terraform/builtin/providers/aws/resource_aws_vpc.go

327 lines
7.9 KiB
Go
Raw Normal View History

2014-07-07 21:16:58 +02:00
package aws
import (
"fmt"
"log"
"time"
2015-02-25 10:34:17 +01:00
"github.com/hashicorp/aws-sdk-go/aws"
"github.com/hashicorp/aws-sdk-go/gen/ec2"
2014-07-07 21:16:58 +02:00
"github.com/hashicorp/terraform/helper/resource"
2014-10-09 02:54:00 +02:00
"github.com/hashicorp/terraform/helper/schema"
2014-07-07 21:16:58 +02:00
)
func resourceAwsVpc() *schema.Resource {
return &schema.Resource{
Create: resourceAwsVpcCreate,
Read: resourceAwsVpcRead,
Update: resourceAwsVpcUpdate,
Delete: resourceAwsVpcDelete,
Schema: map[string]*schema.Schema{
"cidr_block": &schema.Schema{
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
2014-12-10 11:39:14 +01:00
"instance_tenancy": &schema.Schema{
Type: schema.TypeString,
Optional: true,
ForceNew: true,
},
"enable_dns_hostnames": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
Computed: true,
},
"enable_dns_support": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
Computed: true,
},
2014-10-09 02:54:00 +02:00
"main_route_table_id": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"default_network_acl_id": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"default_security_group_id": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
2015-02-25 10:34:17 +01:00
// "tags": tagsSchema(),
},
}
}
func resourceAwsVpcCreate(d *schema.ResourceData, meta interface{}) error {
2015-02-25 10:34:17 +01:00
ec2conn := meta.(*AWSClient).awsEc2conn
instance_tenancy := "default"
if v, ok := d.GetOk("instance_tenancy"); ok {
instance_tenancy = v.(string)
}
2014-07-07 21:16:58 +02:00
// Create the VPC
2015-02-25 10:34:17 +01:00
createOpts := &ec2.CreateVPCRequest{
CIDRBlock: aws.String(d.Get("cidr_block").(string)),
InstanceTenancy: &instance_tenancy,
2014-07-07 21:16:58 +02:00
}
2015-02-25 10:34:17 +01:00
log.Printf("[DEBUG] VPC create config: %#v", *createOpts)
vpcResp, err := ec2conn.CreateVPC(createOpts)
2014-07-07 21:16:58 +02:00
if err != nil {
2015-02-25 10:34:17 +01:00
return fmt.Errorf("Error creating VPC: %s : %s", err)
2014-07-07 21:16:58 +02:00
}
// Get the ID and store it
2015-02-25 10:34:17 +01:00
vpc := vpcResp.VPC
d.SetId(*vpc.VPCID)
log.Printf("[INFO] VPC ID: %s", d.Id())
// Set partial mode and say that we setup the cidr block
d.Partial(true)
d.SetPartial("cidr_block")
2014-07-07 21:16:58 +02:00
// Wait for the VPC to become available
log.Printf(
"[DEBUG] Waiting for VPC (%s) to become available",
d.Id())
2014-07-07 21:16:58 +02:00
stateConf := &resource.StateChangeConf{
Pending: []string{"pending"},
Target: "available",
Refresh: VPCStateRefreshFunc(ec2conn, d.Id()),
2014-07-07 21:16:58 +02:00
Timeout: 10 * time.Minute,
}
if _, err := stateConf.WaitForState(); err != nil {
return fmt.Errorf(
2014-07-07 21:16:58 +02:00
"Error waiting for VPC (%s) to become available: %s",
d.Id(), err)
2014-08-09 14:43:00 +02:00
}
2014-07-07 21:16:58 +02:00
// Update our attributes and return
return resourceAwsVpcUpdate(d, meta)
2014-07-07 21:16:58 +02:00
}
func resourceAwsVpcRead(d *schema.ResourceData, meta interface{}) error {
2015-02-25 10:34:17 +01:00
ec2conn := meta.(*AWSClient).awsEc2conn
// Refresh the VPC state
vpcRaw, _, err := VPCStateRefreshFunc(ec2conn, d.Id())()
if err != nil {
return err
}
if vpcRaw == nil {
d.SetId("")
return nil
}
// VPC stuff
vpc := vpcRaw.(*ec2.VPC)
2015-02-25 10:34:17 +01:00
vpcid := d.Id()
d.Set("cidr_block", vpc.CIDRBlock)
2015-02-25 10:34:17 +01:00
// Tags - TBD rmenn
//d.Set("tags", tagsToMap(vpc.Tags))
// Attributes
2015-02-25 10:34:17 +01:00
attribute := "enableDnsSupport"
DescribeAttrOpts := &ec2.DescribeVPCAttributeRequest{
Attribute: &attribute,
VPCID: &vpcid,
}
resp, err := ec2conn.DescribeVPCAttribute(DescribeAttrOpts)
if err != nil {
return err
}
2015-02-25 10:34:17 +01:00
d.Set("enable_dns_support", *resp.EnableDNSSupport)
attribute = "enableDnsHostnames"
DescribeAttrOpts = &ec2.DescribeVPCAttributeRequest{
Attribute: &attribute,
VPCID: &vpcid,
}
resp, err = ec2conn.DescribeVPCAttribute(DescribeAttrOpts)
if err != nil {
return err
}
2015-02-25 10:34:17 +01:00
d.Set("enable_dns_hostnames", *resp.EnableDNSHostnames)
// Get the main routing table for this VPC
2015-02-25 10:34:17 +01:00
// Really Ugly need to make this better - rmenn
filter1 := &ec2.Filter{
Name: aws.String("association.main"),
Values: []string{("true")},
}
filter2 := &ec2.Filter{
Name: aws.String("vpc-id"),
Values: []string{(d.Id())},
}
DescribeRouteOpts := &ec2.DescribeRouteTablesRequest{
Filters: []ec2.Filter{*filter1, *filter2},
}
routeResp, err := ec2conn.DescribeRouteTables(DescribeRouteOpts)
if err != nil {
return err
}
if v := routeResp.RouteTables; len(v) > 0 {
2015-02-25 10:34:17 +01:00
d.Set("main_route_table_id", *v[0].RouteTableID)
}
resourceAwsVpcSetDefaultNetworkAcl(ec2conn, d)
resourceAwsVpcSetDefaultSecurityGroup(ec2conn, d)
return nil
}
func resourceAwsVpcUpdate(d *schema.ResourceData, meta interface{}) error {
2015-02-25 10:34:17 +01:00
ec2conn := meta.(*AWSClient).awsEc2conn
2014-08-09 14:43:00 +02:00
// Turn on partial mode
d.Partial(true)
2015-02-25 10:34:17 +01:00
vpcid := d.Id()
modifyOpts := &ec2.ModifyVPCAttributeRequest{
VPCID: &vpcid,
}
if d.HasChange("enable_dns_hostnames") {
2015-02-25 10:34:17 +01:00
val := d.Get("enable_dns_hostnames").(bool)
modifyOpts.EnableDNSHostnames = &ec2.AttributeBooleanValue{
Value: &val,
}
2014-08-09 14:43:00 +02:00
log.Printf(
"[INFO] Modifying enable_dns_hostnames vpc attribute for %s: %#v",
2015-02-25 10:34:17 +01:00
d.Id(), modifyOpts)
if err := ec2conn.ModifyVPCAttribute(modifyOpts); err != nil {
return err
2014-08-09 14:43:00 +02:00
}
d.SetPartial("enable_dns_hostnames")
2014-08-09 14:43:00 +02:00
}
if d.HasChange("enable_dns_support") {
2015-02-25 10:34:17 +01:00
val := d.Get("enable_dns_hostnames").(bool)
modifyOpts.EnableDNSSupport = &ec2.AttributeBooleanValue{
Value: &val,
}
2014-08-09 14:43:00 +02:00
log.Printf(
"[INFO] Modifying enable_dns_support vpc attribute for %s: %#v",
2015-02-25 10:34:17 +01:00
d.Id(), modifyOpts)
if err := ec2conn.ModifyVPCAttribute(modifyOpts); err != nil {
return err
2014-08-09 14:43:00 +02:00
}
d.SetPartial("enable_dns_support")
2014-08-09 14:43:00 +02:00
}
2015-02-25 10:34:17 +01:00
//Tagging Support need to be worked on - rmenn
// if err := setTags(ec2conn, d); err != nil {
// return err
// } else {
// d.SetPartial("tags")
// }
2014-10-09 02:54:00 +02:00
d.Partial(false)
return resourceAwsVpcRead(d, meta)
2014-07-07 21:16:58 +02:00
}
func resourceAwsVpcDelete(d *schema.ResourceData, meta interface{}) error {
2015-02-25 10:34:17 +01:00
ec2conn := meta.(*AWSClient).awsEc2conn
vpcID := d.Id()
DeleteVpcOpts := &ec2.DeleteVPCRequest{
VPCID: &vpcID,
}
log.Printf("[INFO] Deleting VPC: %s", d.Id())
2015-02-25 10:34:17 +01:00
if err := ec2conn.DeleteVPC(DeleteVpcOpts); err != nil {
ec2err, ok := err.(*aws.APIError)
if ok && ec2err.Code == "InvalidVpcID.NotFound" {
return nil
}
return fmt.Errorf("Error deleting VPC: %s", err)
2014-07-07 21:16:58 +02:00
}
return nil
}
// VPCStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
// a VPC.
func VPCStateRefreshFunc(conn *ec2.EC2, id string) resource.StateRefreshFunc {
return func() (interface{}, string, error) {
2015-02-25 10:34:17 +01:00
DescribeVpcOpts := &ec2.DescribeVPCsRequest{
VPCIDs: []string{id},
}
resp, err := conn.DescribeVPCs(DescribeVpcOpts)
2014-07-07 21:16:58 +02:00
if err != nil {
2015-02-25 10:34:17 +01:00
if ec2err, ok := err.(*aws.APIError); ok && ec2err.Code == "InvalidVpcID.NotFound" {
resp = nil
} else {
log.Printf("Error on VPCStateRefresh: %s", err)
return nil, "", err
}
2014-07-07 21:16:58 +02:00
}
if resp == nil {
// Sometimes AWS just has consistency issues and doesn't see
// our instance yet. Return an empty state.
return nil, "", nil
}
vpc := &resp.VPCs[0]
2015-02-25 10:34:17 +01:00
return vpc, *vpc.State, nil
2014-07-07 21:16:58 +02:00
}
}
func resourceAwsVpcSetDefaultNetworkAcl(conn *ec2.EC2, d *schema.ResourceData) error {
2015-02-25 10:34:17 +01:00
filter1 := &ec2.Filter{
Name: aws.String("default"),
Values: []string{("true")},
}
filter2 := &ec2.Filter{
Name: aws.String("vpc-id"),
Values: []string{(d.Id())},
}
DescribeNetworkACLOpts := &ec2.DescribeNetworkACLsRequest{
Filters: []ec2.Filter{*filter1, *filter2},
}
networkAclResp, err := conn.DescribeNetworkACLs(DescribeNetworkACLOpts)
if err != nil {
return err
}
2015-02-25 10:34:17 +01:00
if v := networkAclResp.NetworkACLs; len(v) > 0 {
d.Set("default_network_acl_id", v[0].NetworkACLID)
}
return nil
}
func resourceAwsVpcSetDefaultSecurityGroup(conn *ec2.EC2, d *schema.ResourceData) error {
2015-02-25 10:34:17 +01:00
filter1 := &ec2.Filter{
Name: aws.String("group-name"),
Values: []string{("default")},
}
filter2 := &ec2.Filter{
Name: aws.String("vpc-id"),
Values: []string{(d.Id())},
}
DescribeSgOpts := &ec2.DescribeSecurityGroupsRequest{
Filters: []ec2.Filter{*filter1, *filter2},
}
securityGroupResp, err := conn.DescribeSecurityGroups(DescribeSgOpts)
if err != nil {
return err
}
2015-02-25 10:34:17 +01:00
if v := securityGroupResp.SecurityGroups; len(v) > 0 {
d.Set("default_security_group_id", v[0].GroupID)
}
return nil
}