Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: Add resource/datasource ovh_domain_zone_dnssec #589

Merged
merged 1 commit into from
Mar 21, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
68 changes: 68 additions & 0 deletions ovh/data_domain_zone_dnssec.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,68 @@
package ovh

import (
"context"
"fmt"
"net/url"

"github.com/hashicorp/terraform-plugin-framework/datasource"
)

var _ datasource.DataSourceWithConfigure = (*domainZoneDnssecDataSource)(nil)

func NewDomainZoneDnssecDataSource() datasource.DataSource {
return &domainZoneDnssecDataSource{}
}

type domainZoneDnssecDataSource struct {
config *Config
}

func (d *domainZoneDnssecDataSource) Metadata(ctx context.Context, req datasource.MetadataRequest, resp *datasource.MetadataResponse) {
resp.TypeName = req.ProviderTypeName + "_domain_zone_dnssec"
}

func (d *domainZoneDnssecDataSource) Configure(_ context.Context, req datasource.ConfigureRequest, resp *datasource.ConfigureResponse) {
if req.ProviderData == nil {
return
}

config, ok := req.ProviderData.(*Config)
if !ok {
resp.Diagnostics.AddError(
"Unexpected Data Source Configure Type",
fmt.Sprintf("Expected *Config, got: %T. Please report this issue to the provider developers.", req.ProviderData),
)
return
}

d.config = config
}

func (d *domainZoneDnssecDataSource) Schema(ctx context.Context, req datasource.SchemaRequest, resp *datasource.SchemaResponse) {
resp.Schema = DomainZoneDnssecDataSourceSchema(ctx)
}

func (d *domainZoneDnssecDataSource) Read(ctx context.Context, req datasource.ReadRequest, resp *datasource.ReadResponse) {
var data DomainZoneDnssecModel

// Read Terraform configuration data into the model
resp.Diagnostics.Append(req.Config.Get(ctx, &data)...)

if resp.Diagnostics.HasError() {
return
}

// Read API call logic
endpoint := "/domain/zone/" + url.PathEscape(data.ZoneName.ValueString()) + "/dnssec"
if err := d.config.OVHClient.Get(endpoint, &data); err != nil {
resp.Diagnostics.AddError(
fmt.Sprintf("Error calling Get %s", endpoint),
err.Error(),
)
return
}

// Save data into Terraform state
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
}
29 changes: 29 additions & 0 deletions ovh/data_domain_zone_dnssec_gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

27 changes: 27 additions & 0 deletions ovh/data_domain_zone_dnssec_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,27 @@
package ovh

import (
"fmt"
"os"
"testing"

"github.com/hashicorp/terraform-plugin-testing/helper/resource"
)

const testAccCheckOvhDomainZoneDnssecConfig_basic = `
data "ovh_domain_zone_dnssec" "sec" {
zone_name = "%s"
}`

func TestAccDomainZoneDnssecDataSource_Basic(t *testing.T) {
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheckDomain(t) },
ProtoV6ProviderFactories: testAccProtoV6ProviderFactories,
Steps: []resource.TestStep{
{
Config: fmt.Sprintf(testAccCheckOvhDomainZoneDnssecConfig_basic, os.Getenv("OVH_ZONE_TEST")),
Check: resource.TestCheckResourceAttr("data.ovh_domain_zone_dnssec.sec", "status", "disabled"),
},
},
})
}
2 changes: 2 additions & 0 deletions ovh/provider_new.go
Original file line number Diff line number Diff line change
Expand Up @@ -140,13 +140,15 @@ func (p *OvhProvider) DataSources(_ context.Context) []func() datasource.DataSou
return []func() datasource.DataSource{
NewCloudProjectDatabaseIPRestrictionsDataSource,
NewDedicatedServerSpecificationsHardwareDataSource,
NewDomainZoneDnssecDataSource,
}
}

// Resources defines the resources implemented in the provider.
func (p *OvhProvider) Resources(_ context.Context) []func() resource.Resource {
return []func() resource.Resource{
NewCloudProjectAlertingResource,
NewDomainZoneDnssecResource,
NewIploadbalancingUdpFrontendResource,
}
}
Expand Down
117 changes: 117 additions & 0 deletions ovh/resource_domain_zone_dnssec.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,117 @@
package ovh

import (
"context"
"fmt"
"net/url"

"github.com/hashicorp/terraform-plugin-framework/resource"
"github.com/hashicorp/terraform-plugin-log/tflog"
)

var _ resource.ResourceWithConfigure = (*domainZoneDnssecResource)(nil)

func NewDomainZoneDnssecResource() resource.Resource {
return &domainZoneDnssecResource{}
}

type domainZoneDnssecResource struct {
config *Config
}

func (r *domainZoneDnssecResource) Metadata(ctx context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) {
resp.TypeName = req.ProviderTypeName + "_domain_zone_dnssec"
}

func (d *domainZoneDnssecResource) Configure(_ context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) {
if req.ProviderData == nil {
return
}

config, ok := req.ProviderData.(*Config)
if !ok {
resp.Diagnostics.AddError(
"Unexpected Resource Configure Type",
fmt.Sprintf("Expected *Config, got: %T. Please report this issue to the provider developers.", req.ProviderData),
)
return
}

d.config = config
}

func (d *domainZoneDnssecResource) Schema(ctx context.Context, req resource.SchemaRequest, resp *resource.SchemaResponse) {
resp.Schema = DomainZoneDnssecResourceSchema(ctx)
}

func (r *domainZoneDnssecResource) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
var data, responseData DomainZoneDnssecModel

// Read Terraform plan data into the model
resp.Diagnostics.Append(req.Plan.Get(ctx, &data)...)
if resp.Diagnostics.HasError() {
return
}

endpoint := "/domain/zone/" + url.PathEscape(data.ZoneName.ValueString()) + "/dnssec"
if err := r.config.OVHClient.Post(endpoint, nil, &responseData); err != nil {
resp.Diagnostics.AddError(
fmt.Sprintf("Error calling Post %s", endpoint),
err.Error(),
)
return
}

responseData.MergeWith(&data)

// Save data into Terraform state
resp.Diagnostics.Append(resp.State.Set(ctx, &responseData)...)
}

func (r *domainZoneDnssecResource) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
var data, responseData DomainZoneDnssecModel

// Read Terraform prior state data into the model
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)
if resp.Diagnostics.HasError() {
return
}

endpoint := "/domain/zone/" + url.PathEscape(data.ZoneName.ValueString()) + "/dnssec"
if err := r.config.OVHClient.Get(endpoint, &responseData); err != nil {
resp.Diagnostics.AddError(
fmt.Sprintf("Error calling Get %s", endpoint),
err.Error(),
)
return
}

responseData.MergeWith(&data)

// Save updated data into Terraform state
resp.Diagnostics.Append(resp.State.Set(ctx, &data)...)
}

func (r *domainZoneDnssecResource) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
tflog.Warn(ctx, "Update not implemented")
}

func (r *domainZoneDnssecResource) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
var data DomainZoneDnssecModel

// Read Terraform prior state data into the model
resp.Diagnostics.Append(req.State.Get(ctx, &data)...)

if resp.Diagnostics.HasError() {
return
}

// Delete API call logic
endpoint := "/domain/zone/" + url.PathEscape(data.ZoneName.ValueString()) + "/dnssec"
if err := r.config.OVHClient.Delete(endpoint, nil); err != nil {
resp.Diagnostics.AddError(
fmt.Sprintf("Error calling Delete %s", endpoint),
err.Error(),
)
}
}
49 changes: 49 additions & 0 deletions ovh/resource_domain_zone_dnssec_gen.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

23 changes: 23 additions & 0 deletions website/docs/d/domain_zone_dnssec.html.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---
subcategory : "Domain names"
---

# ovh_domain_zone_dnssec (Data Source)

Use this data source to retrieve information about a domain zone DNSSEC status.

## Example Usage

```hcl
data "ovh_domain_zone_dnssec" "dnssec" {
zone_name = "mysite.ovh"
}
```

## Argument Reference

* `zone_name` - (Required) The name of the domain zone

## Attributes Reference

* `status` - DNSSEC status (`disableInProgress`, `disabled`, `enableInProgress` or `enabled`)
23 changes: 23 additions & 0 deletions website/docs/r/domain_zone_dnssec.html.markdown
Original file line number Diff line number Diff line change
@@ -0,0 +1,23 @@
---
subcategory : "Domain names"
---

# ovh_domain_zone_dnssec

Enable / disable DNSSEC on a domain zone.

## Example Usage

```hcl
resource "ovh_domain_zone_dnssec" "dnssec" {
zone_name = "mysite.ovh"
}
```

## Argument Reference

* `zone_name` - (Required) The name of the domain zone

## Attributes Reference

* `status` - DNSSEC status (`disableInProgress`, `disabled`, `enableInProgress` or `enabled`)