Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix typos in attribute names in wireless_ssid #154

Merged
merged 1 commit into from
Dec 2, 2024
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
2 changes: 2 additions & 0 deletions CHANGELOG.md
Original file line number Diff line number Diff line change
@@ -1,5 +1,7 @@
## 0.1.17 (unreleased)

- BREAKING CHANGE: Rename `auth_key_sae_ext_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key_sae_ext_plus_ft`
- BREAKING CHANGE: Rename `auth_key8021x_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key8021x_plus_ft`
- Add device unreachability warning to `catalystcenter_anycast_gateway`, `catalystcenter_fabric_l2_handoff`, `catalystcenter_fabric_device`, `catalystcenter_fabric_port_assignment` and `catalystcenter_provision_device` resources
- Add `auth_key_psk` and `auth_key_psk_plus_ft` attributes to `catalystcenter_wireless_ssid` resource and data source

Expand Down
4 changes: 2 additions & 2 deletions docs/data-sources/wireless_ssid.md
Original file line number Diff line number Diff line change
Expand Up @@ -34,7 +34,7 @@ data "catalystcenter_wireless_ssid" "example" {
- `acl_name` (String) Pre-Auth Access Control List (ACL) Name
- `ap_beacon_protection` (Boolean) When set to true, the Access Point (AP) Beacon Protection feature is activated, enhancing the security of the network
- `auth_key8021x` (Boolean) When set to true, the 802.1X authentication key is in use
- `auth_key8021x_plus_tf` (Boolean) When set to true, the 802.1X-Plus-FT authentication key is in use
- `auth_key8021x_plus_ft` (Boolean) When set to true, the 802.1X-Plus-FT authentication key is in use
- `auth_key8021x_sha256` (Boolean) When set to true, the feature that enables 802.1X authentication using the SHA256 algorithm is turned on
- `auth_key_easy_psk` (Boolean) When set to true, the feature that enables the use of Easy Pre-shared Key (PSK) authentication is activated
- `auth_key_easy_psk_sha256` (Boolean) The feature that allows the use of Pre-shared Key (PSK) authentication with the SHA256 algorithm is enabled when it is set to true
Expand All @@ -43,7 +43,7 @@ data "catalystcenter_wireless_ssid" "example" {
- `auth_key_psk_plus_ft` (Boolean) When set to true, the feature that enables the combination of Pre-shared Key (PSK) and Fast Transition (FT) authentication keys is activated
- `auth_key_sae` (Boolean) When set to true, the feature enabling the Simultaneous Authentication of Equals (SAE) authentication key is activated
- `auth_key_sae_ext` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) Extended Authentication key feature is turned on
- `auth_key_sae_ext_plus_tf` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled
- `auth_key_sae_ext_plus_ft` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled
- `auth_key_sae_plus_ft` (Boolean) When set to true, the feature that enables the combination of Pre-shared Key (PSK) and Fast Transition (FT) authentication keys is activated
- `auth_key_suite_b1921x` (Boolean) When set to true, the SuiteB192-1x authentication key feature is enabled
- `auth_key_suite_b1x` (Boolean) When activated by setting it to true, the SuiteB-1x authentication key feature is engaged
Expand Down
2 changes: 2 additions & 0 deletions docs/guides/changelog.md
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ description: |-

## 0.1.17 (unreleased)

- BREAKING CHANGE: Rename `auth_key_sae_ext_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key_sae_ext_plus_ft`
- BREAKING CHANGE: Rename `auth_key8021x_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key8021x_plus_ft`
- Add device unreachability warning to `catalystcenter_anycast_gateway`, `catalystcenter_fabric_l2_handoff`, `catalystcenter_fabric_device`, `catalystcenter_fabric_port_assignment` and `catalystcenter_provision_device` resources
- Add `auth_key_psk` and `auth_key_psk_plus_ft` attributes to `catalystcenter_wireless_ssid` resource and data source

Expand Down
4 changes: 2 additions & 2 deletions docs/resources/wireless_ssid.md
Original file line number Diff line number Diff line change
Expand Up @@ -62,7 +62,7 @@ resource "catalystcenter_wireless_ssid" "example" {
- `acl_name` (String) Pre-Auth Access Control List (ACL) Name
- `ap_beacon_protection` (Boolean) When set to true, the Access Point (AP) Beacon Protection feature is activated, enhancing the security of the network
- `auth_key8021x` (Boolean) When set to true, the 802.1X authentication key is in use
- `auth_key8021x_plus_tf` (Boolean) When set to true, the 802.1X-Plus-FT authentication key is in use
- `auth_key8021x_plus_ft` (Boolean) When set to true, the 802.1X-Plus-FT authentication key is in use
- `auth_key8021x_sha256` (Boolean) When set to true, the feature that enables 802.1X authentication using the SHA256 algorithm is turned on
- `auth_key_easy_psk` (Boolean) When set to true, the feature that enables the use of Easy Pre-shared Key (PSK) authentication is activated
- `auth_key_easy_psk_sha256` (Boolean) The feature that allows the use of Pre-shared Key (PSK) authentication with the SHA256 algorithm is enabled when it is set to true
Expand All @@ -71,7 +71,7 @@ resource "catalystcenter_wireless_ssid" "example" {
- `auth_key_psk_plus_ft` (Boolean) When set to true, the feature that enables the combination of Pre-shared Key (PSK) and Fast Transition (FT) authentication keys is activated
- `auth_key_sae` (Boolean) When set to true, the feature enabling the Simultaneous Authentication of Equals (SAE) authentication key is activated
- `auth_key_sae_ext` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) Extended Authentication key feature is turned on
- `auth_key_sae_ext_plus_tf` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled
- `auth_key_sae_ext_plus_ft` (Boolean) When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled
- `auth_key_sae_plus_ft` (Boolean) When set to true, the feature that enables the combination of Pre-shared Key (PSK) and Fast Transition (FT) authentication keys is activated
- `auth_key_suite_b1921x` (Boolean) When set to true, the SuiteB192-1x authentication key feature is enabled
- `auth_key_suite_b1x` (Boolean) When activated by setting it to true, the SuiteB-1x authentication key feature is engaged
Expand Down
4 changes: 2 additions & 2 deletions gen/definitions/wireless_ssid.yaml
Original file line number Diff line number Diff line change
Expand Up @@ -204,7 +204,7 @@ attributes:
description: When set to true, the 802.1X authentication key is in use
exclude_test: true
- model_name: isAuthKey8021xPlusFT
tf_name: auth_key8021x_plus_tf
tf_name: auth_key8021x_plus_ft
type: Bool
description: When set to true, the 802.1X-Plus-FT authentication key is in use
exclude_test: true
Expand Down Expand Up @@ -357,7 +357,7 @@ attributes:
description: When set to true, the Simultaneous Authentication of Equals (SAE) Extended Authentication key feature is turned on
example: true
- model_name: isAuthKeySaeExtPlusFT
tf_name: auth_key_sae_ext_plus_tf
tf_name: auth_key_sae_ext_plus_ft
type: Bool
description: When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled
exclude_test: true
Expand Down
4 changes: 2 additions & 2 deletions internal/provider/data_source_catalystcenter_wireless_ssid.go
Original file line number Diff line number Diff line change
Expand Up @@ -202,7 +202,7 @@ func (d *WirelessSSIDDataSource) Schema(ctx context.Context, req datasource.Sche
MarkdownDescription: "When set to true, the 802.1X authentication key is in use",
Computed: true,
},
"auth_key8021x_plus_tf": schema.BoolAttribute{
"auth_key8021x_plus_ft": schema.BoolAttribute{
MarkdownDescription: "When set to true, the 802.1X-Plus-FT authentication key is in use",
Computed: true,
},
Expand Down Expand Up @@ -316,7 +316,7 @@ func (d *WirelessSSIDDataSource) Schema(ctx context.Context, req datasource.Sche
MarkdownDescription: "When set to true, the Simultaneous Authentication of Equals (SAE) Extended Authentication key feature is turned on",
Computed: true,
},
"auth_key_sae_ext_plus_tf": schema.BoolAttribute{
"auth_key_sae_ext_plus_ft": schema.BoolAttribute{
MarkdownDescription: "When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled",
Computed: true,
},
Expand Down
36 changes: 18 additions & 18 deletions internal/provider/model_catalystcenter_wireless_ssid.go
Original file line number Diff line number Diff line change
Expand Up @@ -65,7 +65,7 @@ type WirelessSSID struct {
RsnCipherSuiteCcmp128 types.Bool `tfsdk:"rsn_cipher_suite_ccmp128"`
Ghz6PolicyClientSteering types.Bool `tfsdk:"ghz6_policy_client_steering"`
AuthKey8021x types.Bool `tfsdk:"auth_key8021x"`
AuthKey8021xPlusTf types.Bool `tfsdk:"auth_key8021x_plus_tf"`
AuthKey8021xPlusFt types.Bool `tfsdk:"auth_key8021x_plus_ft"`
AuthKey8021xSha256 types.Bool `tfsdk:"auth_key8021x_sha256"`
AuthKeySae types.Bool `tfsdk:"auth_key_sae"`
AuthKeySaePlusFt types.Bool `tfsdk:"auth_key_sae_plus_ft"`
Expand Down Expand Up @@ -93,7 +93,7 @@ type WirelessSSID struct {
AuthKeySuiteB1x types.Bool `tfsdk:"auth_key_suite_b1x"`
AuthKeySuiteB1921x types.Bool `tfsdk:"auth_key_suite_b1921x"`
AuthKeySaeExt types.Bool `tfsdk:"auth_key_sae_ext"`
AuthKeySaeExtPlusTf types.Bool `tfsdk:"auth_key_sae_ext_plus_tf"`
AuthKeySaeExtPlusFt types.Bool `tfsdk:"auth_key_sae_ext_plus_ft"`
ApBeaconProtection types.Bool `tfsdk:"ap_beacon_protection"`
Ghz24Policy types.String `tfsdk:"ghz24_policy"`
CckmTsfTolerance types.Int64 `tfsdk:"cckm_tsf_tolerance"`
Expand Down Expand Up @@ -235,8 +235,8 @@ func (data WirelessSSID) toBody(ctx context.Context, state WirelessSSID) string
if !data.AuthKey8021x.IsNull() {
body, _ = sjson.Set(body, "isAuthKey8021x", data.AuthKey8021x.ValueBool())
}
if !data.AuthKey8021xPlusTf.IsNull() {
body, _ = sjson.Set(body, "isAuthKey8021xPlusFT", data.AuthKey8021xPlusTf.ValueBool())
if !data.AuthKey8021xPlusFt.IsNull() {
body, _ = sjson.Set(body, "isAuthKey8021xPlusFT", data.AuthKey8021xPlusFt.ValueBool())
}
if !data.AuthKey8021xSha256.IsNull() {
body, _ = sjson.Set(body, "isAuthKey8021x_SHA256", data.AuthKey8021xSha256.ValueBool())
Expand Down Expand Up @@ -323,8 +323,8 @@ func (data WirelessSSID) toBody(ctx context.Context, state WirelessSSID) string
if !data.AuthKeySaeExt.IsNull() {
body, _ = sjson.Set(body, "isAuthKeySaeExt", data.AuthKeySaeExt.ValueBool())
}
if !data.AuthKeySaeExtPlusTf.IsNull() {
body, _ = sjson.Set(body, "isAuthKeySaeExtPlusFT", data.AuthKeySaeExtPlusTf.ValueBool())
if !data.AuthKeySaeExtPlusFt.IsNull() {
body, _ = sjson.Set(body, "isAuthKeySaeExtPlusFT", data.AuthKeySaeExtPlusFt.ValueBool())
}
if !data.ApBeaconProtection.IsNull() {
body, _ = sjson.Set(body, "isApBeaconProtectionEnabled", data.ApBeaconProtection.ValueBool())
Expand Down Expand Up @@ -518,9 +518,9 @@ func (data *WirelessSSID) fromBody(ctx context.Context, res gjson.Result) {
data.AuthKey8021x = types.BoolNull()
}
if value := res.Get("isAuthKey8021xPlusFT"); value.Exists() {
data.AuthKey8021xPlusTf = types.BoolValue(value.Bool())
data.AuthKey8021xPlusFt = types.BoolValue(value.Bool())
} else {
data.AuthKey8021xPlusTf = types.BoolNull()
data.AuthKey8021xPlusFt = types.BoolNull()
}
if value := res.Get("isAuthKey8021x_SHA256"); value.Exists() {
data.AuthKey8021xSha256 = types.BoolValue(value.Bool())
Expand Down Expand Up @@ -658,9 +658,9 @@ func (data *WirelessSSID) fromBody(ctx context.Context, res gjson.Result) {
data.AuthKeySaeExt = types.BoolNull()
}
if value := res.Get("isAuthKeySaeExtPlusFT"); value.Exists() {
data.AuthKeySaeExtPlusTf = types.BoolValue(value.Bool())
data.AuthKeySaeExtPlusFt = types.BoolValue(value.Bool())
} else {
data.AuthKeySaeExtPlusTf = types.BoolNull()
data.AuthKeySaeExtPlusFt = types.BoolNull()
}
if value := res.Get("isApBeaconProtectionEnabled"); value.Exists() {
data.ApBeaconProtection = types.BoolValue(value.Bool())
Expand Down Expand Up @@ -882,10 +882,10 @@ func (data *WirelessSSID) updateFromBody(ctx context.Context, res gjson.Result)
} else {
data.AuthKey8021x = types.BoolNull()
}
if value := res.Get("isAuthKey8021xPlusFT"); value.Exists() && !data.AuthKey8021xPlusTf.IsNull() {
data.AuthKey8021xPlusTf = types.BoolValue(value.Bool())
if value := res.Get("isAuthKey8021xPlusFT"); value.Exists() && !data.AuthKey8021xPlusFt.IsNull() {
data.AuthKey8021xPlusFt = types.BoolValue(value.Bool())
} else {
data.AuthKey8021xPlusTf = types.BoolNull()
data.AuthKey8021xPlusFt = types.BoolNull()
}
if value := res.Get("isAuthKey8021x_SHA256"); value.Exists() && !data.AuthKey8021xSha256.IsNull() {
data.AuthKey8021xSha256 = types.BoolValue(value.Bool())
Expand Down Expand Up @@ -1022,10 +1022,10 @@ func (data *WirelessSSID) updateFromBody(ctx context.Context, res gjson.Result)
} else {
data.AuthKeySaeExt = types.BoolNull()
}
if value := res.Get("isAuthKeySaeExtPlusFT"); value.Exists() && !data.AuthKeySaeExtPlusTf.IsNull() {
data.AuthKeySaeExtPlusTf = types.BoolValue(value.Bool())
if value := res.Get("isAuthKeySaeExtPlusFT"); value.Exists() && !data.AuthKeySaeExtPlusFt.IsNull() {
data.AuthKeySaeExtPlusFt = types.BoolValue(value.Bool())
} else {
data.AuthKeySaeExtPlusTf = types.BoolNull()
data.AuthKeySaeExtPlusFt = types.BoolNull()
}
if value := res.Get("isApBeaconProtectionEnabled"); value.Exists() && !data.ApBeaconProtection.IsNull() {
data.ApBeaconProtection = types.BoolValue(value.Bool())
Expand Down Expand Up @@ -1158,7 +1158,7 @@ func (data *WirelessSSID) isNull(ctx context.Context, res gjson.Result) bool {
if !data.AuthKey8021x.IsNull() {
return false
}
if !data.AuthKey8021xPlusTf.IsNull() {
if !data.AuthKey8021xPlusFt.IsNull() {
return false
}
if !data.AuthKey8021xSha256.IsNull() {
Expand Down Expand Up @@ -1242,7 +1242,7 @@ func (data *WirelessSSID) isNull(ctx context.Context, res gjson.Result) bool {
if !data.AuthKeySaeExt.IsNull() {
return false
}
if !data.AuthKeySaeExtPlusTf.IsNull() {
if !data.AuthKeySaeExtPlusFt.IsNull() {
return false
}
if !data.ApBeaconProtection.IsNull() {
Expand Down
4 changes: 2 additions & 2 deletions internal/provider/resource_catalystcenter_wireless_ssid.go
Original file line number Diff line number Diff line change
Expand Up @@ -251,7 +251,7 @@ func (r *WirelessSSIDResource) Schema(ctx context.Context, req resource.SchemaRe
MarkdownDescription: helpers.NewAttributeDescription("When set to true, the 802.1X authentication key is in use").String,
Optional: true,
},
"auth_key8021x_plus_tf": schema.BoolAttribute{
"auth_key8021x_plus_ft": schema.BoolAttribute{
MarkdownDescription: helpers.NewAttributeDescription("When set to true, the 802.1X-Plus-FT authentication key is in use").String,
Optional: true,
},
Expand Down Expand Up @@ -383,7 +383,7 @@ func (r *WirelessSSIDResource) Schema(ctx context.Context, req resource.SchemaRe
MarkdownDescription: helpers.NewAttributeDescription("When set to true, the Simultaneous Authentication of Equals (SAE) Extended Authentication key feature is turned on").String,
Optional: true,
},
"auth_key_sae_ext_plus_tf": schema.BoolAttribute{
"auth_key_sae_ext_plus_ft": schema.BoolAttribute{
MarkdownDescription: helpers.NewAttributeDescription("When set to true, the Simultaneous Authentication of Equals (SAE) combined with Fast Transition (FT) Authentication Key feature is enabled").String,
Optional: true,
},
Expand Down
2 changes: 2 additions & 0 deletions templates/guides/changelog.md.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -9,6 +9,8 @@ description: |-

## 0.1.17 (unreleased)

- BREAKING CHANGE: Rename `auth_key_sae_ext_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key_sae_ext_plus_ft`
- BREAKING CHANGE: Rename `auth_key8021x_plus_tf` attribute of `catalystcenter_wireless_ssid` resource to `auth_key8021x_plus_ft`
- Add device unreachability warning to `catalystcenter_anycast_gateway`, `catalystcenter_fabric_l2_handoff`, `catalystcenter_fabric_device`, `catalystcenter_fabric_port_assignment` and `catalystcenter_provision_device` resources
- Add `auth_key_psk` and `auth_key_psk_plus_ft` attributes to `catalystcenter_wireless_ssid` resource and data source

Expand Down
Loading