2016-12-05 16:29:41 +01:00
|
|
|
package rancher
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2017-06-08 11:24:53 +02:00
|
|
|
rancherClient "github.com/rancher/go-rancher/v2"
|
2016-12-05 16:29:41 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func resourceRancherRegistrationToken() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceRancherRegistrationTokenCreate,
|
|
|
|
Read: resourceRancherRegistrationTokenRead,
|
|
|
|
Delete: resourceRancherRegistrationTokenDelete,
|
2017-06-08 11:24:53 +02:00
|
|
|
Update: resourceRancherRegistrationTokenUpdate,
|
2016-12-05 16:29:41 +01:00
|
|
|
Importer: &schema.ResourceImporter{
|
2017-02-03 13:34:26 +01:00
|
|
|
State: resourceRancherRegistrationTokenImport,
|
2016-12-05 16:29:41 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"description": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"environment_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"token": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"registration_url": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"command": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2017-01-31 16:56:50 +01:00
|
|
|
"image": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2017-06-08 11:24:53 +02:00
|
|
|
"host_labels": {
|
|
|
|
Type: schema.TypeMap,
|
|
|
|
Optional: true,
|
|
|
|
},
|
2016-12-05 16:29:41 +01:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceRancherRegistrationTokenCreate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
log.Printf("[INFO] Creating RegistrationToken: %s", d.Id())
|
|
|
|
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
name := d.Get("name").(string)
|
|
|
|
description := d.Get("description").(string)
|
|
|
|
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"name": &name,
|
|
|
|
"description": &description,
|
|
|
|
}
|
|
|
|
|
|
|
|
var newRegT rancherClient.RegistrationToken
|
|
|
|
if err := client.Create("registrationToken", data, &newRegT); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
|
|
Pending: []string{"active", "removed", "removing"},
|
|
|
|
Target: []string{"active"},
|
|
|
|
Refresh: RegistrationTokenStateRefreshFunc(client, newRegT.Id),
|
|
|
|
Timeout: 10 * time.Minute,
|
|
|
|
Delay: 1 * time.Second,
|
|
|
|
MinTimeout: 3 * time.Second,
|
|
|
|
}
|
|
|
|
_, waitErr := stateConf.WaitForState()
|
|
|
|
if waitErr != nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error waiting for registration token (%s) to be created: %s", newRegT.Id, waitErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetId(newRegT.Id)
|
|
|
|
log.Printf("[INFO] RegistrationToken ID: %s", d.Id())
|
|
|
|
|
|
|
|
return resourceRancherRegistrationTokenRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceRancherRegistrationTokenRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
log.Printf("[INFO] Refreshing RegistrationToken: %s", d.Id())
|
2017-01-30 18:08:21 +01:00
|
|
|
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-12-05 16:29:41 +01:00
|
|
|
|
|
|
|
regT, err := client.RegistrationToken.ById(d.Id())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-01-31 14:04:59 +01:00
|
|
|
if regT == nil {
|
|
|
|
log.Printf("[INFO] RegistrationToken %s not found", d.Id())
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-01 20:49:17 +01:00
|
|
|
if removed(regT.State) {
|
|
|
|
log.Printf("[INFO] Registration Token %s was removed on %v", d.Id(), regT.Removed)
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-06-08 11:24:53 +02:00
|
|
|
regCommand := addHostLabels(regT.Command, d.Get("host_labels").(map[string]interface{}))
|
2016-12-05 16:29:41 +01:00
|
|
|
log.Printf("[INFO] RegistrationToken Name: %s", regT.Name)
|
|
|
|
|
|
|
|
d.Set("description", regT.Description)
|
|
|
|
d.Set("name", regT.Name)
|
|
|
|
d.Set("token", regT.Token)
|
|
|
|
d.Set("registration_url", regT.RegistrationUrl)
|
|
|
|
d.Set("environment_id", regT.AccountId)
|
2017-06-08 11:24:53 +02:00
|
|
|
d.Set("command", regCommand)
|
2017-01-31 16:56:50 +01:00
|
|
|
d.Set("image", regT.Image)
|
2016-12-05 16:29:41 +01:00
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceRancherRegistrationTokenDelete(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
log.Printf("[INFO] Deleting RegistrationToken: %s", d.Id())
|
|
|
|
id := d.Id()
|
|
|
|
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
regT, err := client.RegistrationToken.ById(id)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Step 1: Deactivate
|
|
|
|
if _, e := client.RegistrationToken.ActionDeactivate(regT); e != nil {
|
|
|
|
return fmt.Errorf("Error deactivating RegistrationToken: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Waiting for registration token (%s) to be deactivated", id)
|
|
|
|
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
|
|
Pending: []string{"active", "inactive", "deactivating"},
|
|
|
|
Target: []string{"inactive"},
|
|
|
|
Refresh: RegistrationTokenStateRefreshFunc(client, id),
|
|
|
|
Timeout: 10 * time.Minute,
|
|
|
|
Delay: 1 * time.Second,
|
|
|
|
MinTimeout: 3 * time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
_, waitErr := stateConf.WaitForState()
|
|
|
|
if waitErr != nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error waiting for registration token (%s) to be deactivated: %s", id, waitErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update resource to reflect its state
|
|
|
|
regT, err = client.RegistrationToken.ById(id)
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Failed to refresh state of deactivated registration token (%s): %s", id, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Step 2: Remove
|
|
|
|
if _, err := client.RegistrationToken.ActionRemove(regT); err != nil {
|
|
|
|
return fmt.Errorf("Error removing RegistrationToken: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Waiting for registration token (%s) to be removed", id)
|
|
|
|
|
|
|
|
stateConf = &resource.StateChangeConf{
|
|
|
|
Pending: []string{"inactive", "removed", "removing"},
|
|
|
|
Target: []string{"removed"},
|
|
|
|
Refresh: RegistrationTokenStateRefreshFunc(client, id),
|
|
|
|
Timeout: 10 * time.Minute,
|
|
|
|
Delay: 1 * time.Second,
|
|
|
|
MinTimeout: 3 * time.Second,
|
|
|
|
}
|
|
|
|
|
|
|
|
_, waitErr = stateConf.WaitForState()
|
|
|
|
if waitErr != nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error waiting for registration token (%s) to be removed: %s", id, waitErr)
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-06-08 11:24:53 +02:00
|
|
|
func resourceRancherRegistrationTokenUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
//if d.HasChange("host_labels") {
|
|
|
|
//newCommand := addHostLabels(
|
|
|
|
//d.Get("command").(string),
|
|
|
|
//d.Get("host_labels").(map[string]interface{}))
|
|
|
|
//d.Set("command", newCommand)
|
|
|
|
//}
|
|
|
|
return resourceRancherRegistrationTokenRead(d, meta)
|
|
|
|
}
|
|
|
|
|
2017-02-03 13:34:26 +01:00
|
|
|
func resourceRancherRegistrationTokenImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
|
2017-02-05 11:35:48 +01:00
|
|
|
envID, resourceID := splitID(d.Id())
|
|
|
|
d.SetId(resourceID)
|
|
|
|
if envID != "" {
|
|
|
|
d.Set("environment_id", envID)
|
|
|
|
} else {
|
|
|
|
client, err := meta.(*Config).GlobalClient()
|
|
|
|
if err != nil {
|
|
|
|
return []*schema.ResourceData{}, err
|
|
|
|
}
|
|
|
|
token, err := client.RegistrationToken.ById(d.Id())
|
|
|
|
if err != nil {
|
|
|
|
return []*schema.ResourceData{}, err
|
|
|
|
}
|
|
|
|
d.Set("environment_id", token.AccountId)
|
2017-02-03 13:34:26 +01:00
|
|
|
}
|
|
|
|
return []*schema.ResourceData{d}, nil
|
|
|
|
}
|
|
|
|
|
2016-12-05 16:29:41 +01:00
|
|
|
// RegistrationTokenStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
|
|
|
|
// a Rancher RegistrationToken.
|
|
|
|
func RegistrationTokenStateRefreshFunc(client *rancherClient.RancherClient, regTID string) resource.StateRefreshFunc {
|
|
|
|
return func() (interface{}, string, error) {
|
|
|
|
regT, err := client.RegistrationToken.ById(regTID)
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return regT, regT.State, nil
|
|
|
|
}
|
|
|
|
}
|