Skip to content

Commit

Permalink
feat: code improvements based on SonarCloud findings for the Api-Cred…
Browse files Browse the repository at this point in the history
…ential Resources (#950)
  • Loading branch information
diya-dhan authored Nov 20, 2024
1 parent 763e834 commit 074463e
Show file tree
Hide file tree
Showing 20 changed files with 155 additions and 216 deletions.
6 changes: 1 addition & 5 deletions docs/resources/directory_api_credential.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,16 +33,12 @@ resource "btp_directory_api_credential" "with-secret" {
read_only = false
}
// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}
# Create a certificate type API credential at the directory level
resource "btp_directory_api_credential" "with-certificate" {
name = "directory-api-credential-with-certificate"
directory_id = "d1298936-ddaf-4a82-b1d7-3ad29a732b61"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}
Expand Down
7 changes: 1 addition & 6 deletions docs/resources/globalaccount_api_credential.md
Original file line number Diff line number Diff line change
Expand Up @@ -32,15 +32,10 @@ resource "btp_globalaccount_api_credential" "with-secret" {
read_only = false
}
// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}
# Create a certificate type API credential at the globalaccount level
resource "btp_globalaccount_api_credential" "with-certificate" {
name = "globalaccount-api-credential-with-certificate"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}
Expand Down
6 changes: 1 addition & 5 deletions docs/resources/subaccount_api_credential.md
Original file line number Diff line number Diff line change
Expand Up @@ -33,16 +33,12 @@ resource "btp_subaccount_api_credential" "with-secret" {
read_only = false
}
// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}
# Create a certificate type API credential at the subaccount level
resource "btp_subaccount_api_credential" "with-certificate" {
name = "subaccount-api-credential-with-certificate"
subaccount_id = "77395f6a-a601-4c9e-8cd0-c1fcefc7f60f"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}
Expand Down
6 changes: 1 addition & 5 deletions examples/resources/btp_directory_api_credential/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,16 +5,12 @@ resource "btp_directory_api_credential" "with-secret" {
read_only = false
}

// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}

# Create a certificate type API credential at the directory level
resource "btp_directory_api_credential" "with-certificate" {
name = "directory-api-credential-with-certificate"
directory_id = "d1298936-ddaf-4a82-b1d7-3ad29a732b61"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -4,15 +4,10 @@ resource "btp_globalaccount_api_credential" "with-secret" {
read_only = false
}

// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}

# Create a certificate type API credential at the globalaccount level
resource "btp_globalaccount_api_credential" "with-certificate" {
name = "globalaccount-api-credential-with-certificate"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}

Expand Down
6 changes: 1 addition & 5 deletions examples/resources/btp_subaccount_api_credential/resource.tf
Original file line number Diff line number Diff line change
Expand Up @@ -5,16 +5,12 @@ resource "btp_subaccount_api_credential" "with-secret" {
read_only = false
}

// This datasource runs a go script to dynamically generate a PEM certificate which is used in the resource below
data "external" "values" {
program = ["go","run","../certificate.go"]
}

# Create a certificate type API credential at the subaccount level
resource "btp_subaccount_api_credential" "with-certificate" {
name = "subaccount-api-credential-with-certificate"
subaccount_id = "77395f6a-a601-4c9e-8cd0-c1fcefc7f60f"
certificate_passed = data.external.values.result["certificate"]
certificate_passed = "-----BEGIN CERTIFICATE-----\n-not-a-valid-certificate-\n-----END CERTIFICATE----\n"
read_only = false
}

Expand Down
43 changes: 0 additions & 43 deletions examples/resources/certificate.go

This file was deleted.

66 changes: 18 additions & 48 deletions internal/btpcli/facade_security_api_credential.go
Original file line number Diff line number Diff line change
Expand Up @@ -28,101 +28,71 @@ type ApiCredentialInput struct {
ReadOnly bool `btpcli:"readOnly,omitempty"`
}

func (f *securityApiCredentialFacade) CreateBySubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) CreateByDirectoryorSubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewCreateRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewCreateRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) DeleteBySubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) DeleteByDirectoryorSubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewDeleteRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewDeleteRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) GetBySubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) GetByDirectoryorSubaccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewGetRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewGetRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) CreateByDirectory(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewCreateRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) DeleteByDirectory(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewDeleteRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) GetByDirectory(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewGetRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) CreateByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) CreateByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {

args.GlobalAccount = f.cliClient.GetGlobalAccountSubdomain()

params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewCreateRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewCreateRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) DeleteByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) DeleteByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {

args.GlobalAccount = f.cliClient.GetGlobalAccountSubdomain()

params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewDeleteRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewDeleteRequest(f.getCommand(), params))
}

func (f *securityApiCredentialFacade) GetByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredentialSubaccount, CommandResponse, error) {
func (f *securityApiCredentialFacade) GetByGlobalAccount(ctx context.Context, args *ApiCredentialInput) (xsuaa_api.ApiCredential, CommandResponse, error) {

args.GlobalAccount = f.cliClient.GetGlobalAccountSubdomain()

params, err := tfutils.ToBTPCLIParamsMap(args)

if err != nil {
return xsuaa_api.ApiCredentialSubaccount{}, CommandResponse{}, err
return xsuaa_api.ApiCredential{}, CommandResponse{}, err
}

return doExecute[xsuaa_api.ApiCredentialSubaccount](f.cliClient, ctx, NewGetRequest(f.getCommand(), params))
return doExecute[xsuaa_api.ApiCredential](f.cliClient, ctx, NewGetRequest(f.getCommand(), params))
}
Loading

0 comments on commit 074463e

Please sign in to comment.