-
Notifications
You must be signed in to change notification settings - Fork 9
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
47 changed files
with
2,704 additions
and
24 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
43 changes: 43 additions & 0 deletions
43
docs/data-sources/netapp-ontap_protocols_cifs_user_group_privilege_data_source.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "netapp-ontap_protocols_cifs_user_group_privilege_data_source Data Source - terraform-provider-netapp-ontap" | ||
subcategory: "nas" | ||
description: |- | ||
Retrieve CifsUserGroupPrivilege data source | ||
--- | ||
|
||
# Data Source netapp-ontap_protocols_cifs_user_group_privilege_data_source | ||
|
||
Retrieve Protocol Cifs User or Group Privilege data source | ||
|
||
## Example Usage | ||
```terraform | ||
data "netapp-ontap_protocols_cifs_user_group_privilege_data_source" "user_privilege" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
name = "user1" | ||
svm_name = "svmx" | ||
} | ||
data "netapp-ontap_protocols_cifs_user_group_privilege_data_source" "group_privilege" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
name = "group1" | ||
svm_name = "svmx" | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
- `name` (String) CifsUserGroupPrivilege name | ||
- `svm_name` (String) IPInterface svm name | ||
|
||
### Read-Only | ||
|
||
- `privileges` (List of String) List of privileges | ||
|
||
|
87 changes: 87 additions & 0 deletions
87
docs/data-sources/netapp-ontap_protocols_cifs_user_group_privileges_data_source.md
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,87 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "netapp-ontap_protocols_cifs_user_group_privileges_data_source Data Source - terraform-provider-netapp-ontap" | ||
subcategory: "nas" | ||
description: |- | ||
Retrieve CifsUserGroupPrivileges data source | ||
--- | ||
|
||
# Data Source netapp-ontap_protocols_cifs_user_group_privileges_data_source () | ||
|
||
Retrieve Protocol Cifs User or Group Privileges data source | ||
|
||
## Example Usage | ||
```terraform | ||
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_name_privileges" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
filter = { | ||
name = "user1" | ||
} | ||
} | ||
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_svm_privileges" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
filter = { | ||
svm_name = "svmx" | ||
} | ||
} | ||
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_privileges" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
filter = { | ||
privileges = "Se*" | ||
} | ||
} | ||
data "netapp-ontap_protocols_cifs_user_group_privileges_data_source" "by_svm_privileges" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
filter = { | ||
svm_name = "svmx" | ||
privileges = "SeTcbPrivilege" | ||
} | ||
} | ||
``` | ||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
|
||
### Optional | ||
|
||
- `filter` (Attributes) (see [below for nested schema](#nestedatt--filter)) | ||
|
||
### Read-Only | ||
|
||
- `protocols_cifs_user_group_privileges` (Attributes List) (see [below for nested schema](#nestedatt--protocols_cifs_user_group_privileges)) | ||
|
||
<a id="nestedatt--filter"></a> | ||
### Nested Schema for `filter` | ||
|
||
Optional: | ||
|
||
- `name` (String) CifsUserGroupPrivilege name | ||
- `privileges` (String) CifsUserGroupPrivilege privileges | ||
- `svm_name` (String) CifsUserGroupPrivilege svm name | ||
|
||
|
||
<a id="nestedatt--protocols_cifs_user_group_privileges"></a> | ||
### Nested Schema for `protocols_cifs_user_group_privileges` | ||
|
||
Required: | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
- `name` (String) CifsUserGroupPrivilege name | ||
- `svm_name` (String) CifsUserGroupPrivilege svm name | ||
|
||
Read-Only: | ||
|
||
- `privileges` (List of String) List of privileges | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,77 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "netapp-ontap_security_account_data_source Data Source - terraform-provider-netapp-ontap" | ||
subcategory: "Security" | ||
description: |- | ||
Retrieves a ONTAP User | ||
--- | ||
|
||
# Data Source Security_Account | ||
|
||
Retrieves a ONTAP User | ||
|
||
## Example Usage | ||
```terraform | ||
data "netapp-ontap_security_account_data_source" "security_accounts" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
owner = { | ||
name = "ansibleSVM" | ||
} | ||
name = "vsadmin" | ||
} | ||
``` | ||
|
||
|
||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
- `name` (String) SecurityAccount name | ||
|
||
### Optional | ||
|
||
- `owner` (Attributes) SecurityAccount owner (see [below for nested schema](#nestedatt--owner)) | ||
|
||
### Read-Only | ||
|
||
- `applications` (Attributes List) SecurityAccount applications (see [below for nested schema](#nestedatt--applications)) | ||
- `comment` (String) SecurityAccount comment | ||
- `id` (String) SecurityAccount id | ||
- `locked` (Boolean) SecurityAccount locked | ||
- `role` (Attributes) SecurityAccount role (see [below for nested schema](#nestedatt--role)) | ||
- `scope` (String) SecurityAccount scope | ||
|
||
<a id="nestedatt--owner"></a> | ||
### Nested Schema for `owner` | ||
|
||
Required: | ||
|
||
- `name` (String) SecurityAccount owner name | ||
|
||
Read-Only: | ||
|
||
- `uuid` (String) SecurityAccount owner uuid | ||
|
||
|
||
<a id="nestedatt--applications"></a> | ||
### Nested Schema for `applications` | ||
|
||
Read-Only: | ||
|
||
- `application` (String) SecurityAccount application | ||
- `authentication_methods` (List of String) SecurityAccount authentication methods | ||
- `second_authentication_method` (String) SecurityAccount second authentication method | ||
|
||
|
||
<a id="nestedatt--role"></a> | ||
### Nested Schema for `role` | ||
|
||
Read-Only: | ||
|
||
- `name` (String) SecurityAccount role name | ||
|
||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,94 @@ | ||
--- | ||
# generated by https://github.com/hashicorp/terraform-plugin-docs | ||
page_title: "netapp-ontap_security_accounts_data_source Data Source - terraform-provider-netapp-ontap" | ||
subcategory: "Security" | ||
description: |- | ||
Retrieves the configuration of multiple user accounts | ||
--- | ||
|
||
# Data Source Security Accounts | ||
|
||
Retrieves the configuration of multiple user accounts | ||
|
||
## Example Usage | ||
```terraform | ||
data "netapp-ontap_security_accounts_data_source" "security_accounts" { | ||
# required to know which system to interface with | ||
cx_profile_name = "cluster4" | ||
filter = { | ||
name = "vsadmin" | ||
svm_name = "testImport" | ||
} | ||
} | ||
``` | ||
|
||
|
||
<!-- schema generated by tfplugindocs --> | ||
## Schema | ||
|
||
### Required | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
|
||
### Optional | ||
|
||
- `filter` (Attributes) (see [below for nested schema](#nestedatt--filter)) | ||
|
||
### Read-Only | ||
|
||
- `security_accounts` (Attributes List) (see [below for nested schema](#nestedatt--security_accounts)) | ||
|
||
<a id="nestedatt--filter"></a> | ||
### Nested Schema for `filter` | ||
|
||
Optional: | ||
|
||
- `name` (String) SecurityAccount name | ||
- `svm_name` (String) SecurityAccount svm name (Owner name) | ||
|
||
|
||
<a id="nestedatt--security_accounts"></a> | ||
### Nested Schema for `security_accounts` | ||
|
||
Required: | ||
|
||
- `cx_profile_name` (String) Connection profile name | ||
- `name` (String) SecurityAccount name | ||
|
||
Read-Only: | ||
|
||
- `applications` (Attributes List) SecurityAccount applications (see [below for nested schema](#nestedatt--security_accounts--applications)) | ||
- `comment` (String) SecurityAccount comment | ||
- `id` (String) SecurityAccount id | ||
- `locked` (Boolean) SecurityAccount locked | ||
- `owner` (Attributes) SecurityAccount owner (see [below for nested schema](#nestedatt--security_accounts--owner)) | ||
- `role` (Attributes) SecurityAccount role (see [below for nested schema](#nestedatt--security_accounts--role)) | ||
- `scope` (String) SecurityAccount scope | ||
|
||
<a id="nestedatt--security_accounts--applications"></a> | ||
### Nested Schema for `security_accounts.applications` | ||
|
||
Read-Only: | ||
|
||
- `application` (String) SecurityAccount application | ||
- `authentication_methods` (List of String) SecurityAccount authentication methods | ||
- `second_authentication_method` (String) SecurityAccount second authentication method | ||
|
||
|
||
<a id="nestedatt--security_accounts--owner"></a> | ||
### Nested Schema for `security_accounts.owner` | ||
|
||
Read-Only: | ||
|
||
- `name` (String) SecurityAccount owner name | ||
- `uuid` (String) SecurityAccount owner uuid | ||
|
||
|
||
<a id="nestedatt--security_accounts--role"></a> | ||
### Nested Schema for `security_accounts.role` | ||
|
||
Read-Only: | ||
|
||
- `name` (String) SecurityAccount role name | ||
|
||
|
Oops, something went wrong.