Skip to content

Commit

Permalink
refreshing the provider for intersight version 16342 (#271)
Browse files Browse the repository at this point in the history
  • Loading branch information
vvb authored May 6, 2024
1 parent 4b09cf9 commit 9d16f18
Show file tree
Hide file tree
Showing 15,991 changed files with 244,695 additions and 80,742 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
# Change Logs

## v1.0.48
* Refreshes the terraform module to be in sync with the latest Cisco Intersight model (build 16342)

## v1.0.47
* Refreshes the terraform module to be in sync with the latest Cisco Intersight model (build 15830)

Expand Down
2 changes: 1 addition & 1 deletion GNUmakefile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
PKG_NAME=intersight
VERSION=1.0.47
VERSION=1.0.48
TEST?=$$(go list ./... |grep -v 'vendor')
GOFMT_FILES?=$$(find . -name '*.go' |grep -v vendor)
WEBSITE_REPO=github.com/hashicorp/terraform-website
Expand Down
File renamed without changes.
File renamed without changes.
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
2 changes: 1 addition & 1 deletion examples/sample_modules/os_install/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.47"
version = "1.0.48"
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion examples/sample_modules/server_configurations/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.47"
version = "1.0.48"
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion examples/sample_modules/server_deployment/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.47"
version = "1.0.48"
}
}
}
Expand Down
Empty file.
Empty file.
Empty file.
Empty file.
Empty file.
11 changes: 11 additions & 0 deletions intersight/data_source_intersight_adapter_unit.go
Original file line number Diff line number Diff line change
Expand Up @@ -786,6 +786,11 @@ func getAdapterUnitSchema() map[string]*schema.Schema {
},
},
},
"vic_communicable": {
Description: "Records the current state of communication between the Virtual Interface Card (VIC) and the Cisco Integrated Management Controller (CIMC) on the server.\n* `Not Applicable` - Set the state of VIC communication to Not Applicable for other Platforms.\n* `Yes` - VIC is reachable from CIMC.\n* `No` - VIC is not reachable from CIMC.",
Type: schema.TypeString,
Optional: true,
},
"vid": {
Description: "Virtual Id of the adapter in the server.",
Type: schema.TypeString,
Expand Down Expand Up @@ -1670,6 +1675,11 @@ func dataSourceAdapterUnitRead(c context.Context, d *schema.ResourceData, meta i
}
}

if v, ok := d.GetOk("vic_communicable"); ok {
x := (v.(string))
o.SetVicCommunicable(x)
}

if v, ok := d.GetOk("vid"); ok {
x := (v.(string))
o.SetVid(x)
Expand Down Expand Up @@ -1774,6 +1784,7 @@ func dataSourceAdapterUnitRead(c context.Context, d *schema.ResourceData, meta i
temp["vendor"] = (s.GetVendor())

temp["version_context"] = flattenMapMoVersionContext(s.GetVersionContext(), d)
temp["vic_communicable"] = (s.GetVicCommunicable())
temp["vid"] = (s.GetVid())
adapterUnitResults = append(adapterUnitResults, temp)
}
Expand Down

Large diffs are not rendered by default.

77 changes: 10 additions & 67 deletions intersight/data_source_intersight_asset_cluster_member.go
Original file line number Diff line number Diff line change
Expand Up @@ -292,27 +292,32 @@ func getAssetClusterMemberSchema() map[string]*schema.Schema {
Optional: true,
},
"pid": {
Description: "The device model (PID) extracted from the X.509 SUDI Leaf Certificate.",
Description: "The device model (PID) extracted from the X.509 SUDI leaf certificate.",
Type: schema.TypeString,
Optional: true,
},
"serial_number": {
Description: "The device SerialNumber extracted from the X.509 SUDI Leaf Certificate.",
Description: "The device SerialNumber extracted from the X.509 SUDI leaf certificate.",
Type: schema.TypeString,
Optional: true,
},
"signature": {
Description: "The signature is obtained by taking the base64 encoding of the Serial Number + PID + Status, taking the SHA256 hash and then signing with the SUDI X.509 Leaf Certificate.",
Description: "The base64-encoding of a SUDI signature, signed with the provided Trust Anchor Module (TAM) private key and signatureScheme.",
Type: schema.TypeString,
Optional: true,
},
"status": {
Description: "The validation status of the device.\n* `DeviceStatusUnknown` - SUDI validation is done on the establishment of a connection. Before a device connects or after it disconnects, the SUDI validation status is set to this value.\n* `Verified` - The device returned a valid PID, Serial Number, Status and X.509 Leaf Certificate. The certificate signing chain was validated.\n* `CertificateValidationFailed` - Validation of the certificate signing chain failed.\n* `UnsupportedFirmware` - The firmware version of the Cisco IMC that is installed does not contain the SUDI APIs needed to perform validation.\n* `UnsupportedHardware` - The device is a model that does not contain a Trust Anchor Module (TAM) and thus cannot be validated.\n* `DeviceNotResponding` - A request was sent to the device, but no response was received.",
Description: "The validation status of the device.\n* `DeviceStatusUnknown` - SUDI validation is done on the establishment of a connection. Before a device connects or after it disconnects, the SUDI validation status is set to this value.\n* `Verified` - The SUDI signature and certificate have been validated by the device. The device PID, Serial Number, Status and X.509 certificates were validated by a Trusted Anchor Module. The Intersight services have not cross-validated the SUDI signature.\n* `EndToEndVerified` - The SUDI signature and certificate have been validated by the device and by the Intersight services. The device PID, Serial Number, Status and X.509 certificates were validated by a Trusted Anchor Module.\n* `CertificateValidationFailed` - Validation of the certificate signing chain failed.\n* `UnsupportedSignatureScheme` - The SUDI signature scheme is not supported.\n* `SignatureValidationFailed` - Validation of the SUDI signature has failed.\n* `UnsupportedFirmware` - The firmware version of the Cisco IMC that is installed does not contain the SUDI APIs needed to perform validation.\n* `UnsupportedHardware` - The device is a model that does not contain a Trust Anchor Module (TAM) and thus cannot be validated.\n* `DeviceError` - The device returned an error when it received a SUDIrequrest request.\n* `DeviceNotResponding` - A request was sent to the device, but no response was received.\n* `InvalidSignatureEncoding` - The encoding of the SUDI signature is invalid.\n* `MissingSignature` - The SUDI signature is missing.\n* `MissingSignatureScheme` - The SUDI signature scheme is missing.\n* `MissingCertificate` - The SUDI certificate is missing.\n* `InvalidCertificateEncoding` - The encoding of the SUDI certificate is invalid.\n* `InvalidIdentity` - The model or serial number of the device is either missing or does not match the certificate attributes.\n* `Suspect` - The DC claims the SUDI has been verified, but there is no way to validate the claim.",
Type: schema.TypeString,
Optional: true,
},
"status_details": {
Description: "The detailed validation status of the device, such as an error message explaining why the validation failed.",
Type: schema.TypeString,
Optional: true,
},
"sudi_certificate": {
Description: "The X.509 SUDI Leaf Certificate from the Trust Anchor Module. The certificate is serialized in PEM format (Base64 encoded DER certificate).",
Description: "The X.509 SUDI leaf certificate from the Trust Anchor Module. The certificate is serialized in PEM format (Base64 encoded DER certificate).",
Type: schema.TypeList,
MaxItems: 1,
Optional: true,
Expand Down Expand Up @@ -946,68 +951,6 @@ func dataSourceAssetClusterMemberRead(c context.Context, d *schema.ResourceData,
o.SetObjectType(x)
}
}
if v, ok := l["pid"]; ok {
{
x := (v.(string))
o.SetPid(x)
}
}
if v, ok := l["serial_number"]; ok {
{
x := (v.(string))
o.SetSerialNumber(x)
}
}
if v, ok := l["signature"]; ok {
{
x := (v.(string))
o.SetSignature(x)
}
}
if v, ok := l["status"]; ok {
{
x := (v.(string))
o.SetStatus(x)
}
}
if v, ok := l["sudi_certificate"]; ok {
{
p := make([]models.X509Certificate, 0, 1)
s := v.([]interface{})
for i := 0; i < len(s); i++ {
l := s[i].(map[string]interface{})
o := models.NewX509CertificateWithDefaults()
if v, ok := l["additional_properties"]; ok {
{
x := []byte(v.(string))
var x1 interface{}
err := json.Unmarshal(x, &x1)
if err == nil && x1 != nil {
o.AdditionalProperties = x1.(map[string]interface{})
}
}
}
o.SetClassId("x509.Certificate")
if v, ok := l["object_type"]; ok {
{
x := (v.(string))
o.SetObjectType(x)
}
}
if v, ok := l["pem_certificate"]; ok {
{
x := (v.(string))
o.SetPemCertificate(x)
}
}
p = append(p, *o)
}
if len(p) > 0 {
x := p[0]
o.SetSudiCertificate(x)
}
}
}
p = append(p, *o)
}
if len(p) > 0 {
Expand Down

Large diffs are not rendered by default.

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion intersight/data_source_intersight_asset_target.go

Large diffs are not rendered by default.

Loading

0 comments on commit 9d16f18

Please sign in to comment.