2017-01-19 05:49:01 +01:00
|
|
|
package consul
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
consulapi "github.com/hashicorp/consul/api"
|
|
|
|
"github.com/hashicorp/terraform/backend"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
)
|
|
|
|
|
|
|
|
// New creates a new backend for Consul remote state.
|
|
|
|
func New() backend.Backend {
|
2017-03-02 07:15:08 +01:00
|
|
|
s := &schema.Backend{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"path": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
Description: "Path to store state in Consul",
|
|
|
|
},
|
|
|
|
|
|
|
|
"access_token": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Description: "Access token for a Consul ACL",
|
|
|
|
Default: "", // To prevent input
|
|
|
|
},
|
|
|
|
|
|
|
|
"address": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Description: "Address to the Consul Cluster",
|
|
|
|
Default: "", // To prevent input
|
|
|
|
},
|
|
|
|
|
|
|
|
"scheme": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Description: "Scheme to communicate to Consul with",
|
|
|
|
Default: "", // To prevent input
|
|
|
|
},
|
|
|
|
|
|
|
|
"datacenter": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Description: "Datacenter to communicate with",
|
|
|
|
Default: "", // To prevent input
|
|
|
|
},
|
|
|
|
|
|
|
|
"http_auth": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Description: "HTTP Auth in the format of 'username:password'",
|
|
|
|
Default: "", // To prevent input
|
2017-01-19 05:49:01 +01:00
|
|
|
},
|
2017-03-13 08:17:33 +01:00
|
|
|
|
|
|
|
"gzip": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
Description: "Compress the state data using gzip",
|
|
|
|
Default: false,
|
|
|
|
},
|
2017-01-19 05:49:01 +01:00
|
|
|
},
|
|
|
|
}
|
2017-03-02 07:15:08 +01:00
|
|
|
|
|
|
|
result := &Backend{Backend: s}
|
|
|
|
result.Backend.ConfigureFunc = result.configure
|
|
|
|
return result
|
2017-01-19 05:49:01 +01:00
|
|
|
}
|
|
|
|
|
2017-03-02 07:15:08 +01:00
|
|
|
type Backend struct {
|
|
|
|
*schema.Backend
|
|
|
|
|
|
|
|
configData *schema.ResourceData
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) configure(ctx context.Context) error {
|
2017-01-19 05:49:01 +01:00
|
|
|
// Grab the resource data
|
2017-03-02 07:15:08 +01:00
|
|
|
b.configData = schema.FromContextBackendConfig(ctx)
|
|
|
|
|
|
|
|
// Initialize a client to test config
|
|
|
|
_, err := b.clientRaw()
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *Backend) clientRaw() (*consulapi.Client, error) {
|
|
|
|
data := b.configData
|
2017-01-19 05:49:01 +01:00
|
|
|
|
|
|
|
// Configure the client
|
|
|
|
config := consulapi.DefaultConfig()
|
|
|
|
if v, ok := data.GetOk("access_token"); ok && v.(string) != "" {
|
|
|
|
config.Token = v.(string)
|
|
|
|
}
|
|
|
|
if v, ok := data.GetOk("address"); ok && v.(string) != "" {
|
|
|
|
config.Address = v.(string)
|
|
|
|
}
|
|
|
|
if v, ok := data.GetOk("scheme"); ok && v.(string) != "" {
|
|
|
|
config.Scheme = v.(string)
|
|
|
|
}
|
|
|
|
if v, ok := data.GetOk("datacenter"); ok && v.(string) != "" {
|
|
|
|
config.Datacenter = v.(string)
|
|
|
|
}
|
|
|
|
if v, ok := data.GetOk("http_auth"); ok && v.(string) != "" {
|
|
|
|
auth := v.(string)
|
|
|
|
|
|
|
|
var username, password string
|
|
|
|
if strings.Contains(auth, ":") {
|
|
|
|
split := strings.SplitN(auth, ":", 2)
|
|
|
|
username = split[0]
|
|
|
|
password = split[1]
|
|
|
|
} else {
|
|
|
|
username = auth
|
|
|
|
}
|
|
|
|
|
|
|
|
config.HttpAuth = &consulapi.HttpBasicAuth{
|
|
|
|
Username: username,
|
|
|
|
Password: password,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-03-02 07:15:08 +01:00
|
|
|
return consulapi.NewClient(config)
|
2017-01-19 05:49:01 +01:00
|
|
|
}
|