2014-07-08 20:06:39 +02:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
2014-08-21 07:24:13 +02:00
|
|
|
"bytes"
|
2014-07-08 20:06:39 +02:00
|
|
|
"fmt"
|
|
|
|
"log"
|
2014-08-22 17:46:03 +02:00
|
|
|
"sort"
|
2014-07-17 20:14:51 +02:00
|
|
|
"time"
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-08-21 07:24:13 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/hashcode"
|
2014-07-17 20:14:51 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
2014-08-20 19:40:18 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2014-07-08 20:06:39 +02:00
|
|
|
"github.com/mitchellh/goamz/ec2"
|
|
|
|
)
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
func resourceAwsSecurityGroup() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceAwsSecurityGroupCreate,
|
|
|
|
Read: resourceAwsSecurityGroupRead,
|
2014-08-20 19:54:43 +02:00
|
|
|
Update: resourceAwsSecurityGroupUpdate,
|
2014-08-20 19:40:18 +02:00
|
|
|
Delete: resourceAwsSecurityGroupDelete,
|
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"description": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"vpc_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2014-10-11 02:12:03 +02:00
|
|
|
Computed: true,
|
2014-08-20 19:40:18 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
"ingress": &schema.Schema{
|
2014-08-21 07:24:13 +02:00
|
|
|
Type: schema.TypeSet,
|
2014-12-08 08:52:04 +01:00
|
|
|
Optional: true,
|
2014-08-20 19:40:18 +02:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"from_port": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"to_port": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"protocol": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"cidr_blocks": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
},
|
|
|
|
|
|
|
|
"security_groups": &schema.Schema{
|
2014-10-21 19:49:27 +02:00
|
|
|
Type: schema.TypeSet,
|
2014-08-20 19:40:18 +02:00
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
2014-10-21 19:49:27 +02:00
|
|
|
Set: func(v interface{}) int {
|
|
|
|
return hashcode.String(v.(string))
|
|
|
|
},
|
2014-08-20 19:40:18 +02:00
|
|
|
},
|
2014-09-30 23:19:16 +02:00
|
|
|
|
|
|
|
"self": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
2014-10-21 19:49:27 +02:00
|
|
|
Default: false,
|
2014-09-30 23:19:16 +02:00
|
|
|
},
|
2014-08-20 19:40:18 +02:00
|
|
|
},
|
|
|
|
},
|
2014-08-21 07:24:13 +02:00
|
|
|
Set: resourceAwsSecurityGroupIngressHash,
|
2014-08-20 19:40:18 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
"owner_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2014-10-14 23:07:01 +02:00
|
|
|
|
|
|
|
"tags": tagsSchema(),
|
2014-08-20 19:40:18 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAwsSecurityGroupCreate(d *schema.ResourceData, meta interface{}) error {
|
2014-11-21 17:58:34 +01:00
|
|
|
ec2conn := meta.(*AWSClient).ec2conn
|
2014-07-08 20:06:39 +02:00
|
|
|
|
|
|
|
securityGroupOpts := ec2.SecurityGroup{
|
2014-08-20 19:40:18 +02:00
|
|
|
Name: d.Get("name").(string),
|
2014-07-17 02:13:16 +02:00
|
|
|
}
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
if v := d.Get("vpc_id"); v != nil {
|
|
|
|
securityGroupOpts.VpcId = v.(string)
|
2014-07-17 02:13:16 +02:00
|
|
|
}
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
if v := d.Get("description"); v != nil {
|
|
|
|
securityGroupOpts.Description = v.(string)
|
2014-07-08 20:06:39 +02:00
|
|
|
}
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
log.Printf(
|
|
|
|
"[DEBUG] Security Group create configuration: %#v", securityGroupOpts)
|
2014-07-08 20:06:39 +02:00
|
|
|
createResp, err := ec2conn.CreateSecurityGroup(securityGroupOpts)
|
|
|
|
if err != nil {
|
2014-08-20 19:40:18 +02:00
|
|
|
return fmt.Errorf("Error creating Security Group: %s", err)
|
2014-07-08 20:06:39 +02:00
|
|
|
}
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
d.SetId(createResp.Id)
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
log.Printf("[INFO] Security Group ID: %s", d.Id())
|
2014-07-17 20:14:51 +02:00
|
|
|
|
|
|
|
// Wait for the security group to truly exist
|
|
|
|
log.Printf(
|
2014-07-29 18:45:57 +02:00
|
|
|
"[DEBUG] Waiting for Security Group (%s) to exist",
|
2014-08-20 19:40:18 +02:00
|
|
|
d.Id())
|
2014-07-17 20:14:51 +02:00
|
|
|
stateConf := &resource.StateChangeConf{
|
|
|
|
Pending: []string{""},
|
|
|
|
Target: "exists",
|
2014-08-20 19:40:18 +02:00
|
|
|
Refresh: SGStateRefreshFunc(ec2conn, d.Id()),
|
2014-07-17 20:14:51 +02:00
|
|
|
Timeout: 1 * time.Minute,
|
|
|
|
}
|
|
|
|
if _, err := stateConf.WaitForState(); err != nil {
|
2014-08-20 19:40:18 +02:00
|
|
|
return fmt.Errorf(
|
2014-07-29 18:45:57 +02:00
|
|
|
"Error waiting for Security Group (%s) to become available: %s",
|
2014-08-20 19:40:18 +02:00
|
|
|
d.Id(), err)
|
2014-07-17 20:14:51 +02:00
|
|
|
}
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-09-30 23:19:16 +02:00
|
|
|
return resourceAwsSecurityGroupUpdate(d, meta)
|
2014-07-08 20:06:39 +02:00
|
|
|
}
|
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
func resourceAwsSecurityGroupRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
ec2conn := meta.(*AWSClient).ec2conn
|
|
|
|
|
|
|
|
sgRaw, _, err := SGStateRefreshFunc(ec2conn, d.Id())()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if sgRaw == nil {
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
sg := sgRaw.(*ec2.SecurityGroupInfo)
|
|
|
|
|
|
|
|
// Gather our ingress rules
|
|
|
|
ingressMap := make(map[string]map[string]interface{})
|
|
|
|
for _, perm := range sg.IPPerms {
|
|
|
|
k := fmt.Sprintf("%s-%d-%d", perm.Protocol, perm.FromPort, perm.ToPort)
|
|
|
|
m, ok := ingressMap[k]
|
|
|
|
if !ok {
|
|
|
|
m = make(map[string]interface{})
|
|
|
|
ingressMap[k] = m
|
|
|
|
}
|
|
|
|
|
|
|
|
m["from_port"] = perm.FromPort
|
|
|
|
m["to_port"] = perm.ToPort
|
|
|
|
m["protocol"] = perm.Protocol
|
|
|
|
|
|
|
|
if len(perm.SourceIPs) > 0 {
|
|
|
|
raw, ok := m["cidr_blocks"]
|
|
|
|
if !ok {
|
|
|
|
raw = make([]string, 0, len(perm.SourceIPs))
|
|
|
|
}
|
|
|
|
list := raw.([]string)
|
|
|
|
|
|
|
|
list = append(list, perm.SourceIPs...)
|
|
|
|
m["cidr_blocks"] = list
|
|
|
|
}
|
|
|
|
|
|
|
|
var groups []string
|
|
|
|
if len(perm.SourceGroups) > 0 {
|
|
|
|
groups = flattenSecurityGroups(perm.SourceGroups)
|
|
|
|
}
|
|
|
|
for i, id := range groups {
|
|
|
|
if id == d.Id() {
|
|
|
|
groups[i], groups = groups[len(groups)-1], groups[:len(groups)-1]
|
|
|
|
m["self"] = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(groups) > 0 {
|
|
|
|
raw, ok := m["security_groups"]
|
|
|
|
if !ok {
|
|
|
|
raw = make([]string, 0, len(groups))
|
|
|
|
}
|
|
|
|
list := raw.([]string)
|
|
|
|
|
|
|
|
list = append(list, groups...)
|
|
|
|
m["security_groups"] = list
|
|
|
|
}
|
|
|
|
}
|
|
|
|
ingressRules := make([]map[string]interface{}, 0, len(ingressMap))
|
|
|
|
for _, m := range ingressMap {
|
|
|
|
ingressRules = append(ingressRules, m)
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Set("description", sg.Description)
|
|
|
|
d.Set("name", sg.Name)
|
|
|
|
d.Set("vpc_id", sg.VpcId)
|
|
|
|
d.Set("owner_id", sg.OwnerId)
|
|
|
|
d.Set("ingress", ingressRules)
|
|
|
|
d.Set("tags", tagsToMap(sg.Tags))
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-08-20 19:54:43 +02:00
|
|
|
func resourceAwsSecurityGroupUpdate(d *schema.ResourceData, meta interface{}) error {
|
2014-11-21 17:58:34 +01:00
|
|
|
ec2conn := meta.(*AWSClient).ec2conn
|
2014-08-20 20:18:00 +02:00
|
|
|
|
|
|
|
sgRaw, _, err := SGStateRefreshFunc(ec2conn, d.Id())()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if sgRaw == nil {
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
group := sgRaw.(*ec2.SecurityGroupInfo).SecurityGroup
|
|
|
|
|
|
|
|
if d.HasChange("ingress") {
|
|
|
|
o, n := d.GetChange("ingress")
|
|
|
|
if o == nil {
|
2014-08-21 07:24:13 +02:00
|
|
|
o = new(schema.Set)
|
2014-08-20 20:18:00 +02:00
|
|
|
}
|
|
|
|
if n == nil {
|
2014-08-21 07:24:13 +02:00
|
|
|
n = new(schema.Set)
|
2014-08-20 20:18:00 +02:00
|
|
|
}
|
|
|
|
|
2014-08-21 07:24:13 +02:00
|
|
|
os := o.(*schema.Set)
|
|
|
|
ns := n.(*schema.Set)
|
|
|
|
|
2014-09-30 23:19:16 +02:00
|
|
|
remove := expandIPPerms(d.Id(), os.Difference(ns).List())
|
|
|
|
add := expandIPPerms(d.Id(), ns.Difference(os).List())
|
2014-08-20 20:18:00 +02:00
|
|
|
|
|
|
|
// TODO: We need to handle partial state better in the in-between
|
|
|
|
// in this update.
|
2014-08-21 21:00:32 +02:00
|
|
|
|
|
|
|
// TODO: It'd be nicer to authorize before removing, but then we have
|
|
|
|
// to deal with complicated unrolling to get individual CIDR blocks
|
|
|
|
// to avoid authorizing already authorized sources. Removing before
|
|
|
|
// adding is easier here, and Terraform should be fast enough to
|
|
|
|
// not have service issues.
|
|
|
|
|
2014-08-21 20:58:55 +02:00
|
|
|
if len(remove) > 0 {
|
|
|
|
// Revoke the old rules
|
|
|
|
_, err = ec2conn.RevokeSecurityGroup(group, remove)
|
2014-08-21 07:24:13 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error authorizing security group ingress rules: %s", err)
|
|
|
|
}
|
2014-08-20 20:18:00 +02:00
|
|
|
}
|
|
|
|
|
2014-08-21 20:58:55 +02:00
|
|
|
if len(add) > 0 {
|
|
|
|
// Authorize the new rules
|
|
|
|
_, err := ec2conn.AuthorizeSecurityGroup(group, add)
|
2014-08-21 07:24:13 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error authorizing security group ingress rules: %s", err)
|
|
|
|
}
|
2014-08-20 20:18:00 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-10-14 23:07:01 +02:00
|
|
|
if err := setTags(ec2conn, d); err != nil {
|
|
|
|
return err
|
|
|
|
} else {
|
|
|
|
d.SetPartial("tags")
|
|
|
|
}
|
|
|
|
|
2014-11-24 21:22:18 +01:00
|
|
|
return resourceAwsSecurityGroupRead(d, meta)
|
2014-08-20 19:54:43 +02:00
|
|
|
}
|
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
func resourceAwsSecurityGroupDelete(d *schema.ResourceData, meta interface{}) error {
|
2014-11-21 17:58:34 +01:00
|
|
|
ec2conn := meta.(*AWSClient).ec2conn
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-08-20 19:40:18 +02:00
|
|
|
log.Printf("[DEBUG] Security Group destroy: %v", d.Id())
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-10-18 03:29:48 +02:00
|
|
|
return resource.Retry(5*time.Minute, func() error {
|
2014-10-18 03:21:10 +02:00
|
|
|
_, err := ec2conn.DeleteSecurityGroup(ec2.SecurityGroup{Id: d.Id()})
|
|
|
|
if err != nil {
|
|
|
|
ec2err, ok := err.(*ec2.Error)
|
2014-10-18 03:29:48 +02:00
|
|
|
if !ok {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
switch ec2err.Code {
|
|
|
|
case "InvalidGroup.NotFound":
|
2014-10-18 03:21:10 +02:00
|
|
|
return nil
|
2014-10-18 03:29:48 +02:00
|
|
|
case "DependencyViolation":
|
|
|
|
// If it is a dependency violation, we want to retry
|
|
|
|
return err
|
|
|
|
default:
|
|
|
|
// Any other error, we want to quit the retry loop immediately
|
|
|
|
return resource.RetryError{err}
|
2014-10-18 03:21:10 +02:00
|
|
|
}
|
2014-07-08 20:06:39 +02:00
|
|
|
}
|
|
|
|
|
2014-10-18 03:29:48 +02:00
|
|
|
return nil
|
2014-10-18 03:21:10 +02:00
|
|
|
})
|
2014-07-08 20:06:39 +02:00
|
|
|
}
|
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
func resourceAwsSecurityGroupIngressHash(v interface{}) int {
|
|
|
|
var buf bytes.Buffer
|
|
|
|
m := v.(map[string]interface{})
|
|
|
|
buf.WriteString(fmt.Sprintf("%d-", m["from_port"].(int)))
|
|
|
|
buf.WriteString(fmt.Sprintf("%d-", m["to_port"].(int)))
|
|
|
|
buf.WriteString(fmt.Sprintf("%s-", m["protocol"].(string)))
|
2014-10-21 19:49:27 +02:00
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
// We need to make sure to sort the strings below so that we always
|
|
|
|
// generate the same hash code no matter what is in the set.
|
|
|
|
if v, ok := m["cidr_blocks"]; ok {
|
|
|
|
vs := v.([]interface{})
|
|
|
|
s := make([]string, len(vs))
|
|
|
|
for i, raw := range vs {
|
|
|
|
s[i] = raw.(string)
|
2014-07-29 18:06:28 +02:00
|
|
|
}
|
2014-11-21 17:58:34 +01:00
|
|
|
sort.Strings(s)
|
2014-07-29 18:06:28 +02:00
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
for _, v := range s {
|
|
|
|
buf.WriteString(fmt.Sprintf("%s-", v))
|
2014-09-30 23:26:01 +02:00
|
|
|
}
|
2014-11-21 17:58:34 +01:00
|
|
|
}
|
|
|
|
if v, ok := m["security_groups"]; ok {
|
|
|
|
vs := v.(*schema.Set).List()
|
|
|
|
s := make([]string, len(vs))
|
|
|
|
for i, raw := range vs {
|
|
|
|
s[i] = raw.(string)
|
2014-09-30 23:26:01 +02:00
|
|
|
}
|
2014-11-21 17:58:34 +01:00
|
|
|
sort.Strings(s)
|
2014-10-21 19:49:27 +02:00
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
for _, v := range s {
|
|
|
|
buf.WriteString(fmt.Sprintf("%s-", v))
|
2014-10-21 19:49:27 +02:00
|
|
|
}
|
|
|
|
}
|
2014-07-08 20:06:39 +02:00
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
return hashcode.String(buf.String())
|
2014-07-15 18:40:20 +02:00
|
|
|
}
|
2014-07-17 20:14:51 +02:00
|
|
|
|
|
|
|
// SGStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
|
|
|
|
// a security group.
|
|
|
|
func SGStateRefreshFunc(conn *ec2.EC2, id string) resource.StateRefreshFunc {
|
|
|
|
return func() (interface{}, string, error) {
|
|
|
|
sgs := []ec2.SecurityGroup{ec2.SecurityGroup{Id: id}}
|
|
|
|
resp, err := conn.SecurityGroups(sgs, nil)
|
|
|
|
if err != nil {
|
2014-07-17 20:28:40 +02:00
|
|
|
if ec2err, ok := err.(*ec2.Error); ok {
|
|
|
|
if ec2err.Code == "InvalidSecurityGroupID.NotFound" ||
|
|
|
|
ec2err.Code == "InvalidGroup.NotFound" {
|
|
|
|
resp = nil
|
|
|
|
err = nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if err != nil {
|
2014-07-17 20:14:51 +02:00
|
|
|
log.Printf("Error on SGStateRefresh: %s", err)
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if resp == nil {
|
|
|
|
return nil, "", nil
|
|
|
|
}
|
|
|
|
|
|
|
|
group := &resp.Groups[0]
|
|
|
|
return group, "exists", nil
|
|
|
|
}
|
|
|
|
}
|