Skip to content

Commit

Permalink
refreshing the provider for intersight version 18369 (#285)
Browse files Browse the repository at this point in the history
  • Loading branch information
vvb authored Sep 6, 2024
1 parent 5336e96 commit ea0dbe5
Show file tree
Hide file tree
Showing 10,202 changed files with 14,333 additions and 12,867 deletions.
The diff you're trying to view is too large. We only load the first 3000 changed files.
3 changes: 3 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,8 @@
# Change Logs

## v1.0.54
* Refreshes the terraform module to be in sync with the latest Cisco Intersight model (build 18369)

## v1.0.53
* Refreshes the terraform module to be in sync with the latest Cisco Intersight model (build 18012)

Expand Down
2 changes: 1 addition & 1 deletion GNUmakefile
Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
PKG_NAME=intersight
VERSION=1.0.53
VERSION=1.0.54
TEST?=$$(go list ./... |grep -v 'vendor')
GOFMT_FILES?=$$(find . -name '*.go' |grep -v vendor)
WEBSITE_REPO=github.com/hashicorp/terraform-website
Expand Down
2 changes: 1 addition & 1 deletion examples/sample_modules/os_install/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.53"
version = "1.0.54"
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion examples/sample_modules/server_configurations/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.53"
version = "1.0.54"
}
}
}
Expand Down
2 changes: 1 addition & 1 deletion examples/sample_modules/server_deployment/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -2,7 +2,7 @@ terraform {
required_providers {
intersight = {
source = "CiscoDevNet/intersight"
version = "1.0.53"
version = "1.0.54"
}
}
}
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -61,7 +61,7 @@ func getCapabilityAdapterUpdateConstraintMetaSchema() map[string]*schema.Schema
},
},
"class_id": {
Description: "The fully-qualified name of the instantiated, concrete type.\nThis property is used as a discriminator to identify the type of the payload\nwhen marshaling and unmarshaling data.",
Description: "The fully-qualified name of the instantiated, concrete type.\nThis property is used as a discriminator to identify the type of the payload\nwhen marshaling and unmarshaling data.\nThe enum values provides the list of concrete types that can be instantiated from this abstract type.",
Type: schema.TypeString,
Optional: true,
},
Expand Down Expand Up @@ -106,7 +106,7 @@ func getCapabilityAdapterUpdateConstraintMetaSchema() map[string]*schema.Schema
Optional: true,
},
"object_type": {
Description: "The fully-qualified name of the instantiated, concrete type.\nThe value should be the same as the 'ClassId' property.",
Description: "The fully-qualified name of the instantiated, concrete type.\nThe value should be the same as the 'ClassId' property.\nThe enum values provides the list of concrete types that can be instantiated from this abstract type.",
Type: schema.TypeString,
Optional: true,
},
Expand Down Expand Up @@ -227,16 +227,6 @@ func getCapabilityAdapterUpdateConstraintMetaSchema() map[string]*schema.Schema
Type: schema.TypeString,
Optional: true,
},
"supported_platform": {
Description: "Platform for which the constraint is to be enforced.",
Type: schema.TypeString,
Optional: true,
},
"supported_platforms": {
Type: schema.TypeList,
Optional: true,
Elem: &schema.Schema{
Type: schema.TypeString}},
"tags": {
Type: schema.TypeList,
Optional: true,
Expand Down Expand Up @@ -631,22 +621,6 @@ func dataSourceCapabilityAdapterUpdateConstraintMetaRead(c context.Context, d *s
o.SetSharedScope(x)
}

if v, ok := d.GetOk("supported_platform"); ok {
x := (v.(string))
o.SetSupportedPlatform(x)
}

if v, ok := d.GetOk("supported_platforms"); ok {
x := make([]string, 0)
y := reflect.ValueOf(v)
for i := 0; i < y.Len(); i++ {
if y.Index(i).Interface() != nil {
x = append(x, y.Index(i).Interface().(string))
}
}
o.SetSupportedPlatforms(x)
}

if v, ok := d.GetOk("tags"); ok {
x := make([]models.MoTag, 0)
s := v.([]interface{})
Expand Down Expand Up @@ -814,8 +788,6 @@ func dataSourceCapabilityAdapterUpdateConstraintMetaRead(c context.Context, d *s

temp["server_specific_constraint"] = flattenListCapabilityServerComponentConstraint(s.GetServerSpecificConstraint(), d)
temp["shared_scope"] = (s.GetSharedScope())
temp["supported_platform"] = (s.GetSupportedPlatform())
temp["supported_platforms"] = (s.GetSupportedPlatforms())

temp["tags"] = flattenListMoTag(s.GetTags(), d)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -227,11 +227,6 @@ func getCapabilityProcessorUnitUpdateConstraintMetaSchema() map[string]*schema.S
Type: schema.TypeString,
Optional: true,
},
"supported_platforms": {
Type: schema.TypeList,
Optional: true,
Elem: &schema.Schema{
Type: schema.TypeString}},
"tags": {
Type: schema.TypeList,
Optional: true,
Expand Down Expand Up @@ -626,17 +621,6 @@ func dataSourceCapabilityProcessorUnitUpdateConstraintMetaRead(c context.Context
o.SetSharedScope(x)
}

if v, ok := d.GetOk("supported_platforms"); ok {
x := make([]string, 0)
y := reflect.ValueOf(v)
for i := 0; i < y.Len(); i++ {
if y.Index(i).Interface() != nil {
x = append(x, y.Index(i).Interface().(string))
}
}
o.SetSupportedPlatforms(x)
}

if v, ok := d.GetOk("tags"); ok {
x := make([]models.MoTag, 0)
s := v.([]interface{})
Expand Down Expand Up @@ -804,7 +788,6 @@ func dataSourceCapabilityProcessorUnitUpdateConstraintMetaRead(c context.Context

temp["server_specific_constraint"] = flattenListCapabilityServerComponentConstraint(s.GetServerSpecificConstraint(), d)
temp["shared_scope"] = (s.GetSharedScope())
temp["supported_platforms"] = (s.GetSupportedPlatforms())

temp["tags"] = flattenListMoTag(s.GetTags(), d)

Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -227,11 +227,6 @@ func getCapabilityStorageControllerUpdateConstraintMetaSchema() map[string]*sche
Type: schema.TypeString,
Optional: true,
},
"supported_platforms": {
Type: schema.TypeList,
Optional: true,
Elem: &schema.Schema{
Type: schema.TypeString}},
"tags": {
Type: schema.TypeList,
Optional: true,
Expand Down Expand Up @@ -626,17 +621,6 @@ func dataSourceCapabilityStorageControllerUpdateConstraintMetaRead(c context.Con
o.SetSharedScope(x)
}

if v, ok := d.GetOk("supported_platforms"); ok {
x := make([]string, 0)
y := reflect.ValueOf(v)
for i := 0; i < y.Len(); i++ {
if y.Index(i).Interface() != nil {
x = append(x, y.Index(i).Interface().(string))
}
}
o.SetSupportedPlatforms(x)
}

if v, ok := d.GetOk("tags"); ok {
x := make([]models.MoTag, 0)
s := v.([]interface{})
Expand Down Expand Up @@ -804,7 +788,6 @@ func dataSourceCapabilityStorageControllerUpdateConstraintMetaRead(c context.Con

temp["server_specific_constraint"] = flattenListCapabilityServerComponentConstraint(s.GetServerSpecificConstraint(), d)
temp["shared_scope"] = (s.GetSharedScope())
temp["supported_platforms"] = (s.GetSupportedPlatforms())

temp["tags"] = flattenListMoTag(s.GetTags(), d)

Expand Down
11 changes: 11 additions & 0 deletions intersight/data_source_intersight_catalystsdwan_vedge_device.go
Original file line number Diff line number Diff line change
Expand Up @@ -75,6 +75,11 @@ func getCatalystsdwanVedgeDeviceSchema() map[string]*schema.Schema {
Type: schema.TypeString,
Optional: true,
},
"device_id": {
Description: "The Catalyst SDWAN device id.",
Type: schema.TypeString,
Optional: true,
},
"device_location": {
Description: "The location of the device.",
Type: schema.TypeList,
Expand Down Expand Up @@ -631,6 +636,11 @@ func dataSourceCatalystsdwanVedgeDeviceRead(c context.Context, d *schema.Resourc
o.SetCreateTime(x)
}

if v, ok := d.GetOk("device_id"); ok {
x := (v.(string))
o.SetDeviceId(x)
}

if v, ok := d.GetOk("device_location"); ok {
p := make([]models.EquipmentDeviceLocation, 0, 1)
s := v.([]interface{})
Expand Down Expand Up @@ -1137,6 +1147,7 @@ func dataSourceCatalystsdwanVedgeDeviceRead(c context.Context, d *schema.Resourc
temp["config_status_message"] = (s.GetConfigStatusMessage())

temp["create_time"] = (s.GetCreateTime()).String()
temp["device_id"] = (s.GetDeviceId())

temp["device_location"] = flattenMapEquipmentDeviceLocation(s.GetDeviceLocation(), d)
temp["device_mo_id"] = (s.GetDeviceMoId())
Expand Down
11 changes: 11 additions & 0 deletions intersight/data_source_intersight_compute_server_setting.go
Original file line number Diff line number Diff line change
Expand Up @@ -597,6 +597,11 @@ func getComputeServerSettingSchema() map[string]*schema.Schema {
},
},
},
"reset_memory_errors": {
Description: "Reset Correctable and Uncorrectable ECC errors on all the DIMMs present in the server.\n* `Ready` - Reset memory errors operation is allowed on the server in this state.\n* `Reset` - Trigger reset memory errors operation on a server.",
Type: schema.TypeString,
Optional: true,
},
"rn": {
Description: "The Relative Name uniquely identifies an object within a given context.",
Type: schema.TypeString,
Expand Down Expand Up @@ -1672,6 +1677,11 @@ func dataSourceComputeServerSettingRead(c context.Context, d *schema.ResourceDat
}
}

if v, ok := d.GetOk("reset_memory_errors"); ok {
x := (v.(string))
o.SetResetMemoryErrors(x)
}

if v, ok := d.GetOk("rn"); ok {
x := (v.(string))
o.SetRn(x)
Expand Down Expand Up @@ -2318,6 +2328,7 @@ func dataSourceComputeServerSettingRead(c context.Context, d *schema.ResourceDat
temp["persistent_memory_operation"] = flattenMapComputePersistentMemoryOperation(s.GetPersistentMemoryOperation(), d)

temp["registered_device"] = flattenMapAssetDeviceRegistrationRelationship(s.GetRegisteredDevice(), d)
temp["reset_memory_errors"] = (s.GetResetMemoryErrors())
temp["rn"] = (s.GetRn())

temp["running_workflow"] = flattenMapWorkflowWorkflowInfoRelationship(s.GetRunningWorkflow(), d)
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -373,7 +373,7 @@ func getFabricEthNetworkGroupPolicySchema() map[string]*schema.Schema {
Optional: true,
},
"native_vlan": {
Description: "Native VLAN ID of the virtual interface or the corresponding vethernet on the peer Fabric Interconnect to which the virtual interface is connected. If the native VLAN is not a part of the allowed VLANs, it will automatically be added to the list of allowed VLANs.",
Description: "Native VLAN ID of the virtual interface or the corresponding Vethernet on the peer Fabric Interconnect to which the virtual interface is connected. Native VLAN ID maps all incoming untagged traffic i.e. packets without a VLAN tag to the native VLAN for switching purposes. If the native VLAN is not a part of the allowed VLANs, it will automatically be added to the list of allowed VLANs. A native VLAN ID of 0 will indicate to the system to use the system default native VLAN ID and will also prevent native VLAN from being added to the allowed VLAN list.",
Type: schema.TypeInt,
Optional: true,
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -378,7 +378,7 @@ func getFabricEthNetworkGroupPolicyInventorySchema() map[string]*schema.Schema {
Optional: true,
},
"native_vlan": {
Description: "Native VLAN ID of the virtual interface or the corresponding vethernet on the peer Fabric Interconnect to which the virtual interface is connected. If the native VLAN is not a part of the allowed VLANs, it will automatically be added to the list of allowed VLANs.",
Description: "Native VLAN ID of the virtual interface or the corresponding Vethernet on the peer Fabric Interconnect to which the virtual interface is connected. Native VLAN ID maps all incoming untagged traffic i.e. packets without a VLAN tag to the native VLAN for switching purposes. If the native VLAN is not a part of the allowed VLANs, it will automatically be added to the list of allowed VLANs. A native VLAN ID of 0 will indicate to the system to use the system default native VLAN ID and will also prevent native VLAN from being added to the allowed VLAN list.",
Type: schema.TypeInt,
Optional: true,
},
Expand Down
4 changes: 2 additions & 2 deletions intersight/data_source_intersight_ipmioverlan_policy.go
Original file line number Diff line number Diff line change
Expand Up @@ -86,7 +86,7 @@ func getIpmioverlanPolicySchema() map[string]*schema.Schema {
Optional: true,
},
"encryption_key": {
Description: "The encryption key to use for IPMI communication. It should have an even number of hexadecimal characters and not exceed 40 characters. Use “00” to disable encryption key use. This configuration is supported by all standalone rack servers. FI-attached rack servers with firmware at minimum of 4.2.3a support this configuration. FI-attached blade servers with firmware at minimum of 5.1.0.x support this configuration. IPMI commands using this key should append zeroes to the key to achieve a length of 40 characters.",
Description: "The encryption key to use for IPMI communication. It should have an even number of hexadecimal characters and not exceed 40 characters. Use “00” to disable encryption key use. This configuration is supported by all Standalone C-Series servers. FI-attached C-Series servers with firmware at minimum of 4.2.3a support this configuration. B/X-Series servers with firmware at minimum of 5.1.0.x support this configuration. IPMI commands using this key should append zeroes to the key to achieve a length of 40 characters.",
Type: schema.TypeString,
Optional: true,
},
Expand Down Expand Up @@ -225,7 +225,7 @@ func getIpmioverlanPolicySchema() map[string]*schema.Schema {
},
},
"privilege": {
Description: "The highest privilege level that can be assigned to an IPMI session on a server. This configuration is supported by all standalone rack servers. FI-attached rack servers with firmware at minimum of 4.2.3a support this configuration. FI-attached blade servers do not support privilege level. Privilege level will be ignored for unsupported servers.\n* `admin` - Privilege to perform all actions available through IPMI.\n* `user` - Privilege to perform some functions through IPMI but restriction on performing administrative tasks.\n* `read-only` - Privilege to view information throught IPMI but restriction on making any changes.",
Description: "The highest privilege level that can be assigned to an IPMI session on a server. This configuration is supported by all Standalone C-Series servers. FI-attached C-Series servers with firmware at minimum of 4.2.3a support this configuration. B/X-Series servers with firmware at minimum of 5.1.0.x support this configuration. Privilege level user is not supported for B/X-Series servers.\n* `admin` - Privilege to perform all actions available through IPMI.\n* `user` - Privilege to perform some functions through IPMI but restriction on performing administrative tasks.\n* `read-only` - Privilege to view information throught IPMI but restriction on making any changes.",
Type: schema.TypeString,
Optional: true,
},
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -91,7 +91,7 @@ func getIpmioverlanPolicyInventorySchema() map[string]*schema.Schema {
Optional: true,
},
"encryption_key": {
Description: "The encryption key to use for IPMI communication. It should have an even number of hexadecimal characters and not exceed 40 characters. Use “00” to disable encryption key use. This configuration is supported by all standalone rack servers. FI-attached rack servers with firmware at minimum of 4.2.3a support this configuration. FI-attached blade servers with firmware at minimum of 5.1.0.x support this configuration. IPMI commands using this key should append zeroes to the key to achieve a length of 40 characters.",
Description: "The encryption key to use for IPMI communication. It should have an even number of hexadecimal characters and not exceed 40 characters. Use “00” to disable encryption key use. This configuration is supported by all Standalone C-Series servers. FI-attached C-Series servers with firmware at minimum of 4.2.3a support this configuration. B/X-Series servers with firmware at minimum of 5.1.0.x support this configuration. IPMI commands using this key should append zeroes to the key to achieve a length of 40 characters.",
Type: schema.TypeString,
Optional: true,
},
Expand Down Expand Up @@ -195,7 +195,7 @@ func getIpmioverlanPolicyInventorySchema() map[string]*schema.Schema {
},
},
"privilege": {
Description: "The highest privilege level that can be assigned to an IPMI session on a server. This configuration is supported by all standalone rack servers. FI-attached rack servers with firmware at minimum of 4.2.3a support this configuration. FI-attached blade servers do not support privilege level. Privilege level will be ignored for unsupported servers.\n* `admin` - Privilege to perform all actions available through IPMI.\n* `user` - Privilege to perform some functions through IPMI but restriction on performing administrative tasks.\n* `read-only` - Privilege to view information throught IPMI but restriction on making any changes.",
Description: "The highest privilege level that can be assigned to an IPMI session on a server. This configuration is supported by all Standalone C-Series servers. FI-attached C-Series servers with firmware at minimum of 4.2.3a support this configuration. B/X-Series servers with firmware at minimum of 5.1.0.x support this configuration. Privilege level user is not supported for B/X-Series servers.\n* `admin` - Privilege to perform all actions available through IPMI.\n* `user` - Privilege to perform some functions through IPMI but restriction on performing administrative tasks.\n* `read-only` - Privilege to view information throught IPMI but restriction on making any changes.",
Type: schema.TypeString,
Optional: true,
},
Expand Down
Loading

0 comments on commit ea0dbe5

Please sign in to comment.