@@ -165,7 +165,7 @@ func (r *UserResource) Create(ctx context.Context, req resource.CreateRequest, r
165
165
166
166
hasEnvDataverse , err := r .UserClient .EnvironmentHasDataverse (ctx , plan .EnvironmentId .ValueString ())
167
167
if err != nil {
168
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
168
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
169
169
return
170
170
}
171
171
tflog .Debug (ctx , fmt .Sprintf ("Dataverse exist in eviroment %t" , hasEnvDataverse ))
@@ -174,26 +174,26 @@ func (r *UserResource) Create(ctx context.Context, req resource.CreateRequest, r
174
174
if hasEnvDataverse {
175
175
user , err := r .UserClient .CreateDataverseUser (ctx , plan .EnvironmentId .ValueString (), plan .AadId .ValueString ())
176
176
if err != nil {
177
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
177
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
178
178
return
179
179
}
180
180
181
181
user , err = r .UserClient .AddDataverseSecurityRoles (ctx , plan .EnvironmentId .ValueString (), user .Id , plan .SecurityRoles )
182
182
if err != nil {
183
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
183
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
184
184
return
185
185
}
186
186
newUser = * user
187
187
} else {
188
188
// todo disalbe delete should be set to false.
189
189
err := validateEnvironmentSecurityRoles (plan .SecurityRoles )
190
190
if err != nil {
191
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
191
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
192
192
}
193
193
194
194
user , err := r .UserClient .CreateEnvironmentUser (ctx , plan .EnvironmentId .ValueString (), plan .AadId .ValueString (), plan .SecurityRoles )
195
195
if err != nil {
196
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
196
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
197
197
return
198
198
}
199
199
@@ -236,7 +236,7 @@ func (r *UserResource) Read(ctx context.Context, req resource.ReadRequest, resp
236
236
237
237
hasEnvDataverse , err := r .UserClient .EnvironmentHasDataverse (ctx , state .EnvironmentId .ValueString ())
238
238
if err != nil {
239
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
239
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
240
240
return
241
241
}
242
242
tflog .Debug (ctx , fmt .Sprintf ("Dataverse exist in eviroment %t" , hasEnvDataverse ))
@@ -249,7 +249,7 @@ func (r *UserResource) Read(ctx context.Context, req resource.ReadRequest, resp
249
249
resp .State .RemoveResource (ctx )
250
250
return
251
251
}
252
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when reading %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
252
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when reading %s" , r .FullTypeName () ), err .Error ())
253
253
return
254
254
}
255
255
updateUser = * user
@@ -266,7 +266,7 @@ func (r *UserResource) Read(ctx context.Context, req resource.ReadRequest, resp
266
266
resp .State .RemoveResource (ctx )
267
267
return
268
268
}
269
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when reading %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
269
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when reading %s" , r .FullTypeName () ), err .Error ())
270
270
return
271
271
}
272
272
@@ -292,7 +292,7 @@ func (r *UserResource) Read(ctx context.Context, req resource.ReadRequest, resp
292
292
state .DisableDelete = model .DisableDelete
293
293
state .BusinessUnitId = model .BusinessUnitId
294
294
295
- tflog .Debug (ctx , fmt .Sprintf ("READ: %s_environment with id %s" , r .ProviderTypeName , state .Id .ValueString ()))
295
+ tflog .Debug (ctx , fmt .Sprintf ("READ: %s with id %s" , r .FullTypeName () , state .Id .ValueString ()))
296
296
297
297
resp .Diagnostics .Append (resp .State .Set (ctx , & state )... )
298
298
}
@@ -314,7 +314,7 @@ func (r *UserResource) Update(ctx context.Context, req resource.UpdateRequest, r
314
314
315
315
hasEnvDataverse , err := r .UserClient .EnvironmentHasDataverse (ctx , state .EnvironmentId .ValueString ())
316
316
if err != nil {
317
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
317
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
318
318
return
319
319
}
320
320
tflog .Debug (ctx , fmt .Sprintf ("Dataverse exist in eviroment %t" , hasEnvDataverse ))
@@ -325,28 +325,28 @@ func (r *UserResource) Update(ctx context.Context, req resource.UpdateRequest, r
325
325
if len (addedSecurityRoles ) > 0 {
326
326
userDto , err := r .UserClient .AddDataverseSecurityRoles (ctx , plan .EnvironmentId .ValueString (), state .Id .ValueString (), addedSecurityRoles )
327
327
if err != nil {
328
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when adding security roles %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
328
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when adding security roles %s" , r .FullTypeName () ), err .Error ())
329
329
return
330
330
}
331
331
user = * userDto
332
332
}
333
333
if len (removedSecurityRoles ) > 0 {
334
334
userDto , err := r .UserClient .RemoveDataverseSecurityRoles (ctx , plan .EnvironmentId .ValueString (), state .Id .ValueString (), removedSecurityRoles )
335
335
if err != nil {
336
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when removing security roles %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
336
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when removing security roles %s" , r .FullTypeName () ), err .Error ())
337
337
return
338
338
}
339
339
user = * userDto
340
340
}
341
341
} else {
342
342
err := validateEnvironmentSecurityRoles (plan .SecurityRoles )
343
343
if err != nil {
344
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when updating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
344
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when updating %s" , r .FullTypeName () ), err .Error ())
345
345
}
346
346
if len (addedSecurityRoles ) > 0 {
347
347
userDto , err := r .UserClient .AddEnvironmentUserSecurityRoles (ctx , plan .EnvironmentId .ValueString (), plan .AadId .ValueString (), addedSecurityRoles )
348
348
if err != nil {
349
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when adding security roles %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
349
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when adding security roles %s" , r .FullTypeName () ), err .Error ())
350
350
return
351
351
}
352
352
user = * userDto
@@ -355,19 +355,19 @@ func (r *UserResource) Update(ctx context.Context, req resource.UpdateRequest, r
355
355
savedRoles := []securityRoleDto {}
356
356
rolesObj , diag := resp .Private .GetKey (ctx , "role" )
357
357
if diag .HasError () {
358
- resp .Diagnostics .AddError (fmt .Sprintf ("Error when updating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
358
+ resp .Diagnostics .AddError (fmt .Sprintf ("Error when updating %s" , r .FullTypeName () ), err .Error ())
359
359
return
360
360
}
361
361
362
362
err := json .Unmarshal (rolesObj , & savedRoles )
363
363
if err != nil {
364
- resp .Diagnostics .AddError (fmt .Sprintf ("Error when updating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
364
+ resp .Diagnostics .AddError (fmt .Sprintf ("Error when updating %s" , r .FullTypeName () ), err .Error ())
365
365
return
366
366
}
367
367
368
368
userDto , err := r .UserClient .RemoveEnvironmentUserSecurityRoles (ctx , plan .EnvironmentId .ValueString (), plan .AadId .ValueString (), removedSecurityRoles , savedRoles )
369
369
if err != nil {
370
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when removing security roles %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
370
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when removing security roles %s" , r .FullTypeName () ), err .Error ())
371
371
return
372
372
}
373
373
user = * userDto
@@ -409,7 +409,7 @@ func (r *UserResource) Delete(ctx context.Context, req resource.DeleteRequest, r
409
409
410
410
hasEnvDataverse , err := r .UserClient .EnvironmentHasDataverse (ctx , state .EnvironmentId .ValueString ())
411
411
if err != nil {
412
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
412
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when creating %s" , r .FullTypeName () ), err .Error ())
413
413
return
414
414
}
415
415
tflog .Debug (ctx , fmt .Sprintf ("Dataverse exist in eviroment %t" , hasEnvDataverse ))
@@ -418,7 +418,7 @@ func (r *UserResource) Delete(ctx context.Context, req resource.DeleteRequest, r
418
418
if state .DisableDelete .ValueBool () {
419
419
err := r .UserClient .DeleteDataverseUser (ctx , state .EnvironmentId .ValueString (), state .Id .ValueString ())
420
420
if err != nil {
421
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when deleting %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
421
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when deleting %s" , r .FullTypeName () ), err .Error ())
422
422
return
423
423
}
424
424
} else {
@@ -433,17 +433,17 @@ func (r *UserResource) Delete(ctx context.Context, req resource.DeleteRequest, r
433
433
434
434
err := json .Unmarshal (rolesObj , & savedRoles )
435
435
if err != nil {
436
- resp .Diagnostics .AddError (fmt .Sprintf ("Error when deleting %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
436
+ resp .Diagnostics .AddError (fmt .Sprintf ("Error when deleting %s" , r .FullTypeName () ), err .Error ())
437
437
return
438
438
}
439
439
440
440
_ , err = r .UserClient .RemoveEnvironmentUserSecurityRoles (ctx , state .EnvironmentId .ValueString (), state .AadId .ValueString (), state .SecurityRoles , savedRoles )
441
441
if err != nil {
442
- resp .Diagnostics .AddError (fmt .Sprintf ("Client error when deleting %s_% s" , r .ProviderTypeName , r . TypeName ), err .Error ())
442
+ resp .Diagnostics .AddError (fmt .Sprintf ("Client error when deleting %s" , r .FullTypeName () ), err .Error ())
443
443
return
444
444
}
445
445
}
446
- tflog .Debug (ctx , fmt .Sprintf ("DELETE RESOURCE END: %s" , r .ProviderTypeName ))
446
+ tflog .Debug (ctx , fmt .Sprintf ("DELETE RESOURCE END: %s" , r .FullTypeName () ))
447
447
}
448
448
449
449
func (r * UserResource ) ImportState (ctx context.Context , req resource.ImportStateRequest , resp * resource.ImportStateResponse ) {
0 commit comments