@@ -153,12 +153,14 @@ func DataSourceIBMIsIpsecPolicy() *schema.Resource {
153153func dataSourceIBMIsIpsecPolicyRead (context context.Context , d * schema.ResourceData , meta interface {}) diag.Diagnostics {
154154 vpcClient , err := meta .(conns.ClientSession ).VpcV1API ()
155155 if err != nil {
156- return diag .FromErr (err )
156+ tfErr := flex .DiscriminatedTerraformErrorf (err , err .Error (), "(Data) ibm_is_ipsec_policy" , "read" , "initialize-client" )
157+ log .Printf ("[DEBUG]\n %s" , tfErr .GetDebugMessage ())
158+ return tfErr .GetDiag ()
157159 }
158160
159161 name := d .Get ("name" ).(string )
160162 identifier := d .Get ("ipsec_policy" ).(string )
161- var IPSecPolicy * vpcv1.IPsecPolicy
163+ var iPsecPolicy * vpcv1.IPsecPolicy
162164 if name != "" {
163165 start := ""
164166 allrecs := []vpcv1.IPsecPolicy {}
@@ -167,9 +169,11 @@ func dataSourceIBMIsIpsecPolicyRead(context context.Context, d *schema.ResourceD
167169 if start != "" {
168170 listIPSecPoliciesyOptions .Start = & start
169171 }
170- ipSecPolicy , response , err := vpcClient .ListIpsecPolicies ( listIPSecPoliciesyOptions )
172+ ipSecPolicy , _ , err := vpcClient .ListIpsecPoliciesWithContext ( context , listIPSecPoliciesyOptions )
171173 if err != nil {
172- return diag .FromErr (fmt .Errorf ("Error Fetching IPSec Policies %s\n %s" , err , response ))
174+ tfErr := flex .TerraformErrorf (err , fmt .Sprintf ("ListIpsecPoliciesWithContext failed: %s" , err .Error ()), "(Data) ibm_is_ipsec_policy" , "read" )
175+ log .Printf ("[DEBUG]\n %s" , tfErr .GetDebugMessage ())
176+ return tfErr .GetDiag ()
173177 }
174178 start = flex .GetNext (ipSecPolicy .Next )
175179 allrecs = append (allrecs , ipSecPolicy .IpsecPolicies ... )
@@ -180,76 +184,78 @@ func dataSourceIBMIsIpsecPolicyRead(context context.Context, d *schema.ResourceD
180184 ipsec_policy_found := false
181185 for _ , ipSecPolicyItem := range allrecs {
182186 if * ipSecPolicyItem .Name == name {
183- IPSecPolicy = & ipSecPolicyItem
187+ iPsecPolicy = & ipSecPolicyItem
184188 ipsec_policy_found = true
185189 break
186190 }
187191 }
188192
189193 if ! ipsec_policy_found {
190- log .Printf ("[DEBUG] No ipsec policy found with given name %s" , name )
191- return diag .FromErr (fmt .Errorf ("No ipsec policy found with given name %s" , name ))
194+ err = fmt .Errorf ("No ipsec policy found with given name %s" , name )
195+ tfErr := flex .TerraformErrorf (err , fmt .Sprintf ("Not found failed: %s" , err .Error ()), "(Data) ibm_is_ipsec_policy" , "read" )
196+ log .Printf ("[DEBUG]\n %s" , tfErr .GetDebugMessage ())
197+ return tfErr .GetDiag ()
192198 }
193199
194200 } else {
195201 getIPSecPolicyOptions := & vpcv1.GetIpsecPolicyOptions {}
196202
197203 getIPSecPolicyOptions .SetID (identifier )
198204
199- ipsecPolicy1 , response , err := vpcClient .GetIpsecPolicyWithContext (context , getIPSecPolicyOptions )
205+ ipsecPolicy1 , _ , err := vpcClient .GetIpsecPolicyWithContext (context , getIPSecPolicyOptions )
200206 if err != nil {
201- log .Printf ("[DEBUG] GetIpsecPolicyWithContext failed %s\n %s" , err , response )
202- return diag .FromErr (fmt .Errorf ("GetIpsecPolicyWithContext failed %s\n %s" , err , response ))
207+ tfErr := flex .TerraformErrorf (err , fmt .Sprintf ("GetIpsecPolicyWithContext failed: %s" , err .Error ()), "(Data) ibm_is_ipsec_policy" , "read" )
208+ log .Printf ("[DEBUG]\n %s" , tfErr .GetDebugMessage ())
209+ return tfErr .GetDiag ()
203210 }
204- IPSecPolicy = ipsecPolicy1
211+ iPsecPolicy = ipsecPolicy1
205212 }
206213
207- d .SetId (* IPSecPolicy .ID )
208- if err = d .Set ("authentication_algorithm" , IPSecPolicy .AuthenticationAlgorithm ); err != nil {
209- return diag . FromErr ( fmt .Errorf ("Error setting authentication_algorithm: %s" , err ))
214+ d .SetId (* iPsecPolicy .ID )
215+ if err = d .Set ("authentication_algorithm" , iPsecPolicy .AuthenticationAlgorithm ); err != nil {
216+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting authentication_algorithm: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-authentication_algorithm" ). GetDiag ( )
210217 }
211218
212- if IPSecPolicy .Connections != nil {
213- err = d .Set ("connections" , dataSourceIPsecPolicyFlattenConnections (IPSecPolicy .Connections ))
219+ if iPsecPolicy .Connections != nil {
220+ err = d .Set ("connections" , dataSourceIPsecPolicyFlattenConnections (iPsecPolicy .Connections ))
214221 if err != nil {
215- return diag . FromErr ( fmt . Errorf ( "Error setting connections %s" , err ) )
222+ return flex . DiscriminatedTerraformErrorf ( err , err . Error (), "(Data) ibm_is_ipsec_policy" , "read" , "connections-to-map" ). GetDiag ( )
216223 }
217224 }
218- if err = d .Set ("created_at" , flex .DateTimeToString (IPSecPolicy .CreatedAt )); err != nil {
219- return diag . FromErr ( fmt .Errorf ("Error setting created_at: %s" , err ))
225+ if err = d .Set ("created_at" , flex .DateTimeToString (iPsecPolicy .CreatedAt )); err != nil {
226+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting created_at: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-created_at" ). GetDiag ( )
220227 }
221- if err = d .Set ("encapsulation_mode" , IPSecPolicy .EncapsulationMode ); err != nil {
222- return diag . FromErr ( fmt .Errorf ("Error setting encapsulation_mode: %s" , err ))
228+ if err = d .Set ("encapsulation_mode" , iPsecPolicy .EncapsulationMode ); err != nil {
229+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting encapsulation_mode: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-encapsulation_mode" ). GetDiag ( )
223230 }
224- if err = d .Set ("encryption_algorithm" , IPSecPolicy .EncryptionAlgorithm ); err != nil {
225- return diag . FromErr ( fmt .Errorf ("Error setting encryption_algorithm: %s" , err ))
231+ if err = d .Set ("encryption_algorithm" , iPsecPolicy .EncryptionAlgorithm ); err != nil {
232+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting encryption_algorithm: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-encryption_algorithm" ). GetDiag ( )
226233 }
227- if err = d .Set ("href" , IPSecPolicy .Href ); err != nil {
228- return diag . FromErr ( fmt .Errorf ("Error setting href: %s" , err ))
234+ if err = d .Set ("href" , iPsecPolicy .Href ); err != nil {
235+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting href: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-href" ). GetDiag ( )
229236 }
230- if err = d .Set ("key_lifetime" , flex .IntValue (IPSecPolicy .KeyLifetime )); err != nil {
231- return diag . FromErr ( fmt .Errorf ("Error setting key_lifetime: %s" , err ))
237+ if err = d .Set ("key_lifetime" , flex .IntValue (iPsecPolicy .KeyLifetime )); err != nil {
238+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting key_lifetime: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-key_lifetime" ). GetDiag ( )
232239 }
233- if err = d .Set ("name" , IPSecPolicy .Name ); err != nil {
234- return diag . FromErr ( fmt .Errorf ("Error setting name: %s" , err ))
240+ if err = d .Set ("name" , iPsecPolicy .Name ); err != nil {
241+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting name: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-name" ). GetDiag ( )
235242 }
236- if err = d .Set ("pfs" , IPSecPolicy .Pfs ); err != nil {
237- return diag . FromErr ( fmt .Errorf ("Error setting pfs: %s" , err ))
243+ if err = d .Set ("pfs" , iPsecPolicy .Pfs ); err != nil {
244+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting pfs: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-pfs" ). GetDiag ( )
238245 }
239246
240- if IPSecPolicy .ResourceGroup != nil {
241- err = d .Set ("resource_group" , dataSourceIPsecPolicyFlattenResourceGroup (* IPSecPolicy .ResourceGroup ))
247+ if iPsecPolicy .ResourceGroup != nil {
248+ err = d .Set ("resource_group" , dataSourceIPsecPolicyFlattenResourceGroup (* iPsecPolicy .ResourceGroup ))
242249 if err != nil {
243- return diag . FromErr ( fmt . Errorf ( "Error setting resource_group %s" , err ) )
250+ return flex . DiscriminatedTerraformErrorf ( err , err . Error (), "(Data) ibm_is_ipsec_policy" , "read" , "resource_group-to-map" ). GetDiag ( )
244251 }
245252 }
246- if err = d .Set ("resource_type" , IPSecPolicy .ResourceType ); err != nil {
247- return diag . FromErr ( fmt .Errorf ("Error setting resource_type: %s" , err ))
253+ if err = d .Set ("resource_type" , iPsecPolicy .ResourceType ); err != nil {
254+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting resource_type: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-resource_type" ). GetDiag ( )
248255 }
249- if err = d .Set ("transform_protocol" , IPSecPolicy .TransformProtocol ); err != nil {
250- return diag . FromErr ( fmt .Errorf ("Error setting transform_protocol: %s" , err ))
256+ if err = d .Set ("transform_protocol" , iPsecPolicy .TransformProtocol ); err != nil {
257+ return flex . DiscriminatedTerraformErrorf ( err , fmt .Sprintf ("Error setting transform_protocol: %s" , err ), "(Data) ibm_is_ipsec_policy" , "read" , "set-transform_protocol" ). GetDiag ( )
251258 }
252-
253259 return nil
254260}
255261
0 commit comments