openstack_cli 0.13.5

OpenStack client rewritten in Rust
Documentation
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//     http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
//
// SPDX-License-Identifier: Apache-2.0
//
// WARNING: This file is automatically generated from OpenAPI schema using
// `openstack-codegenerator`.

//! Create IdentityProvider command
//!
//! Wraps invoking of the `v3/OS-FEDERATION/identity_providers/{idp_id}` with `PUT` method

use clap::Args;
use eyre::WrapErr;
use tracing::info;

use openstack_sdk::AsyncOpenStack;

use crate::Cli;
use crate::OpenStackCliError;
use crate::output::OutputProcessor;

use openstack_sdk::api::QueryAsync;
use openstack_sdk::api::identity::v3::os_federation::identity_provider::create;
use openstack_types::identity::v3::os_federation::identity_provider::response::create::IdentityProviderResponse;

/// Create an idp resource for federated authentication.
///
/// PUT /OS-FEDERATION/identity_providers/{idp_id}
#[derive(Args)]
pub struct IdentityProviderCommand {
    /// Request Query parameters
    #[command(flatten)]
    query: QueryParameters,

    /// Path parameters
    #[command(flatten)]
    path: PathParameters,

    #[command(flatten)]
    identity_provider: IdentityProvider,
}

/// Query parameters
#[derive(Args)]
struct QueryParameters {}

/// Path parameters
#[derive(Args)]
struct PathParameters {
    /// idp_id parameter for /v3/OS-FEDERATION/identity_providers/{idp_id} API
    #[arg(
        help_heading = "Path parameters",
        id = "path_param_idp_id",
        value_name = "IDP_ID"
    )]
    idp_id: String,
}
/// IdentityProvider Body data
#[derive(Args, Clone)]
struct IdentityProvider {
    /// The length of validity in minutes for group memberships carried over
    /// through mapping and persisted in the database. If left unset, the
    /// default value configured in keystone will be used, if enabled.
    #[arg(help_heading = "Body parameters", long)]
    authorization_ttl: Option<Option<u32>>,

    /// The identity provider description
    #[arg(help_heading = "Body parameters", long)]
    description: Option<String>,

    /// Set explicit NULL for the description
    #[arg(help_heading = "Body parameters", long, action = clap::ArgAction::SetTrue, conflicts_with = "description")]
    no_description: bool,

    /// The ID of a domain that is associated with the identity provider.
    /// Federated users that authenticate with the identity provider will be
    /// created under the domain specified.
    #[arg(help_heading = "Body parameters", long)]
    domain_id: Option<String>,

    /// Set explicit NULL for the domain_id
    #[arg(help_heading = "Body parameters", long, action = clap::ArgAction::SetTrue, conflicts_with = "domain_id")]
    no_domain_id: bool,

    /// Whether the identity provider is enabled or not
    #[arg(action=clap::ArgAction::Set, help_heading = "Body parameters", long)]
    enabled: Option<bool>,

    /// List of the unique identity provider's remote IDs
    ///
    /// Parameter is an array, may be provided multiple times.
    #[arg(action=clap::ArgAction::Append, help_heading = "Body parameters", long)]
    remote_ids: Option<Vec<String>>,
}

impl IdentityProviderCommand {
    /// Perform command action
    pub async fn take_action(
        &self,
        parsed_args: &Cli,
        client: &mut AsyncOpenStack,
    ) -> Result<(), OpenStackCliError> {
        info!("Create IdentityProvider");

        let op = OutputProcessor::from_args(
            parsed_args,
            Some("identity.OS_FEDERATION/identity_provider"),
            Some("create"),
        );
        op.validate_args(parsed_args)?;

        let mut ep_builder = create::Request::builder();

        ep_builder.idp_id(&self.path.idp_id);

        // Set body parameters
        // Set Request.identity_provider data
        let args = &self.identity_provider;
        let mut identity_provider_builder = create::IdentityProviderBuilder::default();
        if let Some(val) = &args.authorization_ttl {
            identity_provider_builder.authorization_ttl(*val);
        }

        if let Some(val) = &args.description {
            identity_provider_builder.description(Some(val.into()));
        } else if args.no_description {
            identity_provider_builder.description(None);
        }

        if let Some(val) = &args.domain_id {
            identity_provider_builder.domain_id(Some(val.into()));
        } else if args.no_domain_id {
            identity_provider_builder.domain_id(None);
        }

        if let Some(val) = &args.enabled {
            identity_provider_builder.enabled(*val);
        }

        if let Some(val) = &args.remote_ids {
            identity_provider_builder.remote_ids(val.iter().map(Into::into).collect::<Vec<_>>());
        }

        ep_builder.identity_provider(
            identity_provider_builder
                .build()
                .wrap_err("error preparing the request data")?,
        );

        let ep = ep_builder
            .build()
            .map_err(|x| OpenStackCliError::EndpointBuild(x.to_string()))?;

        let data = ep.query_async(client).await?;
        op.output_single::<IdentityProviderResponse>(data)?;
        // Show command specific hints
        op.show_command_hint()?;
        Ok(())
    }
}