2014-07-07 21:16:58 +02:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"time"
|
|
|
|
|
2015-06-03 20:36:57 +02:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
2014-07-07 21:16:58 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
2014-10-09 02:54:00 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2014-07-07 21:16:58 +02:00
|
|
|
)
|
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
func resourceAwsVpc() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceAwsVpcCreate,
|
|
|
|
Read: resourceAwsVpcRead,
|
|
|
|
Update: resourceAwsVpcUpdate,
|
|
|
|
Delete: resourceAwsVpcDelete,
|
2016-05-13 02:57:12 +02:00
|
|
|
Importer: &schema.ResourceImporter{
|
|
|
|
State: schema.ImportStatePassthrough,
|
|
|
|
},
|
2014-10-09 01:43:13 +02:00
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"cidr_block": &schema.Schema{
|
2016-02-22 22:05:55 +01:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
ValidateFunc: validateCIDRNetworkAddress,
|
2014-10-09 01:43:13 +02:00
|
|
|
},
|
|
|
|
|
2014-12-10 11:39:14 +01:00
|
|
|
"instance_tenancy": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2016-04-20 19:48:22 +02:00
|
|
|
Computed: true,
|
2014-12-10 11:39:14 +01:00
|
|
|
},
|
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
"enable_dns_hostnames": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"enable_dns_support": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2014-10-09 02:54:00 +02:00
|
|
|
|
2015-11-20 16:48:48 +01:00
|
|
|
"enable_classiclink": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
2016-02-01 16:30:09 +01:00
|
|
|
Computed: true,
|
2015-11-20 16:48:48 +01:00
|
|
|
},
|
|
|
|
|
2014-10-11 01:57:32 +02:00
|
|
|
"main_route_table_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2014-12-22 18:38:15 +01:00
|
|
|
"default_network_acl_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2015-04-28 21:57:05 +02:00
|
|
|
"dhcp_options_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2014-12-23 07:13:33 +01:00
|
|
|
"default_security_group_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2016-08-25 23:02:44 +02:00
|
|
|
"default_route_table_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2015-03-09 10:09:06 +01:00
|
|
|
"tags": tagsSchema(),
|
2014-10-09 01:43:13 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAwsVpcCreate(d *schema.ResourceData, meta interface{}) error {
|
2015-04-16 22:05:55 +02:00
|
|
|
conn := meta.(*AWSClient).ec2conn
|
2015-02-25 10:34:17 +01:00
|
|
|
instance_tenancy := "default"
|
|
|
|
if v, ok := d.GetOk("instance_tenancy"); ok {
|
|
|
|
instance_tenancy = v.(string)
|
|
|
|
}
|
2014-07-07 21:16:58 +02:00
|
|
|
// Create the VPC
|
2015-08-17 20:27:16 +02:00
|
|
|
createOpts := &ec2.CreateVpcInput{
|
|
|
|
CidrBlock: aws.String(d.Get("cidr_block").(string)),
|
2015-03-12 21:13:45 +01:00
|
|
|
InstanceTenancy: aws.String(instance_tenancy),
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
2015-02-25 10:34:17 +01:00
|
|
|
log.Printf("[DEBUG] VPC create config: %#v", *createOpts)
|
2015-08-17 20:27:16 +02:00
|
|
|
vpcResp, err := conn.CreateVpc(createOpts)
|
2014-07-07 21:16:58 +02:00
|
|
|
if err != nil {
|
2015-03-12 21:13:45 +01:00
|
|
|
return fmt.Errorf("Error creating VPC: %s", err)
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Get the ID and store it
|
2015-08-17 20:27:16 +02:00
|
|
|
vpc := vpcResp.Vpc
|
|
|
|
d.SetId(*vpc.VpcId)
|
2015-02-25 10:34:17 +01:00
|
|
|
log.Printf("[INFO] VPC ID: %s", d.Id())
|
2014-10-09 01:43:13 +02:00
|
|
|
|
|
|
|
// Set partial mode and say that we setup the cidr block
|
|
|
|
d.Partial(true)
|
|
|
|
d.SetPartial("cidr_block")
|
2014-07-07 21:16:58 +02:00
|
|
|
|
|
|
|
// Wait for the VPC to become available
|
|
|
|
log.Printf(
|
|
|
|
"[DEBUG] Waiting for VPC (%s) to become available",
|
2014-10-09 01:43:13 +02:00
|
|
|
d.Id())
|
2014-07-07 21:16:58 +02:00
|
|
|
stateConf := &resource.StateChangeConf{
|
|
|
|
Pending: []string{"pending"},
|
2016-01-21 02:20:41 +01:00
|
|
|
Target: []string{"available"},
|
2015-04-10 23:09:12 +02:00
|
|
|
Refresh: VPCStateRefreshFunc(conn, d.Id()),
|
2014-07-07 21:16:58 +02:00
|
|
|
Timeout: 10 * time.Minute,
|
|
|
|
}
|
2014-10-09 01:43:13 +02:00
|
|
|
if _, err := stateConf.WaitForState(); err != nil {
|
|
|
|
return fmt.Errorf(
|
2014-07-07 21:16:58 +02:00
|
|
|
"Error waiting for VPC (%s) to become available: %s",
|
2014-10-09 01:43:13 +02:00
|
|
|
d.Id(), err)
|
2014-08-09 14:43:00 +02:00
|
|
|
}
|
|
|
|
|
2014-07-07 21:16:58 +02:00
|
|
|
// Update our attributes and return
|
2014-10-09 01:43:13 +02:00
|
|
|
return resourceAwsVpcUpdate(d, meta)
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
func resourceAwsVpcRead(d *schema.ResourceData, meta interface{}) error {
|
2015-04-16 22:05:55 +02:00
|
|
|
conn := meta.(*AWSClient).ec2conn
|
2014-11-21 17:58:34 +01:00
|
|
|
|
|
|
|
// Refresh the VPC state
|
2015-04-10 23:09:12 +02:00
|
|
|
vpcRaw, _, err := VPCStateRefreshFunc(conn, d.Id())()
|
2014-11-21 17:58:34 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if vpcRaw == nil {
|
2015-02-20 19:20:20 +01:00
|
|
|
d.SetId("")
|
2014-11-21 17:58:34 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// VPC stuff
|
2015-08-17 20:27:16 +02:00
|
|
|
vpc := vpcRaw.(*ec2.Vpc)
|
2015-02-25 10:34:17 +01:00
|
|
|
vpcid := d.Id()
|
2015-08-17 20:27:16 +02:00
|
|
|
d.Set("cidr_block", vpc.CidrBlock)
|
|
|
|
d.Set("dhcp_options_id", vpc.DhcpOptionsId)
|
2016-04-20 19:48:22 +02:00
|
|
|
d.Set("instance_tenancy", vpc.InstanceTenancy)
|
2014-11-21 17:58:34 +01:00
|
|
|
|
2015-03-04 14:07:30 +01:00
|
|
|
// Tags
|
2015-05-12 21:58:10 +02:00
|
|
|
d.Set("tags", tagsToMap(vpc.Tags))
|
2014-11-21 17:58:34 +01:00
|
|
|
|
|
|
|
// Attributes
|
2015-02-25 10:34:17 +01:00
|
|
|
attribute := "enableDnsSupport"
|
2015-08-17 20:27:16 +02:00
|
|
|
DescribeAttrOpts := &ec2.DescribeVpcAttributeInput{
|
2015-03-12 21:13:45 +01:00
|
|
|
Attribute: aws.String(attribute),
|
2015-08-17 20:27:16 +02:00
|
|
|
VpcId: aws.String(vpcid),
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
resp, err := conn.DescribeVpcAttribute(DescribeAttrOpts)
|
2014-11-21 17:58:34 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-04-20 20:35:43 +02:00
|
|
|
d.Set("enable_dns_support", *resp.EnableDnsSupport.Value)
|
2015-02-25 10:34:17 +01:00
|
|
|
attribute = "enableDnsHostnames"
|
2015-08-17 20:27:16 +02:00
|
|
|
DescribeAttrOpts = &ec2.DescribeVpcAttributeInput{
|
2015-02-25 10:34:17 +01:00
|
|
|
Attribute: &attribute,
|
2015-08-17 20:27:16 +02:00
|
|
|
VpcId: &vpcid,
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
resp, err = conn.DescribeVpcAttribute(DescribeAttrOpts)
|
2014-11-21 17:58:34 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-04-20 20:35:43 +02:00
|
|
|
d.Set("enable_dns_hostnames", *resp.EnableDnsHostnames.Value)
|
2014-11-21 17:58:34 +01:00
|
|
|
|
2015-11-20 16:48:48 +01:00
|
|
|
DescribeClassiclinkOpts := &ec2.DescribeVpcClassicLinkInput{
|
2016-01-12 23:49:51 +01:00
|
|
|
VpcIds: []*string{&vpcid},
|
2015-11-20 16:48:48 +01:00
|
|
|
}
|
2016-01-28 16:54:58 +01:00
|
|
|
|
|
|
|
// Classic Link is only available in regions that support EC2 Classic
|
2015-11-20 16:48:48 +01:00
|
|
|
respClassiclink, err := conn.DescribeVpcClassicLink(DescribeClassiclinkOpts)
|
|
|
|
if err != nil {
|
2016-01-28 16:54:58 +01:00
|
|
|
if awsErr, ok := err.(awserr.Error); ok && awsErr.Code() == "UnsupportedOperation" {
|
|
|
|
log.Printf("[WARN] VPC Classic Link is not supported in this region")
|
|
|
|
} else {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
classiclink_enabled := false
|
|
|
|
for _, v := range respClassiclink.Vpcs {
|
|
|
|
if *v.VpcId == vpcid {
|
|
|
|
if v.ClassicLinkEnabled != nil {
|
|
|
|
classiclink_enabled = *v.ClassicLinkEnabled
|
|
|
|
}
|
|
|
|
break
|
|
|
|
}
|
2015-11-20 16:48:48 +01:00
|
|
|
}
|
2016-01-28 16:54:58 +01:00
|
|
|
d.Set("enable_classiclink", classiclink_enabled)
|
2015-11-20 16:48:48 +01:00
|
|
|
}
|
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
// Get the main routing table for this VPC
|
2015-02-25 10:34:17 +01:00
|
|
|
// Really Ugly need to make this better - rmenn
|
|
|
|
filter1 := &ec2.Filter{
|
|
|
|
Name: aws.String("association.main"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String("true")},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
|
|
|
filter2 := &ec2.Filter{
|
|
|
|
Name: aws.String("vpc-id"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String(d.Id())},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-04-10 23:09:12 +02:00
|
|
|
DescribeRouteOpts := &ec2.DescribeRouteTablesInput{
|
|
|
|
Filters: []*ec2.Filter{filter1, filter2},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-04-10 23:09:12 +02:00
|
|
|
routeResp, err := conn.DescribeRouteTables(DescribeRouteOpts)
|
2014-11-21 17:58:34 +01:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if v := routeResp.RouteTables; len(v) > 0 {
|
2015-08-17 20:27:16 +02:00
|
|
|
d.Set("main_route_table_id", *v[0].RouteTableId)
|
2014-11-21 17:58:34 +01:00
|
|
|
}
|
|
|
|
|
2016-08-25 23:02:44 +02:00
|
|
|
if err := resourceAwsVpcSetDefaultNetworkAcl(conn, d); err != nil {
|
|
|
|
log.Printf("[WARN] Unable to set Default Network ACL: %s", err)
|
|
|
|
}
|
|
|
|
if err := resourceAwsVpcSetDefaultSecurityGroup(conn, d); err != nil {
|
|
|
|
log.Printf("[WARN] Unable to set Default Security Group: %s", err)
|
|
|
|
}
|
|
|
|
if err := resourceAwsVpcSetDefaultRouteTable(conn, d); err != nil {
|
|
|
|
log.Printf("[WARN] Unable to set Default Route Table: %s", err)
|
|
|
|
}
|
2014-12-22 18:38:15 +01:00
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
func resourceAwsVpcUpdate(d *schema.ResourceData, meta interface{}) error {
|
2015-04-16 22:05:55 +02:00
|
|
|
conn := meta.(*AWSClient).ec2conn
|
2014-08-09 14:43:00 +02:00
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
// Turn on partial mode
|
|
|
|
d.Partial(true)
|
2015-02-25 10:34:17 +01:00
|
|
|
vpcid := d.Id()
|
2014-10-09 01:43:13 +02:00
|
|
|
if d.HasChange("enable_dns_hostnames") {
|
2015-02-25 10:34:17 +01:00
|
|
|
val := d.Get("enable_dns_hostnames").(bool)
|
2015-08-17 20:27:16 +02:00
|
|
|
modifyOpts := &ec2.ModifyVpcAttributeInput{
|
|
|
|
VpcId: &vpcid,
|
|
|
|
EnableDnsHostnames: &ec2.AttributeBooleanValue{
|
2015-03-25 21:15:32 +01:00
|
|
|
Value: &val,
|
|
|
|
},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2014-08-09 14:43:00 +02:00
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
log.Printf(
|
2015-03-20 19:44:42 +01:00
|
|
|
"[INFO] Modifying enable_dns_support vpc attribute for %s: %#v",
|
2015-02-25 10:34:17 +01:00
|
|
|
d.Id(), modifyOpts)
|
2015-08-17 20:27:16 +02:00
|
|
|
if _, err := conn.ModifyVpcAttribute(modifyOpts); err != nil {
|
2014-10-09 01:43:13 +02:00
|
|
|
return err
|
2014-08-09 14:43:00 +02:00
|
|
|
}
|
2014-10-09 01:43:13 +02:00
|
|
|
|
2015-03-20 19:44:42 +01:00
|
|
|
d.SetPartial("enable_dns_support")
|
2014-08-09 14:43:00 +02:00
|
|
|
}
|
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
if d.HasChange("enable_dns_support") {
|
2015-03-25 21:15:32 +01:00
|
|
|
val := d.Get("enable_dns_support").(bool)
|
2015-08-17 20:27:16 +02:00
|
|
|
modifyOpts := &ec2.ModifyVpcAttributeInput{
|
|
|
|
VpcId: &vpcid,
|
|
|
|
EnableDnsSupport: &ec2.AttributeBooleanValue{
|
2015-03-25 21:15:32 +01:00
|
|
|
Value: &val,
|
|
|
|
},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2014-08-09 14:43:00 +02:00
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
log.Printf(
|
|
|
|
"[INFO] Modifying enable_dns_support vpc attribute for %s: %#v",
|
2015-02-25 10:34:17 +01:00
|
|
|
d.Id(), modifyOpts)
|
2015-08-17 20:27:16 +02:00
|
|
|
if _, err := conn.ModifyVpcAttribute(modifyOpts); err != nil {
|
2014-10-09 01:43:13 +02:00
|
|
|
return err
|
2014-08-09 14:43:00 +02:00
|
|
|
}
|
2014-10-09 01:43:13 +02:00
|
|
|
|
|
|
|
d.SetPartial("enable_dns_support")
|
2014-08-09 14:43:00 +02:00
|
|
|
}
|
2015-03-04 14:07:30 +01:00
|
|
|
|
2015-11-20 16:48:48 +01:00
|
|
|
if d.HasChange("enable_classiclink") {
|
|
|
|
val := d.Get("enable_classiclink").(bool)
|
|
|
|
|
|
|
|
if val {
|
|
|
|
modifyOpts := &ec2.EnableVpcClassicLinkInput{
|
|
|
|
VpcId: &vpcid,
|
|
|
|
}
|
|
|
|
log.Printf(
|
|
|
|
"[INFO] Modifying enable_classiclink vpc attribute for %s: %#v",
|
|
|
|
d.Id(), modifyOpts)
|
|
|
|
if _, err := conn.EnableVpcClassicLink(modifyOpts); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
modifyOpts := &ec2.DisableVpcClassicLinkInput{
|
|
|
|
VpcId: &vpcid,
|
|
|
|
}
|
|
|
|
log.Printf(
|
|
|
|
"[INFO] Modifying enable_classiclink vpc attribute for %s: %#v",
|
|
|
|
d.Id(), modifyOpts)
|
|
|
|
if _, err := conn.DisableVpcClassicLink(modifyOpts); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetPartial("enable_classiclink")
|
|
|
|
}
|
|
|
|
|
2015-05-12 21:58:10 +02:00
|
|
|
if err := setTags(conn, d); err != nil {
|
2015-03-04 14:07:30 +01:00
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
d.SetPartial("tags")
|
|
|
|
}
|
2014-10-09 02:54:00 +02:00
|
|
|
|
2014-10-11 01:57:32 +02:00
|
|
|
d.Partial(false)
|
|
|
|
return resourceAwsVpcRead(d, meta)
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
|
2014-10-09 01:43:13 +02:00
|
|
|
func resourceAwsVpcDelete(d *schema.ResourceData, meta interface{}) error {
|
2015-04-16 22:05:55 +02:00
|
|
|
conn := meta.(*AWSClient).ec2conn
|
2015-02-25 10:34:17 +01:00
|
|
|
vpcID := d.Id()
|
2015-08-17 20:27:16 +02:00
|
|
|
DeleteVpcOpts := &ec2.DeleteVpcInput{
|
|
|
|
VpcId: &vpcID,
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2014-10-09 01:43:13 +02:00
|
|
|
log.Printf("[INFO] Deleting VPC: %s", d.Id())
|
2015-06-27 02:26:06 +02:00
|
|
|
|
2016-03-09 23:53:32 +01:00
|
|
|
return resource.Retry(5*time.Minute, func() *resource.RetryError {
|
2015-08-17 20:27:16 +02:00
|
|
|
_, err := conn.DeleteVpc(DeleteVpcOpts)
|
2015-06-27 02:26:06 +02:00
|
|
|
if err == nil {
|
2014-07-08 02:07:31 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-06-27 02:26:06 +02:00
|
|
|
ec2err, ok := err.(awserr.Error)
|
|
|
|
if !ok {
|
2016-03-09 23:53:32 +01:00
|
|
|
return resource.NonRetryableError(err)
|
2015-06-27 02:26:06 +02:00
|
|
|
}
|
2014-07-07 21:16:58 +02:00
|
|
|
|
2015-06-27 02:26:06 +02:00
|
|
|
switch ec2err.Code() {
|
|
|
|
case "InvalidVpcID.NotFound":
|
|
|
|
return nil
|
|
|
|
case "DependencyViolation":
|
2016-03-09 23:53:32 +01:00
|
|
|
return resource.RetryableError(err)
|
2015-06-27 02:26:06 +02:00
|
|
|
}
|
|
|
|
|
2016-03-09 23:53:32 +01:00
|
|
|
return resource.NonRetryableError(fmt.Errorf("Error deleting VPC: %s", err))
|
2015-06-27 02:26:06 +02:00
|
|
|
})
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// VPCStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
|
|
|
|
// a VPC.
|
|
|
|
func VPCStateRefreshFunc(conn *ec2.EC2, id string) resource.StateRefreshFunc {
|
|
|
|
return func() (interface{}, string, error) {
|
2015-08-17 20:27:16 +02:00
|
|
|
DescribeVpcOpts := &ec2.DescribeVpcsInput{
|
|
|
|
VpcIds: []*string{aws.String(id)},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
resp, err := conn.DescribeVpcs(DescribeVpcOpts)
|
2014-07-07 21:16:58 +02:00
|
|
|
if err != nil {
|
2015-05-20 13:21:23 +02:00
|
|
|
if ec2err, ok := err.(awserr.Error); ok && ec2err.Code() == "InvalidVpcID.NotFound" {
|
2014-07-07 21:23:04 +02:00
|
|
|
resp = nil
|
|
|
|
} else {
|
|
|
|
log.Printf("Error on VPCStateRefresh: %s", err)
|
|
|
|
return nil, "", err
|
|
|
|
}
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
if resp == nil {
|
|
|
|
// Sometimes AWS just has consistency issues and doesn't see
|
|
|
|
// our instance yet. Return an empty state.
|
|
|
|
return nil, "", nil
|
|
|
|
}
|
|
|
|
|
2015-08-17 20:27:16 +02:00
|
|
|
vpc := resp.Vpcs[0]
|
2015-02-25 10:34:17 +01:00
|
|
|
return vpc, *vpc.State, nil
|
2014-07-07 21:16:58 +02:00
|
|
|
}
|
|
|
|
}
|
2014-12-22 18:38:15 +01:00
|
|
|
|
2015-02-20 19:20:20 +01:00
|
|
|
func resourceAwsVpcSetDefaultNetworkAcl(conn *ec2.EC2, d *schema.ResourceData) error {
|
2015-02-25 10:34:17 +01:00
|
|
|
filter1 := &ec2.Filter{
|
|
|
|
Name: aws.String("default"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String("true")},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
|
|
|
filter2 := &ec2.Filter{
|
|
|
|
Name: aws.String("vpc-id"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String(d.Id())},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
DescribeNetworkACLOpts := &ec2.DescribeNetworkAclsInput{
|
2015-04-10 23:09:12 +02:00
|
|
|
Filters: []*ec2.Filter{filter1, filter2},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
networkAclResp, err := conn.DescribeNetworkAcls(DescribeNetworkACLOpts)
|
2014-12-22 18:38:15 +01:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-08-17 20:27:16 +02:00
|
|
|
if v := networkAclResp.NetworkAcls; len(v) > 0 {
|
|
|
|
d.Set("default_network_acl_id", v[0].NetworkAclId)
|
2014-12-22 18:38:15 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2014-12-23 07:13:33 +01:00
|
|
|
|
2015-02-20 19:20:20 +01:00
|
|
|
func resourceAwsVpcSetDefaultSecurityGroup(conn *ec2.EC2, d *schema.ResourceData) error {
|
2015-02-25 10:34:17 +01:00
|
|
|
filter1 := &ec2.Filter{
|
|
|
|
Name: aws.String("group-name"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String("default")},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
|
|
|
filter2 := &ec2.Filter{
|
|
|
|
Name: aws.String("vpc-id"),
|
2015-04-10 23:09:12 +02:00
|
|
|
Values: []*string{aws.String(d.Id())},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
2015-04-10 23:09:12 +02:00
|
|
|
DescribeSgOpts := &ec2.DescribeSecurityGroupsInput{
|
|
|
|
Filters: []*ec2.Filter{filter1, filter2},
|
2015-02-25 10:34:17 +01:00
|
|
|
}
|
|
|
|
securityGroupResp, err := conn.DescribeSecurityGroups(DescribeSgOpts)
|
2014-12-23 07:13:33 +01:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-02-25 10:34:17 +01:00
|
|
|
if v := securityGroupResp.SecurityGroups; len(v) > 0 {
|
2015-08-17 20:27:16 +02:00
|
|
|
d.Set("default_security_group_id", v[0].GroupId)
|
2014-12-23 07:13:33 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2016-08-25 23:02:44 +02:00
|
|
|
|
|
|
|
func resourceAwsVpcSetDefaultRouteTable(conn *ec2.EC2, d *schema.ResourceData) error {
|
|
|
|
filter1 := &ec2.Filter{
|
|
|
|
Name: aws.String("association.main"),
|
|
|
|
Values: []*string{aws.String("true")},
|
|
|
|
}
|
|
|
|
filter2 := &ec2.Filter{
|
|
|
|
Name: aws.String("vpc-id"),
|
|
|
|
Values: []*string{aws.String(d.Id())},
|
|
|
|
}
|
|
|
|
|
|
|
|
findOpts := &ec2.DescribeRouteTablesInput{
|
|
|
|
Filters: []*ec2.Filter{filter1, filter2},
|
|
|
|
}
|
|
|
|
|
|
|
|
resp, err := conn.DescribeRouteTables(findOpts)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(resp.RouteTables) < 1 || resp.RouteTables[0] == nil {
|
|
|
|
return fmt.Errorf("Default Route table not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
// There Can Be Only 1 ... Default Route Table
|
|
|
|
d.Set("default_route_table_id", resp.RouteTables[0].RouteTableId)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|