providers/okta/app_signon_policy_rule.go (62 lines of code) (raw):
// Copyright 2019 The Terraformer Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package okta
import (
"context"
"github.com/GoogleCloudPlatform/terraformer/terraformutils"
"github.com/okta/okta-sdk-golang/v5/okta"
)
type AppSignOnPolicyRuleGenerator struct {
OktaService
}
func (g AppSignOnPolicyRuleGenerator) createResources(signOnPolicyRuleList []okta.ListPolicyRules200ResponseInner, policyID string) []terraformutils.Resource {
var resources []terraformutils.Resource
for _, policyRule := range signOnPolicyRuleList {
if policyRule.AccessPolicyRule == nil {
continue
}
resourceName := normalizeResourceNameWithRandom(policyRule.AccessPolicyRule.GetName(), true)
resources = append(resources, terraformutils.NewResource(
policyRule.AccessPolicyRule.GetId(),
resourceName,
"okta_app_signon_policy_rule",
"okta",
map[string]string{
"policy_id": policyID,
},
[]string{},
map[string]interface{}{},
))
}
return resources
}
func (g *AppSignOnPolicyRuleGenerator) InitResources() error {
ctx, client, err := g.ClientV5()
if err != nil {
return err
}
policies, err := getAppSignOnPolicies(ctx, client)
if err != nil {
return err
}
var allResources []terraformutils.Resource
for _, policy := range policies {
if policy.AccessPolicy == nil {
continue
}
policyID := policy.AccessPolicy.GetId()
policyRules, err := getAppSignOnPolicyRules(ctx, client, policyID)
if err != nil {
return err
}
resources := g.createResources(policyRules, policyID)
allResources = append(allResources, resources...)
}
g.Resources = allResources
return nil
}
func getAppSignOnPolicyRules(ctx context.Context, client *okta.APIClient, policyID string) ([]okta.ListPolicyRules200ResponseInner, error) {
policyRules, _, err := client.PolicyAPI.ListPolicyRules(ctx, policyID).Execute()
if err != nil {
return nil, err
}
return policyRules, nil
}