() { - val, d := tfObjectToTKHRSRequestReviewAuditRequest(ctx, false, objAttrs["review_audit_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_service_account_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantServiceAccountGroupRequest(ctx, false, objAttrs["grant_service_account_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestReviewAuditRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantServiceAccountGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["abstract_organizational_unit_modification_request"].IsNull() { - val, d := tfObjectToTKHRSRequestAbstractOrganizationalUnitModificationRequest(ctx, false, objAttrs["abstract_organizational_unit_modification_request"].(basetypes.ObjectValue)) + if !objAttrs["disable2fa_request"].IsNull() { + val, d := tfObjectToTKHRSRequestDisable2FARequest(ctx, false, objAttrs["disable2fa_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAbstractOrganizationalUnitModificationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestDisable2FARequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestCreateGroupRequest(ctx, false, objAttrs["create_group_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_provisioned_system_request"].IsNull() { + val, d := tfObjectToTKHRSRequestRemoveProvisionedSystemRequest(ctx, false, objAttrs["remove_provisioned_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveProvisionedSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_group_on_system_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantGroupOnSystemRequest(ctx, false, objAttrs["grant_group_on_system_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_service_account_administration_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferServiceAccountAdministrationRequest(ctx, false, objAttrs["transfer_service_account_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferServiceAccountAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["verify_internal_account_request"].IsNull() { - val, d := tfObjectToTKHRSRequestVerifyInternalAccountRequest(ctx, false, objAttrs["verify_internal_account_request"].(basetypes.ObjectValue)) + if !objAttrs["password_reset_request"].IsNull() { + val, d := tfObjectToTKHRSRequestPasswordResetRequest(ctx, false, objAttrs["password_reset_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestVerifyInternalAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestPasswordResetRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_client_permission_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantClientPermissionRequest(ctx, false, objAttrs["grant_client_permission_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_auditor_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferAuditorGroupRequest(ctx, false, objAttrs["transfer_auditor_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantClientPermissionRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferAuditorGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_organizational_unit_ownership_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferOrganizationalUnitOwnershipRequest(ctx, false, objAttrs["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["update_group_membership_request"].IsNull() { + val, d := tfObjectToTKHRSRequestUpdateGroupMembershipRequest(ctx, false, objAttrs["update_group_membership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestUpdateGroupMembershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["setup_nested_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestSetupNestedGroupRequest(ctx, false, objAttrs["setup_nested_group_request"].(basetypes.ObjectValue)) + if !objAttrs["add_group_admin_request"].IsNull() { + val, d := tfObjectToTKHRSRequestAddGroupAdminRequest(ctx, false, objAttrs["add_group_admin_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestSetupNestedGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestAddGroupAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["join_vault_request"].IsNull() { - val, d := tfObjectToTKHRSRequestJoinVaultRequest(ctx, false, objAttrs["join_vault_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_organizational_unit_request"].IsNull() { + val, d := tfObjectToTKHRSRequestRemoveOrganizationalUnitRequest(ctx, false, objAttrs["remove_organizational_unit_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestJoinVaultRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveOrganizationalUnitRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_service_account_administration_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferServiceAccountAdministrationRequest(ctx, false, objAttrs["transfer_service_account_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_provisioned_system_administration_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferProvisionedSystemAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferServiceAccountAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferProvisionedSystemAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_application_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantApplicationRequest(ctx, false, objAttrs["grant_application_request"].(basetypes.ObjectValue)) + if !objAttrs["verify_internal_account_request"].IsNull() { + val, d := tfObjectToTKHRSRequestVerifyInternalAccountRequest(ctx, false, objAttrs["verify_internal_account_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantApplicationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestVerifyInternalAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_access_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantAccessRequest(ctx, false, objAttrs["grant_access_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_application_administration_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferApplicationAdministrationRequest(ctx, false, objAttrs["transfer_application_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferApplicationAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_group_on_system_ownership_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferGroupOnSystemOwnershipRequest(ctx, false, objAttrs["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["extend_access_request"].IsNull() { + val, d := tfObjectToTKHRSRequestExtendAccessRequest(ctx, false, objAttrs["extend_access_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferGroupOnSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestExtendAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["add_group_admin_request"].IsNull() { - val, d := tfObjectToTKHRSRequestAddGroupAdminRequest(ctx, false, objAttrs["add_group_admin_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_group_on_system_request_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantGroupOnSystemRequestRequest(ctx, false, objAttrs["grant_group_on_system_request_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestAddGroupAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantGroupOnSystemRequestRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["extend_access_request"].IsNull() { - val, d := tfObjectToTKHRSRequestExtendAccessRequest(ctx, false, objAttrs["extend_access_request"].(basetypes.ObjectValue)) + if !objAttrs["join_vault_request"].IsNull() { + val, d := tfObjectToTKHRSRequestJoinVaultRequest(ctx, false, objAttrs["join_vault_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestExtendAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestJoinVaultRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_provisioned_system_content_administration_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferProvisionedSystemContentAdministrationRequest(ctx, false, objAttrs["transfer_provisioned_system_content_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_access_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantAccessRequest(ctx, false, objAttrs["grant_access_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantAccessRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["update_group_membership_request"].IsNull() { - val, d := tfObjectToTKHRSRequestUpdateGroupMembershipRequest(ctx, false, objAttrs["update_group_membership_request"].(basetypes.ObjectValue)) + if !objAttrs["revoke_admin_request"].IsNull() { + val, d := tfObjectToTKHRSRequestRevokeAdminRequest(ctx, false, objAttrs["revoke_admin_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestUpdateGroupMembershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRevokeAdminRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_auditor_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferAuditorGroupRequest(ctx, false, objAttrs["transfer_auditor_group_request"].(basetypes.ObjectValue)) + if !objAttrs["setup_authorizing_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestSetupAuthorizingGroupRequest(ctx, false, objAttrs["setup_authorizing_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferAuditorGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestSetupAuthorizingGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["transfer_application_ownership_request"].IsNull() { - val, d := tfObjectToTKHRSRequestTransferApplicationOwnershipRequest(ctx, false, objAttrs["transfer_application_ownership_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_organizational_unit_ownership_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferOrganizationalUnitOwnershipRequest(ctx, false, objAttrs["transfer_organizational_unit_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestTransferApplicationOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestRemoveGroupRequest(ctx, false, objAttrs["remove_group_request"].(basetypes.ObjectValue)) + if !objAttrs["create_service_account_request"].IsNull() { + val, d := tfObjectToTKHRSRequestCreateServiceAccountRequest(ctx, false, objAttrs["create_service_account_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateServiceAccountRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["setup_authorizing_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestSetupAuthorizingGroupRequest(ctx, false, objAttrs["setup_authorizing_group_request"].(basetypes.ObjectValue)) + if !objAttrs["create_group_on_system_request"].IsNull() { + val, d := tfObjectToTKHRSRequestCreateGroupOnSystemRequest(ctx, false, objAttrs["create_group_on_system_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestSetupAuthorizingGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestCreateGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["create_group_on_system_request"].IsNull() { - val, d := tfObjectToTKHRSRequestCreateGroupOnSystemRequest(ctx, false, objAttrs["create_group_on_system_request"].(basetypes.ObjectValue)) + if !objAttrs["review_audit_request"].IsNull() { + val, d := tfObjectToTKHRSRequestReviewAuditRequest(ctx, false, objAttrs["review_audit_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestCreateGroupOnSystemRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestReviewAuditRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["remove_organizational_unit_request"].IsNull() { - val, d := tfObjectToTKHRSRequestRemoveOrganizationalUnitRequest(ctx, false, objAttrs["remove_organizational_unit_request"].(basetypes.ObjectValue)) + if !objAttrs["enable_technical_administration_request"].IsNull() { + val, d := tfObjectToTKHRSRequestEnableTechnicalAdministrationRequest(ctx, false, objAttrs["enable_technical_administration_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestRemoveOrganizationalUnitRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestEnableTechnicalAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["grant_service_account_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestGrantServiceAccountGroupRequest(ctx, false, objAttrs["grant_service_account_group_request"].(basetypes.ObjectValue)) + if !objAttrs["setup_nested_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestSetupNestedGroupRequest(ctx, false, objAttrs["setup_nested_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestGrantServiceAccountGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestSetupNestedGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["disable2fa_request"].IsNull() { - val, d := tfObjectToTKHRSRequestDisable2FARequest(ctx, false, objAttrs["disable2fa_request"].(basetypes.ObjectValue)) + if !objAttrs["transfer_group_on_system_ownership_request"].IsNull() { + val, d := tfObjectToTKHRSRequestTransferGroupOnSystemOwnershipRequest(ctx, false, objAttrs["transfer_group_on_system_ownership_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestDisable2FARequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestTransferGroupOnSystemOwnershipRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["join_group_request"].IsNull() { - val, d := tfObjectToTKHRSRequestJoinGroupRequest(ctx, false, objAttrs["join_group_request"].(basetypes.ObjectValue)) + if !objAttrs["remove_group_request"].IsNull() { + val, d := tfObjectToTKHRSRequestRemoveGroupRequest(ctx, false, objAttrs["remove_group_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestJoinGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestRemoveGroupRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } - if !objAttrs["enable_technical_administration_request"].IsNull() { - val, d := tfObjectToTKHRSRequestEnableTechnicalAdministrationRequest(ctx, false, objAttrs["enable_technical_administration_request"].(basetypes.ObjectValue)) + if !objAttrs["grant_application_request"].IsNull() { + val, d := tfObjectToTKHRSRequestGrantApplicationRequest(ctx, false, objAttrs["grant_application_request"].(basetypes.ObjectValue)) diags.Append(d...) dtype := val.GetTypeEscaped() - (*val.(*keyhubmodel.RequestEnableTechnicalAdministrationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) + (*val.(*keyhubmodel.RequestGrantApplicationRequest)).RequestModificationRequest = *tkh.(*keyhubmodel.RequestModificationRequest) val.SetTypeEscaped(dtype) tkh = val } diff --git a/internal/provider/full-tkh-to-tf-ds.go b/internal/provider/full-tkh-to-tf-ds.go index 55a6d6c..cd626e2 100644 --- a/internal/provider/full-tkh-to-tf-ds.go +++ b/internal/provider/full-tkh-to-tf-ds.go @@ -2018,10 +2018,10 @@ func tkhToTFObjectDSDirectoryAccountDirectory(recurse bool, tkh keyhubmodel.Dire obj["rotating_password"] = stringerToTF(tkh.GetRotatingPassword()) obj["username_customizable"] = types.BoolPointerValue(tkh.GetUsernameCustomizable()) { - tkhCast, _ := tkh.(keyhubmodel.DirectoryInternalDirectoryable) - val, d := tkhToTFObjectDSDirectoryInternalDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.DirectoryMaintenanceDirectoryable) + val, d := tkhToTFObjectDSDirectoryMaintenanceDirectory(false, tkhCast) diags.Append(d...) - obj["internal_directory"] = val + obj["maintenance_directory"] = val } { tkhCast, _ := tkh.(keyhubmodel.DirectoryOIDCDirectoryable) @@ -2036,10 +2036,10 @@ func tkhToTFObjectDSDirectoryAccountDirectory(recurse bool, tkh keyhubmodel.Dire obj["l_d_a_p_directory"] = val } { - tkhCast, _ := tkh.(keyhubmodel.DirectoryMaintenanceDirectoryable) - val, d := tkhToTFObjectDSDirectoryMaintenanceDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.DirectoryInternalDirectoryable) + val, d := tkhToTFObjectDSDirectoryInternalDirectory(false, tkhCast) diags.Append(d...) - obj["maintenance_directory"] = val + obj["internal_directory"] = val } objVal, d := types.ObjectValue(attrs, obj) @@ -4172,18 +4172,18 @@ func tkhToTFObjectDSLaunchpadLaunchpadTile(recurse bool, tkh keyhubmodel.Launchp diags.Append(d...) obj["vault_record"] = val } - { - tkhCast, _ := tkh.(keyhubmodel.LaunchpadVaultRecordLaunchpadTileable) - val, d := tkhToTFObjectDSLaunchpadVaultRecordLaunchpadTile(false, tkhCast) - diags.Append(d...) - obj["vault_record_launchpad_tile"] = val - } { tkhCast, _ := tkh.(keyhubmodel.LaunchpadSsoApplicationLaunchpadTileable) val, d := tkhToTFObjectDSLaunchpadSsoApplicationLaunchpadTile(false, tkhCast) diags.Append(d...) obj["sso_application_launchpad_tile"] = val } + { + tkhCast, _ := tkh.(keyhubmodel.LaunchpadVaultRecordLaunchpadTileable) + val, d := tkhToTFObjectDSLaunchpadVaultRecordLaunchpadTile(false, tkhCast) + diags.Append(d...) + obj["vault_record_launchpad_tile"] = val + } { tkhCast, _ := tkh.(keyhubmodel.LaunchpadManualLaunchpadTileable) val, d := tkhToTFObjectDSLaunchpadManualLaunchpadTile(false, tkhCast) @@ -6878,34 +6878,34 @@ func tkhToTFObjectDSProvisioningProvisionedSystem(recurse bool, tkh keyhubmodel. } obj["username_prefix"] = types.StringPointerValue(tkh.GetUsernamePrefix()) { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningAbstractProvisionedLDAPable) - val, d := tkhToTFObjectDSProvisioningAbstractProvisionedLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureOIDCDirectoryable) + val, d := tkhToTFObjectDSProvisioningProvisionedAzureOIDCDirectory(false, tkhCast) diags.Append(d...) - obj["abstract_provisioned_ldap"] = val + obj["provisioned_azure_oidc_directory"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPable) - val, d := tkhToTFObjectDSProvisioningProvisionedLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedInternalLDAPable) + val, d := tkhToTFObjectDSProvisioningProvisionedInternalLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_ldap"] = val + obj["provisioned_internal_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureTenantable) - val, d := tkhToTFObjectDSProvisioningProvisionedAzureTenant(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningAbstractProvisionedLDAPable) + val, d := tkhToTFObjectDSProvisioningAbstractProvisionedLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_tenant"] = val + obj["abstract_provisioned_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedInternalLDAPable) - val, d := tkhToTFObjectDSProvisioningProvisionedInternalLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPable) + val, d := tkhToTFObjectDSProvisioningProvisionedLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_internal_ldap"] = val + obj["provisioned_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureOIDCDirectoryable) - val, d := tkhToTFObjectDSProvisioningProvisionedAzureOIDCDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectoryable) + val, d := tkhToTFObjectDSProvisioningProvisionedAzureSyncLDAPDirectory(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_oidc_directory"] = val + obj["provisioned_azure_sync_ldap_directory"] = val } { tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPDirectoryable) @@ -6920,10 +6920,10 @@ func tkhToTFObjectDSProvisioningProvisionedSystem(recurse bool, tkh keyhubmodel. obj["provisioned_a_d"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectoryable) - val, d := tkhToTFObjectDSProvisioningProvisionedAzureSyncLDAPDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureTenantable) + val, d := tkhToTFObjectDSProvisioningProvisionedAzureTenant(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_sync_ldap_directory"] = val + obj["provisioned_azure_tenant"] = val } objVal, d := types.ObjectValue(attrs, obj) @@ -7809,40 +7809,16 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["request_modification_request_type"] = stringerToTF(tkh.GetRequestModificationRequestType()) obj["status"] = stringerToTF(tkh.GetStatus()) { - tkhCast, _ := tkh.(keyhubmodel.RequestAbstractProvisionedSystemModificationRequestable) - val, d := tkhToTFObjectDSRequestAbstractProvisionedSystemModificationRequest(false, tkhCast) - diags.Append(d...) - obj["abstract_provisioned_system_modification_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemAdministrationRequestable) - val, d := tkhToTFObjectDSRequestTransferProvisionedSystemAdministrationRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_provisioned_system_administration_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemOwnershipRequestable) - val, d := tkhToTFObjectDSRequestTransferProvisionedSystemOwnershipRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_provisioned_system_ownership_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestPasswordResetRequestable) - val, d := tkhToTFObjectDSRequestPasswordResetRequest(false, tkhCast) - diags.Append(d...) - obj["password_reset_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestRevokeAdminRequestable) - val, d := tkhToTFObjectDSRequestRevokeAdminRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestAbstractOrganizationalUnitModificationRequestable) + val, d := tkhToTFObjectDSRequestAbstractOrganizationalUnitModificationRequest(false, tkhCast) diags.Append(d...) - obj["revoke_admin_request"] = val + obj["abstract_organizational_unit_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestRequestable) - val, d := tkhToTFObjectDSRequestGrantGroupOnSystemRequestRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupRequestable) + val, d := tkhToTFObjectDSRequestCreateGroupRequest(false, tkhCast) diags.Append(d...) - obj["grant_group_on_system_request_request"] = val + obj["create_group_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestAbstractApplicationModificationRequestable) @@ -7851,40 +7827,34 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["abstract_application_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationAdministrationRequestable) - val, d := tkhToTFObjectDSRequestTransferApplicationAdministrationRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_application_administration_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestCreateServiceAccountRequestable) - val, d := tkhToTFObjectDSRequestCreateServiceAccountRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationOwnershipRequestable) + val, d := tkhToTFObjectDSRequestTransferApplicationOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["create_service_account_request"] = val + obj["transfer_application_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveProvisionedSystemRequestable) - val, d := tkhToTFObjectDSRequestRemoveProvisionedSystemRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantClientPermissionRequestable) + val, d := tkhToTFObjectDSRequestGrantClientPermissionRequest(false, tkhCast) diags.Append(d...) - obj["remove_provisioned_system_request"] = val + obj["grant_client_permission_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestReviewAuditRequestable) - val, d := tkhToTFObjectDSRequestReviewAuditRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestJoinGroupRequestable) + val, d := tkhToTFObjectDSRequestJoinGroupRequest(false, tkhCast) diags.Append(d...) - obj["review_audit_request"] = val + obj["join_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestAbstractOrganizationalUnitModificationRequestable) - val, d := tkhToTFObjectDSRequestAbstractOrganizationalUnitModificationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestAbstractProvisionedSystemModificationRequestable) + val, d := tkhToTFObjectDSRequestAbstractProvisionedSystemModificationRequest(false, tkhCast) diags.Append(d...) - obj["abstract_organizational_unit_modification_request"] = val + obj["abstract_provisioned_system_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupRequestable) - val, d := tkhToTFObjectDSRequestCreateGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequestable) + val, d := tkhToTFObjectDSRequestTransferProvisionedSystemContentAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["create_group_request"] = val + obj["transfer_provisioned_system_content_administration_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestable) @@ -7893,34 +7863,28 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["grant_group_on_system_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestVerifyInternalAccountRequestable) - val, d := tkhToTFObjectDSRequestVerifyInternalAccountRequest(false, tkhCast) - diags.Append(d...) - obj["verify_internal_account_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantClientPermissionRequestable) - val, d := tkhToTFObjectDSRequestGrantClientPermissionRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemOwnershipRequestable) + val, d := tkhToTFObjectDSRequestTransferProvisionedSystemOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["grant_client_permission_request"] = val + obj["transfer_provisioned_system_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequestable) - val, d := tkhToTFObjectDSRequestTransferOrganizationalUnitOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantServiceAccountGroupRequestable) + val, d := tkhToTFObjectDSRequestGrantServiceAccountGroupRequest(false, tkhCast) diags.Append(d...) - obj["transfer_organizational_unit_ownership_request"] = val + obj["grant_service_account_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestSetupNestedGroupRequestable) - val, d := tkhToTFObjectDSRequestSetupNestedGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestDisable2FARequestable) + val, d := tkhToTFObjectDSRequestDisable2FARequest(false, tkhCast) diags.Append(d...) - obj["setup_nested_group_request"] = val + obj["disable2fa_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestJoinVaultRequestable) - val, d := tkhToTFObjectDSRequestJoinVaultRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveProvisionedSystemRequestable) + val, d := tkhToTFObjectDSRequestRemoveProvisionedSystemRequest(false, tkhCast) diags.Append(d...) - obj["join_vault_request"] = val + obj["remove_provisioned_system_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestTransferServiceAccountAdministrationRequestable) @@ -7929,22 +7893,22 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["transfer_service_account_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantApplicationRequestable) - val, d := tkhToTFObjectDSRequestGrantApplicationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestPasswordResetRequestable) + val, d := tkhToTFObjectDSRequestPasswordResetRequest(false, tkhCast) diags.Append(d...) - obj["grant_application_request"] = val + obj["password_reset_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantAccessRequestable) - val, d := tkhToTFObjectDSRequestGrantAccessRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferAuditorGroupRequestable) + val, d := tkhToTFObjectDSRequestTransferAuditorGroupRequest(false, tkhCast) diags.Append(d...) - obj["grant_access_request"] = val + obj["transfer_auditor_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferGroupOnSystemOwnershipRequestable) - val, d := tkhToTFObjectDSRequestTransferGroupOnSystemOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestUpdateGroupMembershipRequestable) + val, d := tkhToTFObjectDSRequestUpdateGroupMembershipRequest(false, tkhCast) diags.Append(d...) - obj["transfer_group_on_system_ownership_request"] = val + obj["update_group_membership_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestAddGroupAdminRequestable) @@ -7953,40 +7917,58 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["add_group_admin_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestExtendAccessRequestable) - val, d := tkhToTFObjectDSRequestExtendAccessRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveOrganizationalUnitRequestable) + val, d := tkhToTFObjectDSRequestRemoveOrganizationalUnitRequest(false, tkhCast) diags.Append(d...) - obj["extend_access_request"] = val + obj["remove_organizational_unit_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequestable) - val, d := tkhToTFObjectDSRequestTransferProvisionedSystemContentAdministrationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemAdministrationRequestable) + val, d := tkhToTFObjectDSRequestTransferProvisionedSystemAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["transfer_provisioned_system_content_administration_request"] = val + obj["transfer_provisioned_system_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestUpdateGroupMembershipRequestable) - val, d := tkhToTFObjectDSRequestUpdateGroupMembershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestVerifyInternalAccountRequestable) + val, d := tkhToTFObjectDSRequestVerifyInternalAccountRequest(false, tkhCast) diags.Append(d...) - obj["update_group_membership_request"] = val + obj["verify_internal_account_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferAuditorGroupRequestable) - val, d := tkhToTFObjectDSRequestTransferAuditorGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationAdministrationRequestable) + val, d := tkhToTFObjectDSRequestTransferApplicationAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["transfer_auditor_group_request"] = val + obj["transfer_application_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationOwnershipRequestable) - val, d := tkhToTFObjectDSRequestTransferApplicationOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestExtendAccessRequestable) + val, d := tkhToTFObjectDSRequestExtendAccessRequest(false, tkhCast) diags.Append(d...) - obj["transfer_application_ownership_request"] = val + obj["extend_access_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveGroupRequestable) - val, d := tkhToTFObjectDSRequestRemoveGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestRequestable) + val, d := tkhToTFObjectDSRequestGrantGroupOnSystemRequestRequest(false, tkhCast) diags.Append(d...) - obj["remove_group_request"] = val + obj["grant_group_on_system_request_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestJoinVaultRequestable) + val, d := tkhToTFObjectDSRequestJoinVaultRequest(false, tkhCast) + diags.Append(d...) + obj["join_vault_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestGrantAccessRequestable) + val, d := tkhToTFObjectDSRequestGrantAccessRequest(false, tkhCast) + diags.Append(d...) + obj["grant_access_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestRevokeAdminRequestable) + val, d := tkhToTFObjectDSRequestRevokeAdminRequest(false, tkhCast) + diags.Append(d...) + obj["revoke_admin_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestSetupAuthorizingGroupRequestable) @@ -7994,6 +7976,18 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req diags.Append(d...) obj["setup_authorizing_group_request"] = val } + { + tkhCast, _ := tkh.(keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequestable) + val, d := tkhToTFObjectDSRequestTransferOrganizationalUnitOwnershipRequest(false, tkhCast) + diags.Append(d...) + obj["transfer_organizational_unit_ownership_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestCreateServiceAccountRequestable) + val, d := tkhToTFObjectDSRequestCreateServiceAccountRequest(false, tkhCast) + diags.Append(d...) + obj["create_service_account_request"] = val + } { tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupOnSystemRequestable) val, d := tkhToTFObjectDSRequestCreateGroupOnSystemRequest(false, tkhCast) @@ -8001,34 +7995,40 @@ func tkhToTFObjectDSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["create_group_on_system_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveOrganizationalUnitRequestable) - val, d := tkhToTFObjectDSRequestRemoveOrganizationalUnitRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestReviewAuditRequestable) + val, d := tkhToTFObjectDSRequestReviewAuditRequest(false, tkhCast) diags.Append(d...) - obj["remove_organizational_unit_request"] = val + obj["review_audit_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantServiceAccountGroupRequestable) - val, d := tkhToTFObjectDSRequestGrantServiceAccountGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestEnableTechnicalAdministrationRequestable) + val, d := tkhToTFObjectDSRequestEnableTechnicalAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["grant_service_account_group_request"] = val + obj["enable_technical_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestDisable2FARequestable) - val, d := tkhToTFObjectDSRequestDisable2FARequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestSetupNestedGroupRequestable) + val, d := tkhToTFObjectDSRequestSetupNestedGroupRequest(false, tkhCast) diags.Append(d...) - obj["disable2fa_request"] = val + obj["setup_nested_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestJoinGroupRequestable) - val, d := tkhToTFObjectDSRequestJoinGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferGroupOnSystemOwnershipRequestable) + val, d := tkhToTFObjectDSRequestTransferGroupOnSystemOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["join_group_request"] = val + obj["transfer_group_on_system_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestEnableTechnicalAdministrationRequestable) - val, d := tkhToTFObjectDSRequestEnableTechnicalAdministrationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveGroupRequestable) + val, d := tkhToTFObjectDSRequestRemoveGroupRequest(false, tkhCast) diags.Append(d...) - obj["enable_technical_administration_request"] = val + obj["remove_group_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestGrantApplicationRequestable) + val, d := tkhToTFObjectDSRequestGrantApplicationRequest(false, tkhCast) + diags.Append(d...) + obj["grant_application_request"] = val } objVal, d := types.ObjectValue(attrs, obj) diff --git a/internal/provider/full-tkh-to-tf-rs.go b/internal/provider/full-tkh-to-tf-rs.go index ec5be40..2b741fe 100644 --- a/internal/provider/full-tkh-to-tf-rs.go +++ b/internal/provider/full-tkh-to-tf-rs.go @@ -1894,10 +1894,10 @@ func tkhToTFObjectRSDirectoryAccountDirectory(recurse bool, tkh keyhubmodel.Dire obj["rotating_password"] = stringerToTF(tkh.GetRotatingPassword()) obj["username_customizable"] = types.BoolPointerValue(tkh.GetUsernameCustomizable()) { - tkhCast, _ := tkh.(keyhubmodel.DirectoryInternalDirectoryable) - val, d := tkhToTFObjectRSDirectoryInternalDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.DirectoryMaintenanceDirectoryable) + val, d := tkhToTFObjectRSDirectoryMaintenanceDirectory(false, tkhCast) diags.Append(d...) - obj["internal_directory"] = val + obj["maintenance_directory"] = val } { tkhCast, _ := tkh.(keyhubmodel.DirectoryOIDCDirectoryable) @@ -1912,10 +1912,10 @@ func tkhToTFObjectRSDirectoryAccountDirectory(recurse bool, tkh keyhubmodel.Dire obj["l_d_a_p_directory"] = val } { - tkhCast, _ := tkh.(keyhubmodel.DirectoryMaintenanceDirectoryable) - val, d := tkhToTFObjectRSDirectoryMaintenanceDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.DirectoryInternalDirectoryable) + val, d := tkhToTFObjectRSDirectoryInternalDirectory(false, tkhCast) diags.Append(d...) - obj["maintenance_directory"] = val + obj["internal_directory"] = val } objVal, d := types.ObjectValue(attrs, obj) @@ -3902,18 +3902,18 @@ func tkhToTFObjectRSLaunchpadLaunchpadTile(recurse bool, tkh keyhubmodel.Launchp obj["logo"] = val } obj["vault_record_uuid"] = withUuidToTF(tkh.GetVaultRecord()) - { - tkhCast, _ := tkh.(keyhubmodel.LaunchpadVaultRecordLaunchpadTileable) - val, d := tkhToTFObjectRSLaunchpadVaultRecordLaunchpadTile(false, tkhCast) - diags.Append(d...) - obj["vault_record_launchpad_tile"] = val - } { tkhCast, _ := tkh.(keyhubmodel.LaunchpadSsoApplicationLaunchpadTileable) val, d := tkhToTFObjectRSLaunchpadSsoApplicationLaunchpadTile(false, tkhCast) diags.Append(d...) obj["sso_application_launchpad_tile"] = val } + { + tkhCast, _ := tkh.(keyhubmodel.LaunchpadVaultRecordLaunchpadTileable) + val, d := tkhToTFObjectRSLaunchpadVaultRecordLaunchpadTile(false, tkhCast) + diags.Append(d...) + obj["vault_record_launchpad_tile"] = val + } { tkhCast, _ := tkh.(keyhubmodel.LaunchpadManualLaunchpadTileable) val, d := tkhToTFObjectRSLaunchpadManualLaunchpadTile(false, tkhCast) @@ -6258,34 +6258,34 @@ func tkhToTFObjectRSProvisioningProvisionedSystem(recurse bool, tkh keyhubmodel. obj["technical_administrator_uuid"] = withUuidToTF(tkh.GetTechnicalAdministrator()) obj["username_prefix"] = types.StringPointerValue(tkh.GetUsernamePrefix()) { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningAbstractProvisionedLDAPable) - val, d := tkhToTFObjectRSProvisioningAbstractProvisionedLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureOIDCDirectoryable) + val, d := tkhToTFObjectRSProvisioningProvisionedAzureOIDCDirectory(false, tkhCast) diags.Append(d...) - obj["abstract_provisioned_ldap"] = val + obj["provisioned_azure_oidc_directory"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPable) - val, d := tkhToTFObjectRSProvisioningProvisionedLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedInternalLDAPable) + val, d := tkhToTFObjectRSProvisioningProvisionedInternalLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_ldap"] = val + obj["provisioned_internal_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureTenantable) - val, d := tkhToTFObjectRSProvisioningProvisionedAzureTenant(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningAbstractProvisionedLDAPable) + val, d := tkhToTFObjectRSProvisioningAbstractProvisionedLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_tenant"] = val + obj["abstract_provisioned_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedInternalLDAPable) - val, d := tkhToTFObjectRSProvisioningProvisionedInternalLDAP(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPable) + val, d := tkhToTFObjectRSProvisioningProvisionedLDAP(false, tkhCast) diags.Append(d...) - obj["provisioned_internal_ldap"] = val + obj["provisioned_ldap"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureOIDCDirectoryable) - val, d := tkhToTFObjectRSProvisioningProvisionedAzureOIDCDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectoryable) + val, d := tkhToTFObjectRSProvisioningProvisionedAzureSyncLDAPDirectory(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_oidc_directory"] = val + obj["provisioned_azure_sync_ldap_directory"] = val } { tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedLDAPDirectoryable) @@ -6300,10 +6300,10 @@ func tkhToTFObjectRSProvisioningProvisionedSystem(recurse bool, tkh keyhubmodel. obj["provisioned_a_d"] = val } { - tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureSyncLDAPDirectoryable) - val, d := tkhToTFObjectRSProvisioningProvisionedAzureSyncLDAPDirectory(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.ProvisioningProvisionedAzureTenantable) + val, d := tkhToTFObjectRSProvisioningProvisionedAzureTenant(false, tkhCast) diags.Append(d...) - obj["provisioned_azure_sync_ldap_directory"] = val + obj["provisioned_azure_tenant"] = val } objVal, d := types.ObjectValue(attrs, obj) @@ -7149,40 +7149,16 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["request_modification_request_type"] = stringerToTF(tkh.GetRequestModificationRequestType()) obj["status"] = stringerToTF(tkh.GetStatus()) { - tkhCast, _ := tkh.(keyhubmodel.RequestAbstractProvisionedSystemModificationRequestable) - val, d := tkhToTFObjectRSRequestAbstractProvisionedSystemModificationRequest(false, tkhCast) - diags.Append(d...) - obj["abstract_provisioned_system_modification_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemAdministrationRequestable) - val, d := tkhToTFObjectRSRequestTransferProvisionedSystemAdministrationRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_provisioned_system_administration_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemOwnershipRequestable) - val, d := tkhToTFObjectRSRequestTransferProvisionedSystemOwnershipRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_provisioned_system_ownership_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestPasswordResetRequestable) - val, d := tkhToTFObjectRSRequestPasswordResetRequest(false, tkhCast) - diags.Append(d...) - obj["password_reset_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestRevokeAdminRequestable) - val, d := tkhToTFObjectRSRequestRevokeAdminRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestAbstractOrganizationalUnitModificationRequestable) + val, d := tkhToTFObjectRSRequestAbstractOrganizationalUnitModificationRequest(false, tkhCast) diags.Append(d...) - obj["revoke_admin_request"] = val + obj["abstract_organizational_unit_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestRequestable) - val, d := tkhToTFObjectRSRequestGrantGroupOnSystemRequestRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupRequestable) + val, d := tkhToTFObjectRSRequestCreateGroupRequest(false, tkhCast) diags.Append(d...) - obj["grant_group_on_system_request_request"] = val + obj["create_group_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestAbstractApplicationModificationRequestable) @@ -7191,40 +7167,34 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["abstract_application_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationAdministrationRequestable) - val, d := tkhToTFObjectRSRequestTransferApplicationAdministrationRequest(false, tkhCast) - diags.Append(d...) - obj["transfer_application_administration_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestCreateServiceAccountRequestable) - val, d := tkhToTFObjectRSRequestCreateServiceAccountRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationOwnershipRequestable) + val, d := tkhToTFObjectRSRequestTransferApplicationOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["create_service_account_request"] = val + obj["transfer_application_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveProvisionedSystemRequestable) - val, d := tkhToTFObjectRSRequestRemoveProvisionedSystemRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantClientPermissionRequestable) + val, d := tkhToTFObjectRSRequestGrantClientPermissionRequest(false, tkhCast) diags.Append(d...) - obj["remove_provisioned_system_request"] = val + obj["grant_client_permission_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestReviewAuditRequestable) - val, d := tkhToTFObjectRSRequestReviewAuditRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestJoinGroupRequestable) + val, d := tkhToTFObjectRSRequestJoinGroupRequest(false, tkhCast) diags.Append(d...) - obj["review_audit_request"] = val + obj["join_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestAbstractOrganizationalUnitModificationRequestable) - val, d := tkhToTFObjectRSRequestAbstractOrganizationalUnitModificationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestAbstractProvisionedSystemModificationRequestable) + val, d := tkhToTFObjectRSRequestAbstractProvisionedSystemModificationRequest(false, tkhCast) diags.Append(d...) - obj["abstract_organizational_unit_modification_request"] = val + obj["abstract_provisioned_system_modification_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupRequestable) - val, d := tkhToTFObjectRSRequestCreateGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequestable) + val, d := tkhToTFObjectRSRequestTransferProvisionedSystemContentAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["create_group_request"] = val + obj["transfer_provisioned_system_content_administration_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestable) @@ -7233,34 +7203,28 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["grant_group_on_system_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestVerifyInternalAccountRequestable) - val, d := tkhToTFObjectRSRequestVerifyInternalAccountRequest(false, tkhCast) - diags.Append(d...) - obj["verify_internal_account_request"] = val - } - { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantClientPermissionRequestable) - val, d := tkhToTFObjectRSRequestGrantClientPermissionRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemOwnershipRequestable) + val, d := tkhToTFObjectRSRequestTransferProvisionedSystemOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["grant_client_permission_request"] = val + obj["transfer_provisioned_system_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequestable) - val, d := tkhToTFObjectRSRequestTransferOrganizationalUnitOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantServiceAccountGroupRequestable) + val, d := tkhToTFObjectRSRequestGrantServiceAccountGroupRequest(false, tkhCast) diags.Append(d...) - obj["transfer_organizational_unit_ownership_request"] = val + obj["grant_service_account_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestSetupNestedGroupRequestable) - val, d := tkhToTFObjectRSRequestSetupNestedGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestDisable2FARequestable) + val, d := tkhToTFObjectRSRequestDisable2FARequest(false, tkhCast) diags.Append(d...) - obj["setup_nested_group_request"] = val + obj["disable2fa_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestJoinVaultRequestable) - val, d := tkhToTFObjectRSRequestJoinVaultRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveProvisionedSystemRequestable) + val, d := tkhToTFObjectRSRequestRemoveProvisionedSystemRequest(false, tkhCast) diags.Append(d...) - obj["join_vault_request"] = val + obj["remove_provisioned_system_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestTransferServiceAccountAdministrationRequestable) @@ -7269,22 +7233,22 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["transfer_service_account_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantApplicationRequestable) - val, d := tkhToTFObjectRSRequestGrantApplicationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestPasswordResetRequestable) + val, d := tkhToTFObjectRSRequestPasswordResetRequest(false, tkhCast) diags.Append(d...) - obj["grant_application_request"] = val + obj["password_reset_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantAccessRequestable) - val, d := tkhToTFObjectRSRequestGrantAccessRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferAuditorGroupRequestable) + val, d := tkhToTFObjectRSRequestTransferAuditorGroupRequest(false, tkhCast) diags.Append(d...) - obj["grant_access_request"] = val + obj["transfer_auditor_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferGroupOnSystemOwnershipRequestable) - val, d := tkhToTFObjectRSRequestTransferGroupOnSystemOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestUpdateGroupMembershipRequestable) + val, d := tkhToTFObjectRSRequestUpdateGroupMembershipRequest(false, tkhCast) diags.Append(d...) - obj["transfer_group_on_system_ownership_request"] = val + obj["update_group_membership_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestAddGroupAdminRequestable) @@ -7293,40 +7257,58 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["add_group_admin_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestExtendAccessRequestable) - val, d := tkhToTFObjectRSRequestExtendAccessRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveOrganizationalUnitRequestable) + val, d := tkhToTFObjectRSRequestRemoveOrganizationalUnitRequest(false, tkhCast) diags.Append(d...) - obj["extend_access_request"] = val + obj["remove_organizational_unit_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemContentAdministrationRequestable) - val, d := tkhToTFObjectRSRequestTransferProvisionedSystemContentAdministrationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferProvisionedSystemAdministrationRequestable) + val, d := tkhToTFObjectRSRequestTransferProvisionedSystemAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["transfer_provisioned_system_content_administration_request"] = val + obj["transfer_provisioned_system_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestUpdateGroupMembershipRequestable) - val, d := tkhToTFObjectRSRequestUpdateGroupMembershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestVerifyInternalAccountRequestable) + val, d := tkhToTFObjectRSRequestVerifyInternalAccountRequest(false, tkhCast) diags.Append(d...) - obj["update_group_membership_request"] = val + obj["verify_internal_account_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferAuditorGroupRequestable) - val, d := tkhToTFObjectRSRequestTransferAuditorGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationAdministrationRequestable) + val, d := tkhToTFObjectRSRequestTransferApplicationAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["transfer_auditor_group_request"] = val + obj["transfer_application_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestTransferApplicationOwnershipRequestable) - val, d := tkhToTFObjectRSRequestTransferApplicationOwnershipRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestExtendAccessRequestable) + val, d := tkhToTFObjectRSRequestExtendAccessRequest(false, tkhCast) diags.Append(d...) - obj["transfer_application_ownership_request"] = val + obj["extend_access_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveGroupRequestable) - val, d := tkhToTFObjectRSRequestRemoveGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestGrantGroupOnSystemRequestRequestable) + val, d := tkhToTFObjectRSRequestGrantGroupOnSystemRequestRequest(false, tkhCast) diags.Append(d...) - obj["remove_group_request"] = val + obj["grant_group_on_system_request_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestJoinVaultRequestable) + val, d := tkhToTFObjectRSRequestJoinVaultRequest(false, tkhCast) + diags.Append(d...) + obj["join_vault_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestGrantAccessRequestable) + val, d := tkhToTFObjectRSRequestGrantAccessRequest(false, tkhCast) + diags.Append(d...) + obj["grant_access_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestRevokeAdminRequestable) + val, d := tkhToTFObjectRSRequestRevokeAdminRequest(false, tkhCast) + diags.Append(d...) + obj["revoke_admin_request"] = val } { tkhCast, _ := tkh.(keyhubmodel.RequestSetupAuthorizingGroupRequestable) @@ -7334,6 +7316,18 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req diags.Append(d...) obj["setup_authorizing_group_request"] = val } + { + tkhCast, _ := tkh.(keyhubmodel.RequestTransferOrganizationalUnitOwnershipRequestable) + val, d := tkhToTFObjectRSRequestTransferOrganizationalUnitOwnershipRequest(false, tkhCast) + diags.Append(d...) + obj["transfer_organizational_unit_ownership_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestCreateServiceAccountRequestable) + val, d := tkhToTFObjectRSRequestCreateServiceAccountRequest(false, tkhCast) + diags.Append(d...) + obj["create_service_account_request"] = val + } { tkhCast, _ := tkh.(keyhubmodel.RequestCreateGroupOnSystemRequestable) val, d := tkhToTFObjectRSRequestCreateGroupOnSystemRequest(false, tkhCast) @@ -7341,34 +7335,40 @@ func tkhToTFObjectRSRequestModificationRequest(recurse bool, tkh keyhubmodel.Req obj["create_group_on_system_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestRemoveOrganizationalUnitRequestable) - val, d := tkhToTFObjectRSRequestRemoveOrganizationalUnitRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestReviewAuditRequestable) + val, d := tkhToTFObjectRSRequestReviewAuditRequest(false, tkhCast) diags.Append(d...) - obj["remove_organizational_unit_request"] = val + obj["review_audit_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestGrantServiceAccountGroupRequestable) - val, d := tkhToTFObjectRSRequestGrantServiceAccountGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestEnableTechnicalAdministrationRequestable) + val, d := tkhToTFObjectRSRequestEnableTechnicalAdministrationRequest(false, tkhCast) diags.Append(d...) - obj["grant_service_account_group_request"] = val + obj["enable_technical_administration_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestDisable2FARequestable) - val, d := tkhToTFObjectRSRequestDisable2FARequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestSetupNestedGroupRequestable) + val, d := tkhToTFObjectRSRequestSetupNestedGroupRequest(false, tkhCast) diags.Append(d...) - obj["disable2fa_request"] = val + obj["setup_nested_group_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestJoinGroupRequestable) - val, d := tkhToTFObjectRSRequestJoinGroupRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestTransferGroupOnSystemOwnershipRequestable) + val, d := tkhToTFObjectRSRequestTransferGroupOnSystemOwnershipRequest(false, tkhCast) diags.Append(d...) - obj["join_group_request"] = val + obj["transfer_group_on_system_ownership_request"] = val } { - tkhCast, _ := tkh.(keyhubmodel.RequestEnableTechnicalAdministrationRequestable) - val, d := tkhToTFObjectRSRequestEnableTechnicalAdministrationRequest(false, tkhCast) + tkhCast, _ := tkh.(keyhubmodel.RequestRemoveGroupRequestable) + val, d := tkhToTFObjectRSRequestRemoveGroupRequest(false, tkhCast) diags.Append(d...) - obj["enable_technical_administration_request"] = val + obj["remove_group_request"] = val + } + { + tkhCast, _ := tkh.(keyhubmodel.RequestGrantApplicationRequestable) + val, d := tkhToTFObjectRSRequestGrantApplicationRequest(false, tkhCast) + diags.Append(d...) + obj["grant_application_request"] = val } objVal, d := types.ObjectValue(attrs, obj) diff --git a/internal/provider/provider.go b/internal/provider/provider.go index 86a8232..8984ffb 100644 --- a/internal/provider/provider.go +++ b/internal/provider/provider.go @@ -172,8 +172,9 @@ func (p *KeyHubProvider) Configure(ctx context.Context, req provider.ConfigureRe func (p *KeyHubProvider) Resources(ctx context.Context) []func() resource.Resource { return []func() resource.Resource{ + NewGroupVaultrecordResource, NewGroupResource, - NewVaultRecordResource, + NewGrouponsystemResource, } } diff --git a/internal/provider/group_resource.go b/internal/provider/resource-group.go similarity index 52% rename from internal/provider/group_resource.go rename to internal/provider/resource-group.go index 062b340..2150254 100644 --- a/internal/provider/group_resource.go +++ b/internal/provider/resource-group.go @@ -1,5 +1,4 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 +// Code generated by "terraform-provider-keyhub-generator"; DO NOT EDIT. package provider @@ -13,8 +12,8 @@ import ( "github.com/hashicorp/terraform-plugin-framework/types" "github.com/hashicorp/terraform-plugin-log/tflog" keyhub "github.com/topicuskeyhub/sdk-go" - keyhubgroup "github.com/topicuskeyhub/sdk-go/group" - keyhubmodel "github.com/topicuskeyhub/sdk-go/models" + keyhubreq "github.com/topicuskeyhub/sdk-go/group" + keyhubmodels "github.com/topicuskeyhub/sdk-go/models" ) // Ensure provider defined types fully satisfy framework interfaces. @@ -28,19 +27,18 @@ func NewGroupResource() resource.Resource { return &groupResource{} } -// groupResource defines the resource implementation. type groupResource struct { client *keyhub.KeyHubClient } func (r *groupResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) { resp.TypeName = ProviderName + "_group" + tflog.Info(ctx, "Registred resource "+resp.TypeName) } func (r *groupResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) { resp.Schema = schema.Schema{ - MarkdownDescription: "Group resource", - Attributes: resourceSchemaAttrsGroupGroup(true), + Attributes: resourceSchemaAttrsGroupGroup(true), } } @@ -54,7 +52,7 @@ func (r *groupResource) Configure(ctx context.Context, req resource.ConfigureReq if !ok { resp.Diagnostics.AddError( - "Unexpected Resource Configure Type", + "Unexpected Data Source Configure Type", fmt.Sprintf("Expected *keyhub.KeyHubClient, got: %T. Please report this issue to the provider developers.", req.ProviderData), ) @@ -78,31 +76,37 @@ func (r *groupResource) Create(ctx context.Context, req resource.CreateRequest, return } - newgroup, diags := tfObjectToTKHRSGroupGroup(ctx, true, obj) + newTkh, diags := tfObjectToTKHRSGroupGroup(ctx, true, obj) resp.Diagnostics.Append(diags...) if resp.Diagnostics.HasError() { return } - ctx = tflog.SetField(ctx, "keyhub_group_name", data.Name.ValueString()) - tflog.Debug(ctx, "Creating Topicus KeyHub group") - wrapper := keyhubmodel.NewGroupGroupLinkableWrapper() - wrapper.SetItems([]keyhubmodel.GroupGroupable{newgroup}) - createdwrapper, err := r.client.Group().Post(ctx, wrapper, nil) - if err != nil { - resp.Diagnostics.AddError("Client Error", fmt.Sprintf("Unable to create group, got error: %s", err)) + tflog.Info(ctx, "Creating Topicus KeyHub group") + newWrapper := keyhubmodels.NewGroupGroupLinkableWrapper() + newWrapper.SetItems([]keyhubmodels.GroupGroupable{newTkh}) + wrapper, err := r.client.Group().Post( + ctx, newWrapper, &keyhubreq.GroupRequestBuilderPostRequestConfiguration{ + QueryParameters: &keyhubreq.GroupRequestBuilderPostQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + tkh, diags := findFirst[keyhubmodels.GroupGroupable](ctx, wrapper, "group", nil, err) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { return } - group := createdwrapper.GetItems()[0] - tfGroup, diags := tkhToTFObjectRSGroupGroup(true, group) + tf, diags := tkhToTFObjectRSGroupGroup(true, tkh) resp.Diagnostics.Append(diags...) if resp.Diagnostics.HasError() { return } - fillDataStructFromTFObjectRSGroupGroup(&data, tfGroup) + fillDataStructFromTFObjectRSGroupGroup(&data, tf) + + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) - tflog.Trace(ctx, "Created a new Topicus KeyHub group") + tflog.Info(ctx, "Created a new Topicus KeyHub group") resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) } @@ -113,69 +117,37 @@ func (r *groupResource) Read(ctx context.Context, req resource.ReadRequest, resp return } - ctx = tflog.SetField(ctx, "keyhub_group_uuid", data.UUID.ValueString()) ctx = context.WithValue(ctx, keyHubClientKey, r.client) - tflog.Debug(ctx, "Reading group from Topicus KeyHub by UUID") - groups, err := r.client.Group().Get(ctx, &keyhubgroup.GroupRequestBuilderGetRequestConfiguration{ - QueryParameters: &keyhubgroup.GroupRequestBuilderGetQueryParameters{ - Uuid: []string{data.UUID.ValueString()}, - }, - }) - if err != nil { - resp.Diagnostics.AddError("Client Error", fmt.Sprintf("Unable to read group, got error: %s", err)) - return - } - if len(groups.GetItems()) == 0 { - resp.Diagnostics.AddError("Client Error", fmt.Sprintf("Unable to find group with UUID %s", data.UUID.ValueString())) + tflog.Info(ctx, "Reading group from Topicus KeyHub") + tkh, err := r.client.Group().ByGroupidInt64(getSelfLink(data.Links).ID.ValueInt64()).Get( + ctx, &keyhubreq.WithGroupItemRequestBuilderGetRequestConfiguration{ + QueryParameters: &keyhubreq.WithGroupItemRequestBuilderGetQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + + if !isHttpStatusCodeOk(ctx, -1, err, &resp.Diagnostics) { return } - group := groups.GetItems()[0] - tfGroup, diags := tkhToTFObjectRSGroupGroup(true, group) + + tf, diags := tkhToTFObjectRSGroupGroup(true, tkh) resp.Diagnostics.Append(diags...) if resp.Diagnostics.HasError() { return } - fillDataStructFromTFObjectRSGroupGroup(&data, tfGroup) + fillDataStructFromTFObjectRSGroupGroup(&data, tf) - // Save data into Terraform state resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) } func (r *groupResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) { - var data groupGroupDataRS - resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - // If applicable, this is a great opportunity to initialize any necessary - // provider client data and make a call using it. - // httpResp, err := r.client.Do(httpReq) - // if err != nil { - // resp.Diagnostics.AddError("Client Error", fmt.Sprintf("Unable to update example, got error: %s", err)) - // return - // } - - // Save updated data into Terraform state - resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) + resp.Diagnostics.AddError("Cannot update a group", "Topicus KeyHub does not support updating a group via Terraform. The requested changes are not applied.") } func (r *groupResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) { - var data groupGroupDataRS - resp.Diagnostics.Append(req.State.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - // If applicable, this is a great opportunity to initialize any necessary - // provider client data and make a call using it. - // httpResp, err := r.client.Do(httpReq) - // if err != nil { - // resp.Diagnostics.AddError("Client Error", fmt.Sprintf("Unable to delete example, got error: %s", err)) - // return - // } + resp.Diagnostics.AddError("Cannot delete a group", "Topicus KeyHub does not support deleting a group via Terraform. The requested changes are not applied.") } func (r *groupResource) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) { - resource.ImportStatePassthroughID(ctx, path.Root("id"), req, resp) + resource.ImportStatePassthroughID(ctx, path.Root("uuid"), req, resp) } diff --git a/internal/provider/resource-group_vaultrecord.go b/internal/provider/resource-group_vaultrecord.go new file mode 100644 index 0000000..72f4595 --- /dev/null +++ b/internal/provider/resource-group_vaultrecord.go @@ -0,0 +1,225 @@ +// Code generated by "terraform-provider-keyhub-generator"; DO NOT EDIT. + +package provider + +import ( + "context" + "fmt" + + "github.com/hashicorp/terraform-plugin-framework/path" + "github.com/hashicorp/terraform-plugin-framework/resource" + "github.com/hashicorp/terraform-plugin-framework/resource/schema" + "github.com/hashicorp/terraform-plugin-framework/types" + "github.com/hashicorp/terraform-plugin-log/tflog" + keyhub "github.com/topicuskeyhub/sdk-go" + keyhubreq "github.com/topicuskeyhub/sdk-go/group" + keyhubmodels "github.com/topicuskeyhub/sdk-go/models" +) + +// Ensure provider defined types fully satisfy framework interfaces. +var ( + _ resource.Resource = &groupVaultrecordResource{} + _ resource.ResourceWithImportState = &groupVaultrecordResource{} + _ resource.ResourceWithConfigure = &groupVaultrecordResource{} +) + +func NewGroupVaultrecordResource() resource.Resource { + return &groupVaultrecordResource{} +} + +type groupVaultrecordResource struct { + client *keyhub.KeyHubClient +} + +func (r *groupVaultrecordResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) { + resp.TypeName = ProviderName + "_group_vaultrecord" + tflog.Info(ctx, "Registred resource "+resp.TypeName) +} + +func (r *groupVaultrecordResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) { + resp.Schema = schema.Schema{ + Attributes: resourceSchemaAttrsGroupVaultVaultRecord(true), + } +} + +func (r *groupVaultrecordResource) Configure(ctx context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) { + // Prevent panic if the provider has not been configured. + if req.ProviderData == nil { + return + } + + client, ok := req.ProviderData.(*keyhub.KeyHubClient) + + if !ok { + resp.Diagnostics.AddError( + "Unexpected Data Source Configure Type", + fmt.Sprintf("Expected *keyhub.KeyHubClient, got: %T. Please report this issue to the provider developers.", req.ProviderData), + ) + + return + } + + r.client = client +} + +func (r *groupVaultrecordResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) { + var data groupVaultVaultRecordDataRS + resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + obj, diags := types.ObjectValueFrom(ctx, groupVaultVaultRecordAttrTypesRSRecurse, data) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + newTkh, diags := tfObjectToTKHRSGroupVaultVaultRecord(ctx, true, obj) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tflog.Info(ctx, "Creating Topicus KeyHub group_vaultrecord") + newWrapper := keyhubmodels.NewVaultVaultRecordLinkableWrapper() + newWrapper.SetItems([]keyhubmodels.VaultVaultRecordable{newTkh}) + tkhParent, diags := findGroupGroupPrimerByUUID(ctx, data.GroupUUID.ValueStringPointer()) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + wrapper, err := r.client.Group().ByGroupidInt64(*tkhParent.GetLinks()[0].GetId()).Vault().Record().Post( + ctx, newWrapper, &keyhubreq.ItemVaultRecordRequestBuilderPostRequestConfiguration{ + QueryParameters: &keyhubreq.ItemVaultRecordRequestBuilderPostQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + tkh, diags := findFirst[keyhubmodels.VaultVaultRecordable](ctx, wrapper, "group_vaultrecord", nil, err) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + tf = setAttributeValue(ctx, tf, "group_uuid", types.StringValue(data.GroupUUID.ValueString())) + fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) + + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) + + tflog.Info(ctx, "Created a new Topicus KeyHub group_vaultrecord") + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) +} + +func (r *groupVaultrecordResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) { + var data groupVaultVaultRecordDataRS + resp.Diagnostics.Append(req.State.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + tflog.Info(ctx, "Reading group_vaultrecord from Topicus KeyHub") + tkhParent, diags := findGroupGroupPrimerByUUID(ctx, data.GroupUUID.ValueStringPointer()) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tkh, err := r.client.Group().ByGroupidInt64(*tkhParent.GetLinks()[0].GetId()).Vault().Record().ByRecordidInt64(getSelfLink(data.Links).ID.ValueInt64()).Get( + ctx, &keyhubreq.ItemVaultRecordWithRecordItemRequestBuilderGetRequestConfiguration{ + QueryParameters: &keyhubreq.ItemVaultRecordWithRecordItemRequestBuilderGetQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + + if !isHttpStatusCodeOk(ctx, -1, err, &resp.Diagnostics) { + return + } + + tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + tf = setAttributeValue(ctx, tf, "group_uuid", types.StringValue(data.GroupUUID.ValueString())) + fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) + + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) +} + +func (r *groupVaultrecordResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) { + var data groupVaultVaultRecordDataRS + resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + obj, diags := types.ObjectValueFrom(ctx, groupVaultVaultRecordAttrTypesRSRecurse, data) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + newTkh, diags := tfObjectToTKHRSGroupVaultVaultRecord(ctx, true, obj) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tflog.Info(ctx, "Updating Topicus KeyHub group_vaultrecord") + tkhParent, diags := findGroupGroupPrimerByUUID(ctx, data.GroupUUID.ValueStringPointer()) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tkh, err := r.client.Group().ByGroupidInt64(*tkhParent.GetLinks()[0].GetId()).Vault().Record().ByRecordidInt64(getSelfLink(data.Links).ID.ValueInt64()).Put( + ctx, newTkh, &keyhubreq.ItemVaultRecordWithRecordItemRequestBuilderPutRequestConfiguration{ + QueryParameters: &keyhubreq.ItemVaultRecordWithRecordItemRequestBuilderPutQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + + if !isHttpStatusCodeOk(ctx, -1, err, &resp.Diagnostics) { + return + } + + tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + tf = setAttributeValue(ctx, tf, "group_uuid", types.StringValue(data.GroupUUID.ValueString())) + fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) + + tflog.Info(ctx, "Updated a Topicus KeyHub group_vaultrecord") + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) +} + +func (r *groupVaultrecordResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) { + var data groupVaultVaultRecordDataRS + resp.Diagnostics.Append(req.State.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + tflog.Info(ctx, "Deleting group_vaultrecord from Topicus KeyHub") + err := r.client.Group().ByGroupidInt64(-1).Vault().Record().ByRecordidInt64(-1).WithUrl(getSelfLink(data.Links).Href.ValueString()).Delete(ctx, nil) + if !isHttpStatusCodeOk(ctx, 404, err, &resp.Diagnostics) { + return + } + tflog.Info(ctx, "Deleted group_vaultrecord from Topicus KeyHub") +} + +func (r *groupVaultrecordResource) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) { + resource.ImportStatePassthroughID(ctx, path.Root("uuid"), req, resp) +} diff --git a/internal/provider/resource-grouponsystem.go b/internal/provider/resource-grouponsystem.go new file mode 100644 index 0000000..7ca012a --- /dev/null +++ b/internal/provider/resource-grouponsystem.go @@ -0,0 +1,167 @@ +// Code generated by "terraform-provider-keyhub-generator"; DO NOT EDIT. + +package provider + +import ( + "context" + "fmt" + + "github.com/hashicorp/terraform-plugin-framework/path" + "github.com/hashicorp/terraform-plugin-framework/resource" + "github.com/hashicorp/terraform-plugin-framework/resource/schema" + "github.com/hashicorp/terraform-plugin-framework/types" + "github.com/hashicorp/terraform-plugin-log/tflog" + keyhub "github.com/topicuskeyhub/sdk-go" + keyhubmodels "github.com/topicuskeyhub/sdk-go/models" + keyhubreq "github.com/topicuskeyhub/sdk-go/system" +) + +// Ensure provider defined types fully satisfy framework interfaces. +var ( + _ resource.Resource = &grouponsystemResource{} + _ resource.ResourceWithImportState = &grouponsystemResource{} + _ resource.ResourceWithConfigure = &grouponsystemResource{} +) + +func NewGrouponsystemResource() resource.Resource { + return &grouponsystemResource{} +} + +type grouponsystemResource struct { + client *keyhub.KeyHubClient +} + +func (r *grouponsystemResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) { + resp.TypeName = ProviderName + "_grouponsystem" + tflog.Info(ctx, "Registred resource "+resp.TypeName) +} + +func (r *grouponsystemResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) { + resp.Schema = schema.Schema{ + Attributes: resourceSchemaAttrsNestedProvisioningGroupOnSystem(true), + } +} + +func (r *grouponsystemResource) Configure(ctx context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) { + // Prevent panic if the provider has not been configured. + if req.ProviderData == nil { + return + } + + client, ok := req.ProviderData.(*keyhub.KeyHubClient) + + if !ok { + resp.Diagnostics.AddError( + "Unexpected Data Source Configure Type", + fmt.Sprintf("Expected *keyhub.KeyHubClient, got: %T. Please report this issue to the provider developers.", req.ProviderData), + ) + + return + } + + r.client = client +} + +func (r *grouponsystemResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) { + var data nestedProvisioningGroupOnSystemDataRS + resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + obj, diags := types.ObjectValueFrom(ctx, nestedProvisioningGroupOnSystemAttrTypesRSRecurse, data) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + newTkh, diags := tfObjectToTKHRSNestedProvisioningGroupOnSystem(ctx, true, obj) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tflog.Info(ctx, "Creating Topicus KeyHub grouponsystem") + newWrapper := keyhubmodels.NewProvisioningGroupOnSystemLinkableWrapper() + newWrapper.SetItems([]keyhubmodels.ProvisioningGroupOnSystemable{newTkh}) + tkhParent, diags := findProvisioningProvisionedSystemPrimerByUUID(ctx, data.SystemUUID.ValueStringPointer()) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + wrapper, err := r.client.System().BySystemidInt64(*tkhParent.GetLinks()[0].GetId()).Group().Post( + ctx, newWrapper, &keyhubreq.ItemGroupRequestBuilderPostRequestConfiguration{ + QueryParameters: &keyhubreq.ItemGroupRequestBuilderPostQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + tkh, diags := findFirst[keyhubmodels.ProvisioningGroupOnSystemable](ctx, wrapper, "grouponsystem", nil, err) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tf, diags := tkhToTFObjectRSNestedProvisioningGroupOnSystem(true, tkh) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + tf = setAttributeValue(ctx, tf, "system_uuid", types.StringValue(data.SystemUUID.ValueString())) + fillDataStructFromTFObjectRSNestedProvisioningGroupOnSystem(&data, tf) + + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) + + tflog.Info(ctx, "Created a new Topicus KeyHub grouponsystem") + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) +} + +func (r *grouponsystemResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) { + var data nestedProvisioningGroupOnSystemDataRS + resp.Diagnostics.Append(req.State.Get(ctx, &data)...) + if resp.Diagnostics.HasError() { + return + } + + ctx = context.WithValue(ctx, keyHubClientKey, r.client) + tflog.Info(ctx, "Reading grouponsystem from Topicus KeyHub") + tkhParent, diags := findProvisioningProvisionedSystemPrimerByUUID(ctx, data.SystemUUID.ValueStringPointer()) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + + tkh, err := r.client.System().BySystemidInt64(*tkhParent.GetLinks()[0].GetId()).Group().ByGroupidInt64(getSelfLink(data.Links).ID.ValueInt64()).Get( + ctx, &keyhubreq.ItemGroupWithGroupItemRequestBuilderGetRequestConfiguration{ + QueryParameters: &keyhubreq.ItemGroupWithGroupItemRequestBuilderGetQueryParameters{ + Additional: collectAdditional(data.AdditionalObjects), + }, + }) + + if !isHttpStatusCodeOk(ctx, -1, err, &resp.Diagnostics) { + return + } + + tf, diags := tkhToTFObjectRSNestedProvisioningGroupOnSystem(true, tkh) + resp.Diagnostics.Append(diags...) + if resp.Diagnostics.HasError() { + return + } + tf = setAttributeValue(ctx, tf, "system_uuid", types.StringValue(data.SystemUUID.ValueString())) + fillDataStructFromTFObjectRSNestedProvisioningGroupOnSystem(&data, tf) + + resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) +} + +func (r *grouponsystemResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) { + resp.Diagnostics.AddError("Cannot update a grouponsystem", "Topicus KeyHub does not support updating a grouponsystem via Terraform. The requested changes are not applied.") +} + +func (r *grouponsystemResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) { + resp.Diagnostics.AddError("Cannot delete a grouponsystem", "Topicus KeyHub does not support deleting a grouponsystem via Terraform. The requested changes are not applied.") +} + +func (r *grouponsystemResource) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) { + resource.ImportStatePassthroughID(ctx, path.Root("uuid"), req, resp) +} diff --git a/internal/provider/resource-vaultrecord.go b/internal/provider/resource-vaultrecord.go deleted file mode 100644 index 0f84fb7..0000000 --- a/internal/provider/resource-vaultrecord.go +++ /dev/null @@ -1,262 +0,0 @@ -// Copyright (c) HashiCorp, Inc. -// SPDX-License-Identifier: MPL-2.0 - -package provider - -import ( - "context" - "fmt" - - "github.com/hashicorp/terraform-plugin-framework/diag" - "github.com/hashicorp/terraform-plugin-framework/path" - "github.com/hashicorp/terraform-plugin-framework/resource" - "github.com/hashicorp/terraform-plugin-framework/resource/schema" - "github.com/hashicorp/terraform-plugin-framework/types" - "github.com/hashicorp/terraform-plugin-framework/types/basetypes" - "github.com/hashicorp/terraform-plugin-log/tflog" - keyhub "github.com/topicuskeyhub/sdk-go" - keyhubgroup "github.com/topicuskeyhub/sdk-go/group" - keyhubmodels "github.com/topicuskeyhub/sdk-go/models" - keyhubvaultrecord "github.com/topicuskeyhub/sdk-go/vaultrecord" -) - -// Ensure provider defined types fully satisfy framework interfaces. -var ( - _ resource.Resource = &vaultRecordResource{} - _ resource.ResourceWithImportState = &vaultRecordResource{} - _ resource.ResourceWithConfigure = &vaultRecordResource{} -) - -func NewVaultRecordResource() resource.Resource { - return &vaultRecordResource{} -} - -// groupResource defines the resource implementation. -type vaultRecordResource struct { - client *keyhub.KeyHubClient -} - -func (r *vaultRecordResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) { - resp.TypeName = ProviderName + "_vaultrecord" - tflog.Info(ctx, "Registred resource "+resp.TypeName) -} - -func (r *vaultRecordResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) { - resp.Schema = schema.Schema{ - Attributes: resourceSchemaAttrsGroupVaultVaultRecord(true), - } -} - -func (r *vaultRecordResource) Configure(ctx context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) { - // Prevent panic if the provider has not been configured. - if req.ProviderData == nil { - return - } - - client, ok := req.ProviderData.(*keyhub.KeyHubClient) - - if !ok { - resp.Diagnostics.AddError( - "Unexpected Data Source Configure Type", - fmt.Sprintf("Expected *keyhub.KeyHubClient, got: %T. Please report this issue to the provider developers.", req.ProviderData), - ) - - return - } - - r.client = client -} - -func (r *vaultRecordResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) { - var data groupVaultVaultRecordDataRS - resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - ctx = context.WithValue(ctx, keyHubClientKey, r.client) - obj, diags := types.ObjectValueFrom(ctx, groupVaultVaultRecordAttrTypesRSRecurse, data) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - newTkh, diags := tfObjectToTKHRSGroupVaultVaultRecord(ctx, true, obj) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tkhGroup, diags := findGroupGroupPrimerByUUID(ctx, data.GroupUUID.ValueStringPointer()) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tflog.Info(ctx, "Creating Topicus KeyHub vaultrecord") - newWrapper := keyhubmodels.NewVaultVaultRecordLinkableWrapper() - newWrapper.SetItems([]keyhubmodels.VaultVaultRecordable{newTkh}) - wrapper, err := r.client.Group().ByGroupidInt64(*tkhGroup.GetLinks()[0].GetId()).Vault().Record().Post( - ctx, newWrapper, &keyhubgroup.ItemVaultRecordRequestBuilderPostRequestConfiguration{ - QueryParameters: &keyhubgroup.ItemVaultRecordRequestBuilderPostQueryParameters{ - Additional: collectAdditional(data.AdditionalObjects), - }, - }) - tkh, diags := findFirst[keyhubmodels.VaultVaultRecordable](ctx, wrapper, "vaultrecord", nil, err) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tf = fillGroupUuid(ctx, tf, data) - fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) - - resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) - - tflog.Info(ctx, "Created a new Topicus KeyHub vaultrecord") - resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) -} - -func (r *vaultRecordResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) { - var data groupVaultVaultRecordDataRS - resp.Diagnostics.Append(req.State.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - uuid := data.UUID.ValueString() - ctx = context.WithValue(ctx, keyHubClientKey, r.client) - tflog.Info(ctx, "Reading vaultrecord from Topicus KeyHub by UUID") - wrapper, err := r.client.Vaultrecord().Get(ctx, &keyhubvaultrecord.VaultrecordRequestBuilderGetRequestConfiguration{ - QueryParameters: &keyhubvaultrecord.VaultrecordRequestBuilderGetQueryParameters{ - Uuid: []string{uuid}, - Additional: collectAdditional(data.AdditionalObjects), - }, - }) - tkh, diags := findFirst[keyhubmodels.VaultVaultRecordable](ctx, wrapper, "vaultrecord", &uuid, err) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tf = fillGroupUuid(ctx, tf, data) - fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) - - resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) -} - -func (r *vaultRecordResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) { - var data groupVaultVaultRecordDataRS - resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - ctx = context.WithValue(ctx, keyHubClientKey, r.client) - obj, diags := types.ObjectValueFrom(ctx, groupVaultVaultRecordAttrTypesRSRecurse, data) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - newTkh, diags := tfObjectToTKHRSGroupVaultVaultRecord(ctx, true, obj) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tkhGroup, diags := findGroupGroupPrimerByUUID(ctx, data.GroupUUID.ValueStringPointer()) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tflog.Info(ctx, "Updating Topicus KeyHub vaultrecord") - tkh, err := r.client.Group().ByGroupidInt64(*tkhGroup.GetLinks()[0].GetId()).Vault().Record().ByIdInt64(getSelfLink(data.Links).ID.ValueInt64()).Put( - ctx, newTkh, &keyhubgroup.ItemVaultRecordRecordItemRequestBuilderPutRequestConfiguration{ - QueryParameters: &keyhubgroup.ItemVaultRecordRecordItemRequestBuilderPutQueryParameters{ - Additional: collectAdditional(data.AdditionalObjects), - }, - }) - - if !isHttpStatusCodeOk(ctx, -1, err, &resp.Diagnostics) { - return - } - - tf, diags := tkhToTFObjectRSGroupVaultVaultRecord(true, tkh) - resp.Diagnostics.Append(diags...) - if resp.Diagnostics.HasError() { - return - } - - tf = fillGroupUuid(ctx, tf, data) - fillDataStructFromTFObjectRSGroupVaultVaultRecord(&data, tf) - - tflog.Info(ctx, "Updated a Topicus KeyHub vaultrecord") - resp.Diagnostics.Append(resp.State.Set(ctx, &data)...) -} - -func (r *vaultRecordResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) { - var data groupGroupDataRS - resp.Diagnostics.Append(req.State.Get(ctx, &data)...) - if resp.Diagnostics.HasError() { - return - } - - ctx = context.WithValue(ctx, keyHubClientKey, r.client) - tflog.Info(ctx, "Deleting vaultrecord from Topicus KeyHub") - err := r.client.Group().ByGroupidInt64(-1).Vault().Record().ByIdInt64(-1).WithUrl(getSelfLink(data.Links).Href.ValueString()).Delete(ctx, nil) - if !isHttpStatusCodeOk(ctx, 404, err, &resp.Diagnostics) { - return - } - tflog.Info(ctx, "Deleted vaultrecord from Topicus KeyHub") -} - -func (r *vaultRecordResource) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) { - resource.ImportStatePassthroughID(ctx, path.Root("uuid"), req, resp) -} - -func getSelfLink(linksAttr basetypes.ListValue) restLinkDataRS { - var links restLinkDataRS - fillDataStructFromTFObjectRSRestLink(&links, linksAttr.Elements()[0].(basetypes.ObjectValue)) - return links -} - -func isHttpStatusCodeOk(ctx context.Context, status int32, err error, diags *diag.Diagnostics) bool { - if err != nil { - report, ok := err.(keyhubmodels.ErrorReportable) - if !ok || *report.GetCode() != status { - diags.AddError("Client Error", fmt.Sprintf("Unexpected status code: %s", errorReportToString(ctx, err))) - return false - } - } - return true -} - -func fillGroupUuid(ctx context.Context, tf basetypes.ObjectValue, data groupVaultVaultRecordDataRS) basetypes.ObjectValue { - obj := tf.Attributes() - obj["group_uuid"] = types.StringValue(data.GroupUUID.ValueString()) - return types.ObjectValueMust(tf.AttributeTypes(ctx), obj) -} - -func collectAdditional(additionalObjects basetypes.ObjectValue) []string { - ret := make([]string, 0) - for name, attr := range additionalObjects.Attributes() { - if !attr.IsNull() && !attr.IsUnknown() { - ret = append(ret, name) - } - } - return ret -} diff --git a/main.go b/main.go index 67054ee..8c9feaa 100644 --- a/main.go +++ b/main.go @@ -31,7 +31,7 @@ import ( // system/{systemid}/group // serviceaccount/{accountid}/group -//go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode impl +//go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode model //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource account --linkable authAccount //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource certificate --linkable certificateCertificate //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource client --linkable clientClientApplication @@ -43,6 +43,9 @@ import ( //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource system --linkable provisioningProvisionedSystem //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource vaultrecord --linkable vaultVaultRecord //go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode data --resource webhook --linkable webhookWebhook +//go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode resource --resource group +//go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode resource --resource group_vaultrecord +//go:generate go run github.com/topicuskeyhub/terraform-provider-keyhub-generator --mode resource --resource grouponsystem // If you do not have terraform installed, you can remove the formatting command, but its suggested to // ensure the documentation is formatted properly.