2016-11-22 22:16:23 +01:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
|
2017-02-05 11:19:25 +01:00
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
2016-11-22 22:16:23 +01:00
|
|
|
"github.com/aws/aws-sdk-go/service/ec2"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
)
|
|
|
|
|
|
|
|
func dataSourceAwsRouteTable() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Read: dataSourceAwsRouteTableRead,
|
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"subnet_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2017-01-11 19:22:29 +01:00
|
|
|
"route_table_id": {
|
2017-01-11 19:16:52 +01:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2016-11-22 22:16:23 +01:00
|
|
|
"vpc_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"filter": ec2CustomFiltersSchema(),
|
|
|
|
"tags": tagsSchemaComputed(),
|
|
|
|
"routes": {
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Computed: true,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"cidr_block": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2017-03-14 11:38:25 +01:00
|
|
|
"ipv6_cidr_block": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"egress_only_gateway_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2016-11-22 22:16:23 +01:00
|
|
|
"gateway_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"instance_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"nat_gateway_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"vpc_peering_connection_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"network_interface_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"associations": {
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Computed: true,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"route_table_association_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"route_table_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"subnet_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"main": {
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func dataSourceAwsRouteTableRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
conn := meta.(*AWSClient).ec2conn
|
|
|
|
req := &ec2.DescribeRouteTablesInput{}
|
|
|
|
vpcId, vpcIdOk := d.GetOk("vpc_id")
|
|
|
|
subnetId, subnetIdOk := d.GetOk("subnet_id")
|
2017-01-11 19:22:29 +01:00
|
|
|
rtbId, rtbOk := d.GetOk("route_table_id")
|
2016-11-22 22:16:23 +01:00
|
|
|
tags, tagsOk := d.GetOk("tags")
|
|
|
|
filter, filterOk := d.GetOk("filter")
|
|
|
|
|
2017-01-11 19:16:52 +01:00
|
|
|
if !vpcIdOk && !subnetIdOk && !tagsOk && !filterOk && !rtbOk {
|
2017-01-11 19:23:40 +01:00
|
|
|
return fmt.Errorf("One of route_table_id, vpc_id, subnet_id, filters, or tags must be assigned")
|
2016-11-22 22:16:23 +01:00
|
|
|
}
|
|
|
|
req.Filters = buildEC2AttributeFilterList(
|
|
|
|
map[string]string{
|
2017-01-11 19:16:52 +01:00
|
|
|
"route-table-id": rtbId.(string),
|
2016-11-22 22:16:23 +01:00
|
|
|
"vpc-id": vpcId.(string),
|
|
|
|
"association.subnet-id": subnetId.(string),
|
|
|
|
},
|
|
|
|
)
|
|
|
|
req.Filters = append(req.Filters, buildEC2TagFilterList(
|
|
|
|
tagsFromMap(tags.(map[string]interface{})),
|
|
|
|
)...)
|
|
|
|
req.Filters = append(req.Filters, buildEC2CustomFilterList(
|
|
|
|
filter.(*schema.Set),
|
|
|
|
)...)
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Describe Route Tables %v\n", req)
|
|
|
|
resp, err := conn.DescribeRouteTables(req)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if resp == nil || len(resp.RouteTables) == 0 {
|
|
|
|
return fmt.Errorf("Your query returned no results. Please change your search criteria and try again.")
|
|
|
|
}
|
|
|
|
if len(resp.RouteTables) > 1 {
|
|
|
|
return fmt.Errorf("Multiple Route Table matched; use additional constraints to reduce matches to a single Route Table")
|
|
|
|
}
|
|
|
|
|
|
|
|
rt := resp.RouteTables[0]
|
|
|
|
|
2017-02-05 11:19:25 +01:00
|
|
|
d.SetId(aws.StringValue(rt.RouteTableId))
|
|
|
|
d.Set("route_table_id", rt.RouteTableId)
|
2016-11-22 22:16:23 +01:00
|
|
|
d.Set("vpc_id", rt.VpcId)
|
|
|
|
d.Set("tags", tagsToMap(rt.Tags))
|
|
|
|
if err := d.Set("routes", dataSourceRoutesRead(rt.Routes)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := d.Set("associations", dataSourceAssociationsRead(rt.Associations)); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func dataSourceRoutesRead(ec2Routes []*ec2.Route) []map[string]interface{} {
|
|
|
|
routes := make([]map[string]interface{}, 0, len(ec2Routes))
|
|
|
|
// Loop through the routes and add them to the set
|
|
|
|
for _, r := range ec2Routes {
|
|
|
|
if r.GatewayId != nil && *r.GatewayId == "local" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.Origin != nil && *r.Origin == "EnableVgwRoutePropagation" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
if r.DestinationPrefixListId != nil {
|
|
|
|
// Skipping because VPC endpoint routes are handled separately
|
|
|
|
// See aws_vpc_endpoint
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
m := make(map[string]interface{})
|
|
|
|
|
|
|
|
if r.DestinationCidrBlock != nil {
|
|
|
|
m["cidr_block"] = *r.DestinationCidrBlock
|
|
|
|
}
|
2017-03-14 11:38:25 +01:00
|
|
|
if r.DestinationIpv6CidrBlock != nil {
|
|
|
|
m["ipv6_cidr_block"] = *r.DestinationIpv6CidrBlock
|
|
|
|
}
|
|
|
|
if r.EgressOnlyInternetGatewayId != nil {
|
|
|
|
m["egress_only_gateway_id"] = *r.EgressOnlyInternetGatewayId
|
|
|
|
}
|
2016-11-22 22:16:23 +01:00
|
|
|
if r.GatewayId != nil {
|
|
|
|
m["gateway_id"] = *r.GatewayId
|
|
|
|
}
|
|
|
|
if r.NatGatewayId != nil {
|
|
|
|
m["nat_gateway_id"] = *r.NatGatewayId
|
|
|
|
}
|
|
|
|
if r.InstanceId != nil {
|
|
|
|
m["instance_id"] = *r.InstanceId
|
|
|
|
}
|
|
|
|
if r.VpcPeeringConnectionId != nil {
|
|
|
|
m["vpc_peering_connection_id"] = *r.VpcPeeringConnectionId
|
|
|
|
}
|
|
|
|
if r.NetworkInterfaceId != nil {
|
|
|
|
m["network_interface_id"] = *r.NetworkInterfaceId
|
|
|
|
}
|
|
|
|
|
|
|
|
routes = append(routes, m)
|
|
|
|
}
|
|
|
|
return routes
|
|
|
|
}
|
|
|
|
|
|
|
|
func dataSourceAssociationsRead(ec2Assocations []*ec2.RouteTableAssociation) []map[string]interface{} {
|
|
|
|
associations := make([]map[string]interface{}, 0, len(ec2Assocations))
|
|
|
|
// Loop through the routes and add them to the set
|
|
|
|
for _, a := range ec2Assocations {
|
|
|
|
|
|
|
|
m := make(map[string]interface{})
|
|
|
|
m["route_table_id"] = *a.RouteTableId
|
|
|
|
m["route_table_association_id"] = *a.RouteTableAssociationId
|
2017-01-11 16:47:15 +01:00
|
|
|
// GH[11134]
|
|
|
|
if a.SubnetId != nil {
|
|
|
|
m["subnet_id"] = *a.SubnetId
|
|
|
|
}
|
2016-11-22 22:16:23 +01:00
|
|
|
m["main"] = *a.Main
|
|
|
|
associations = append(associations, m)
|
|
|
|
}
|
|
|
|
return associations
|
|
|
|
}
|