Skip to content

Commit

Permalink
Add an AD Application provider.
Browse files Browse the repository at this point in the history
Split from PR hashicorp#961.
  • Loading branch information
Xavier Gallardo authored and tombuildsstuff committed Jul 11, 2018
1 parent f92c132 commit 0c827de
Show file tree
Hide file tree
Showing 24 changed files with 3,024 additions and 0 deletions.
8 changes: 8 additions & 0 deletions azurerm/config.go
Original file line number Diff line number Diff line change
Expand Up @@ -102,6 +102,7 @@ type ArmClient struct {
// Authentication
roleAssignmentsClient authorization.RoleAssignmentsClient
roleDefinitionsClient authorization.RoleDefinitionsClient
applicationsClient graphrbac.ApplicationsClient
servicePrincipalsClient graphrbac.ServicePrincipalsClient

// CDN
Expand Down Expand Up @@ -462,6 +463,13 @@ func (c *ArmClient) registerAuthentication(endpoint, graphEndpoint, subscription
definitionsClient.SkipResourceProviderRegistration = c.skipProviderRegistration
c.roleDefinitionsClient = definitionsClient

applicationsClient := graphrbac.NewApplicationsClientWithBaseURI(graphEndpoint, tenantId)
setUserAgent(&applicationsClient.Client)
applicationsClient.Authorizer = graphAuth
applicationsClient.Sender = sender
applicationsClient.SkipResourceProviderRegistration = c.skipProviderRegistration
c.applicationsClient = applicationsClient

servicePrincipalsClient := graphrbac.NewServicePrincipalsClientWithBaseURI(graphEndpoint, tenantId)
setUserAgent(&servicePrincipalsClient.Client)
servicePrincipalsClient.Authorizer = graphAuth
Expand Down
105 changes: 105 additions & 0 deletions azurerm/import_arm_ad_application_test.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,105 @@
package azurerm

import (
"testing"
"time"

"github.com/google/uuid"
"github.com/hashicorp/terraform/helper/resource"
)

func TestAccAzureRMAdApplication_importSimple(t *testing.T) {
resourceName := "azurerm_ad_application.test"

id := uuid.New().String()
config := testAccAzureRMAdApplication_simple(id)

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMAdApplicationDestroy,
Steps: []resource.TestStep{
{
Config: config,
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}

func TestAccAzureRMAdApplication_importAdvanced(t *testing.T) {
resourceName := "azurerm_ad_application.test"

id := uuid.New().String()
config := testAccAzureRMAdApplication_advanced(id)

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMAdApplicationDestroy,
Steps: []resource.TestStep{
{
Config: config,
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}

func TestAccAzureRMAdApplication_importKeyCredential(t *testing.T) {
resourceName := "azurerm_ad_application.test"

id := uuid.New().String()
keyId := uuid.New().String()
config := testAccAzureRMAdApplication_keyCredential_single(id, keyId, "AsymmetricX509Cert")

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProvidersWithTLS,
CheckDestroy: testCheckAzureRMAdApplicationDestroy,
Steps: []resource.TestStep{
{
Config: config,
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}

func TestAccAzureRMAdApplication_importPasswordCredential(t *testing.T) {
resourceName := "azurerm_ad_application.test"

id := uuid.New().String()
keyId := uuid.New().String()
timeStart := time.Now().UTC()
timeEnd := timeStart.Add(time.Duration(1) * time.Hour)
config := testAccAzureRMAdApplication_passwordCredential_single(id, keyId, timeStart, timeEnd)

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMAdApplicationDestroy,
Steps: []resource.TestStep{
{
Config: config,
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
214 changes: 214 additions & 0 deletions azurerm/key_credentials.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,214 @@
package azurerm

import (
"bytes"
"fmt"
"regexp"
"time"

"github.com/Azure/azure-sdk-for-go/services/graphrbac/1.6/graphrbac"
"github.com/Azure/go-autorest/autorest/date"
"github.com/hashicorp/terraform/helper/hashcode"
"github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/helper/validation"
)

func keyCredentialsSchema() *schema.Schema {
return &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key_id": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validateUUID,
},

"start_date": {
Type: schema.TypeString,
Required: true,
DiffSuppressFunc: compareDataAsUTCSuppressFunc,
ValidateFunc: validateRFC3339Date,
},

"end_date": {
Type: schema.TypeString,
Required: true,
DiffSuppressFunc: compareDataAsUTCSuppressFunc,
ValidateFunc: validateRFC3339Date,
},

"type": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validation.StringInSlice([]string{
"AsymmetricX509Cert",
"Symmetric",
}, true),
},

"usage": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validation.StringInSlice([]string{
"Verify",
"Sign",
}, true),
},

"value": {
Type: schema.TypeString,
Required: true,
Sensitive: true,
},
},
},
Set: resourceKeyCredentialHash,
}
}

func customizeDiffKeyCredential(diff *schema.ResourceDiff, v interface{}) error {
o, n := diff.GetChange("key_credential")
if o == nil {
o = new(schema.Set)
}
if n == nil {
n = new(schema.Set)
}
os := o.(*schema.Set)
ns := n.(*schema.Set)

// Detect if the user changed a key credential property without changing the
// KeyID associated with the credential. Changing the property changes the hash,
// which causes Terraform to pick it up as a new Set item. This will cause
// a conflict due to the unique KeyID requirement.
m := make(map[string]string)
for _, v := range os.Difference(ns).List() {
x := v.(map[string]interface{})
m[x["key_id"].(string)] = x["key_id"].(string)
}
for _, v := range ns.Difference(os).List() {
x := v.(map[string]interface{})
if _, ok := m[x["key_id"].(string)]; ok {
return fmt.Errorf("Error: changing Key Credential properties on existing KeyID %s requires generating a new unique KeyID.", x["key_id"].(string))
}
}

return nil
}

func resourceKeyCredentialHash(v interface{}) int {
var buf bytes.Buffer

if v != nil {
m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%s-", m["key_id"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["type"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["usage"].(string)))

// We parse the DateTimes and then convert them back to a string
// in order to have a consistent format for the hash.

if st, err := time.Parse(time.RFC3339, m["start_date"].(string)); err == nil {
buf.WriteString(fmt.Sprintf("%s-", string((st).Format(time.RFC3339))))
}

if et, err := time.Parse(time.RFC3339, m["end_date"].(string)); err == nil {
buf.WriteString(fmt.Sprintf("%s-", string((et).Format(time.RFC3339))))
}
}

return hashcode.String(buf.String())
}

func flattenAzureRmKeyCredential(cred *graphrbac.KeyCredential) interface{} {
l := make(map[string]interface{})
l["key_id"] = *cred.KeyID
l["type"] = *cred.Type
l["usage"] = *cred.Usage
l["start_date"] = string((*cred.StartDate).Format(time.RFC3339))
l["end_date"] = string((*cred.EndDate).Format(time.RFC3339))

return l
}

func flattenAzureRmKeyCredentials(creds *[]graphrbac.KeyCredential) []interface{} {
result := make([]interface{}, 0, len(*creds))
for _, cred := range *creds {
result = append(result, flattenAzureRmKeyCredential(&cred))
}
return result
}

func expandAzureRmKeyCredential(d *map[string]interface{}) (*graphrbac.KeyCredential, error) {
keyId := (*d)["key_id"].(string)
startDate := (*d)["start_date"].(string)
endDate := (*d)["end_date"].(string)
keyType := (*d)["type"].(string)
usage := (*d)["usage"].(string)
value := (*d)["value"].(string)

if keyType == "AsymmetricX509Cert" && usage == "Sign" {
return nil, fmt.Errorf("Usage cannot be set to %s when %s is set as type for a Key Credential", usage, keyType)
}

// Match against the prefix/suffix and '\n' of certificate values.
// The API doesn't accept them so they need to be removed.
pkre := regexp.MustCompile(`(-{5}.+?-{5})|(\n)`)
value = pkre.ReplaceAllString(value, ``)

kc := graphrbac.KeyCredential{
KeyID: &keyId,
Type: &keyType,
Usage: &usage,
Value: &value,
}

if startDate != "" {
starttime, sterr := time.Parse(time.RFC3339, startDate)
if sterr != nil {
return nil, fmt.Errorf("Cannot parse start_date: %q", startDate)
}
stdt := date.Time{Time: starttime.Truncate(time.Second)}
kc.StartDate = &stdt
}

if endDate != "" {
endtime, eterr := time.Parse(time.RFC3339, endDate)
if eterr != nil {
return nil, fmt.Errorf("Cannot parse end_date: %q", endDate)
}
etdt := date.Time{Time: endtime.Truncate(time.Second)}
kc.EndDate = &etdt
}

return &kc, nil
}

func expandAzureRmKeyCredentials(d *schema.ResourceData, o *schema.Set) (*[]graphrbac.KeyCredential, error) {
creds := d.Get("key_credential").(*schema.Set).List()
keyCreds := make([]graphrbac.KeyCredential, 0, len(creds))

for _, v := range creds {
cfg := v.(map[string]interface{})
cred, err := expandAzureRmKeyCredential(&cfg)
if err != nil {
return nil, err
}

// Azure only allows an in-place update of the Key Credentials list.
// Existing keys, matched by their KeyID, must be sent back with their
// Value attribute set to nil. New keys need to provide a Value.
// By referencing the existing schema (o), we can determine which
// entries in the list are existing keys.
if o != nil && o.Contains(v) {
cred.Value = nil
}

keyCreds = append(keyCreds, *cred)
}

return &keyCreds, nil
}
Loading

0 comments on commit 0c827de

Please sign in to comment.