Skip to content

Commit

Permalink
add change log
Browse files Browse the repository at this point in the history
  • Loading branch information
carchi8py committed Jan 30, 2024
2 parents f568399 + 4fa2b5d commit 3cdc356
Show file tree
Hide file tree
Showing 47 changed files with 2,704 additions and 24 deletions.
13 changes: 13 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
Expand Up @@ -7,6 +7,15 @@ FEATURES:
* **New Data Source:** `netapp_ontap_cluster_peers_data_source` ([#50](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/50))
* **New Data Source:** `netapp-ontap_protocols_cifs_local_user_data_source` ([#55](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/55))
* **New Data Source:** `netapp-ontap_protocols_cifs_local_users_data_source` ([#55](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/55))
* **New Data Source** `netapp-ontap_security_account_data_source` ([#22](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/22))
* **New Data Source** `netapp-ontap_security_accounts_data_source` ([#22](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/22))
* **New Data Source:** `netapp-ontap_protocols_cifs_user_group_privilege_data_source` ([#57](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/57))
* **New Data Source:** `netapp-ontap_protocols_cifs_user_group_privileges_data_source` ([#57](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/57))
* **New Data Source:** `netapp-ontap_storage_lun_data_source` ([#12](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/12))
* **New Data Source:** `netapp-ontap_storage_luns_data_source` ([#12](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/12))
* **New Resource:** `netapp-ontap_protocols_cifs_local_group_resource` ([#53](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/53))
* **New Resource:** `netapp-ontap_protocols_cifs_local_user_resource` ([#56](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/56))



ENHANCEMENTS:
Expand All @@ -24,6 +33,10 @@ ENHANCEMENTS:
* **netapp-ontap_protocols_nfs_export_policy_rule_resource**: Add support for import ([#35](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/35))



## 1.0.3 (2023-12-05)
* netapp-ontap_name_services_dns_resource: Fixed missing ID on create ([#99](https://github.com/NetApp/terraform-provider-netapp-ontap/issues/63))

## 1.0.2 (2023-11-17)
* 1.0.1 did not deploy correctly 1.0.2 fixes that.

Expand Down
Original file line number Diff line number Diff line change
@@ -0,0 +1,43 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "netapp-ontap_protocols_cifs_user_group_privilege_data_source Data Source - terraform-provider-netapp-ontap"
subcategory: "nas"
description: |-
Retrieve CifsUserGroupPrivilege data source
---

# Data Source netapp-ontap_protocols_cifs_user_group_privilege_data_source

Retrieve Protocol Cifs User or Group Privilege data source

## Example Usage
```terraform
data "netapp-ontap_protocols_cifs_user_group_privilege_data_source" "user_privilege" {
# required to know which system to interface with
cx_profile_name = "cluster4"
name = "user1"
svm_name = "svmx"
}
data "netapp-ontap_protocols_cifs_user_group_privilege_data_source" "group_privilege" {
# required to know which system to interface with
cx_profile_name = "cluster4"
name = "group1"
svm_name = "svmx"
}
```

<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cx_profile_name` (String) Connection profile name
- `name` (String) CifsUserGroupPrivilege name
- `svm_name` (String) IPInterface svm name

### Read-Only

- `privileges` (List of String) List of privileges


Original file line number Diff line number Diff line change
@@ -0,0 +1,87 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "netapp-ontap_protocols_cifs_user_group_privileges_data_source Data Source - terraform-provider-netapp-ontap"
subcategory: "nas"
description: |-
Retrieve CifsUserGroupPrivileges data source
---

# Data Source netapp-ontap_protocols_cifs_user_group_privileges_data_source ()

Retrieve Protocol Cifs User or Group Privileges data source

## Example Usage
```terraform
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_name_privileges" {
# required to know which system to interface with
cx_profile_name = "cluster4"
filter = {
name = "user1"
}
}
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_svm_privileges" {
# required to know which system to interface with
cx_profile_name = "cluster4"
filter = {
svm_name = "svmx"
}
}
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_privileges" {
# required to know which system to interface with
cx_profile_name = "cluster4"
filter = {
privileges = "Se*"
}
}
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_svm_privileges" {
# required to know which system to interface with
cx_profile_name = "cluster4"
filter = {
svm_name = "svmx"
privileges = "SeTcbPrivilege"
}
}
```

<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cx_profile_name` (String) Connection profile name

### Optional

- `filter` (Attributes) (see [below for nested schema](#nestedatt--filter))

### Read-Only

- `protocols_cifs_user_group_privileges` (Attributes List) (see [below for nested schema](#nestedatt--protocols_cifs_user_group_privileges))

<a id="nestedatt--filter"></a>
### Nested Schema for `filter`

Optional:

- `name` (String) CifsUserGroupPrivilege name
- `privileges` (String) CifsUserGroupPrivilege privileges
- `svm_name` (String) CifsUserGroupPrivilege svm name


<a id="nestedatt--protocols_cifs_user_group_privileges"></a>
### Nested Schema for `protocols_cifs_user_group_privileges`

Required:

- `cx_profile_name` (String) Connection profile name
- `name` (String) CifsUserGroupPrivilege name
- `svm_name` (String) CifsUserGroupPrivilege svm name

Read-Only:

- `privileges` (List of String) List of privileges


77 changes: 77 additions & 0 deletions docs/data-sources/security_account_data_source.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,77 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "netapp-ontap_security_account_data_source Data Source - terraform-provider-netapp-ontap"
subcategory: "Security"
description: |-
Retrieves a ONTAP User
---

# Data Source Security_Account

Retrieves a ONTAP User

## Example Usage
```terraform
data "netapp-ontap_security_account_data_source" "security_accounts" {
# required to know which system to interface with
cx_profile_name = "cluster4"
owner = {
name = "ansibleSVM"
}
name = "vsadmin"
}
```



<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cx_profile_name` (String) Connection profile name
- `name` (String) SecurityAccount name

### Optional

- `owner` (Attributes) SecurityAccount owner (see [below for nested schema](#nestedatt--owner))

### Read-Only

- `applications` (Attributes List) SecurityAccount applications (see [below for nested schema](#nestedatt--applications))
- `comment` (String) SecurityAccount comment
- `id` (String) SecurityAccount id
- `locked` (Boolean) SecurityAccount locked
- `role` (Attributes) SecurityAccount role (see [below for nested schema](#nestedatt--role))
- `scope` (String) SecurityAccount scope

<a id="nestedatt--owner"></a>
### Nested Schema for `owner`

Required:

- `name` (String) SecurityAccount owner name

Read-Only:

- `uuid` (String) SecurityAccount owner uuid


<a id="nestedatt--applications"></a>
### Nested Schema for `applications`

Read-Only:

- `application` (String) SecurityAccount application
- `authentication_methods` (List of String) SecurityAccount authentication methods
- `second_authentication_method` (String) SecurityAccount second authentication method


<a id="nestedatt--role"></a>
### Nested Schema for `role`

Read-Only:

- `name` (String) SecurityAccount role name


94 changes: 94 additions & 0 deletions docs/data-sources/security_accounts_data_source.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,94 @@
---
# generated by https://github.com/hashicorp/terraform-plugin-docs
page_title: "netapp-ontap_security_accounts_data_source Data Source - terraform-provider-netapp-ontap"
subcategory: "Security"
description: |-
Retrieves the configuration of multiple user accounts
---

# Data Source Security Accounts

Retrieves the configuration of multiple user accounts

## Example Usage
```terraform
data "netapp-ontap_security_accounts_data_source" "security_accounts" {
# required to know which system to interface with
cx_profile_name = "cluster4"
filter = {
name = "vsadmin"
svm_name = "testImport"
}
}
```


<!-- schema generated by tfplugindocs -->
## Schema

### Required

- `cx_profile_name` (String) Connection profile name

### Optional

- `filter` (Attributes) (see [below for nested schema](#nestedatt--filter))

### Read-Only

- `security_accounts` (Attributes List) (see [below for nested schema](#nestedatt--security_accounts))

<a id="nestedatt--filter"></a>
### Nested Schema for `filter`

Optional:

- `name` (String) SecurityAccount name
- `svm_name` (String) SecurityAccount svm name (Owner name)


<a id="nestedatt--security_accounts"></a>
### Nested Schema for `security_accounts`

Required:

- `cx_profile_name` (String) Connection profile name
- `name` (String) SecurityAccount name

Read-Only:

- `applications` (Attributes List) SecurityAccount applications (see [below for nested schema](#nestedatt--security_accounts--applications))
- `comment` (String) SecurityAccount comment
- `id` (String) SecurityAccount id
- `locked` (Boolean) SecurityAccount locked
- `owner` (Attributes) SecurityAccount owner (see [below for nested schema](#nestedatt--security_accounts--owner))
- `role` (Attributes) SecurityAccount role (see [below for nested schema](#nestedatt--security_accounts--role))
- `scope` (String) SecurityAccount scope

<a id="nestedatt--security_accounts--applications"></a>
### Nested Schema for `security_accounts.applications`

Read-Only:

- `application` (String) SecurityAccount application
- `authentication_methods` (List of String) SecurityAccount authentication methods
- `second_authentication_method` (String) SecurityAccount second authentication method


<a id="nestedatt--security_accounts--owner"></a>
### Nested Schema for `security_accounts.owner`

Read-Only:

- `name` (String) SecurityAccount owner name
- `uuid` (String) SecurityAccount owner uuid


<a id="nestedatt--security_accounts--role"></a>
### Nested Schema for `security_accounts.role`

Read-Only:

- `name` (String) SecurityAccount role name


Loading

0 comments on commit 3cdc356

Please sign in to comment.