terraform/builtin/providers/openstack/config.go

136 lines
3.3 KiB
Go
Raw Normal View History

2014-10-29 22:52:36 +01:00
package openstack
import (
"crypto/tls"
"crypto/x509"
"fmt"
"io/ioutil"
"net/http"
2014-10-29 22:52:36 +01:00
"github.com/rackspace/gophercloud"
"github.com/rackspace/gophercloud/openstack"
)
type Config struct {
Username string
2015-01-26 05:00:57 +01:00
UserID string
2014-10-29 22:52:36 +01:00
Password string
Token string
2015-01-26 05:00:57 +01:00
APIKey string
2014-10-29 22:52:36 +01:00
IdentityEndpoint string
2015-01-26 05:00:57 +01:00
TenantID string
2015-01-10 23:02:19 +01:00
TenantName string
2015-01-26 05:00:57 +01:00
DomainID string
DomainName string
Insecure bool
EndpointType string
CACertFile string
ClientCertFile string
ClientKeyFile string
2014-10-29 22:52:36 +01:00
2015-01-26 05:00:57 +01:00
osClient *gophercloud.ProviderClient
2014-10-29 22:52:36 +01:00
}
func (c *Config) loadAndValidate() error {
if c.EndpointType != "internal" && c.EndpointType != "internalURL" &&
c.EndpointType != "admin" && c.EndpointType != "adminURL" &&
c.EndpointType != "public" && c.EndpointType != "publicURL" &&
c.EndpointType != "" {
return fmt.Errorf("Invalid endpoint type provided")
}
2014-10-29 22:52:36 +01:00
ao := gophercloud.AuthOptions{
2015-01-10 23:02:19 +01:00
Username: c.Username,
2015-01-26 05:00:57 +01:00
UserID: c.UserID,
2015-01-10 23:02:19 +01:00
Password: c.Password,
TokenID: c.Token,
2015-01-26 05:00:57 +01:00
APIKey: c.APIKey,
2014-10-29 22:52:36 +01:00
IdentityEndpoint: c.IdentityEndpoint,
2015-01-26 05:00:57 +01:00
TenantID: c.TenantID,
2015-01-10 23:02:19 +01:00
TenantName: c.TenantName,
2015-01-26 05:00:57 +01:00
DomainID: c.DomainID,
DomainName: c.DomainName,
2014-10-29 22:52:36 +01:00
}
client, err := openstack.NewClient(ao.IdentityEndpoint)
if err != nil {
return err
}
config := &tls.Config{}
if c.CACertFile != "" {
caCert, err := ioutil.ReadFile(c.CACertFile)
if err != nil {
return err
}
caCertPool := x509.NewCertPool()
caCertPool.AppendCertsFromPEM(caCert)
config.RootCAs = caCertPool
}
if c.Insecure {
config.InsecureSkipVerify = true
}
if c.ClientCertFile != "" && c.ClientKeyFile != "" {
cert, err := tls.LoadX509KeyPair(c.ClientCertFile, c.ClientKeyFile)
if err != nil {
return err
}
config.Certificates = []tls.Certificate{cert}
config.BuildNameToCertificate()
}
transport := &http.Transport{TLSClientConfig: config}
client.HTTPClient.Transport = transport
err = openstack.Authenticate(client, ao)
2014-10-29 22:52:36 +01:00
if err != nil {
return err
}
2015-01-26 05:00:57 +01:00
c.osClient = client
2014-10-29 22:52:36 +01:00
return nil
}
2015-01-31 22:33:54 +01:00
2015-02-01 08:34:37 +01:00
func (c *Config) blockStorageV1Client(region string) (*gophercloud.ServiceClient, error) {
return openstack.NewBlockStorageV1(c.osClient, gophercloud.EndpointOpts{
Region: region,
Availability: c.getEndpointType(),
2015-02-01 08:34:37 +01:00
})
}
2015-01-31 22:33:54 +01:00
func (c *Config) computeV2Client(region string) (*gophercloud.ServiceClient, error) {
return openstack.NewComputeV2(c.osClient, gophercloud.EndpointOpts{
Region: region,
Availability: c.getEndpointType(),
2015-01-31 22:33:54 +01:00
})
}
func (c *Config) networkingV2Client(region string) (*gophercloud.ServiceClient, error) {
return openstack.NewNetworkV2(c.osClient, gophercloud.EndpointOpts{
Region: region,
Availability: c.getEndpointType(),
2015-01-31 22:33:54 +01:00
})
}
2015-02-01 04:51:50 +01:00
func (c *Config) objectStorageV1Client(region string) (*gophercloud.ServiceClient, error) {
return openstack.NewObjectStorageV1(c.osClient, gophercloud.EndpointOpts{
Region: region,
Availability: c.getEndpointType(),
2015-02-01 04:51:50 +01:00
})
}
func (c *Config) getEndpointType() gophercloud.Availability {
if c.EndpointType == "internal" || c.EndpointType == "internalURL" {
return gophercloud.AvailabilityInternal
}
if c.EndpointType == "admin" || c.EndpointType == "adminURL" {
return gophercloud.AvailabilityAdmin
}
return gophercloud.AvailabilityPublic
}