2015-04-30 10:58:45 +02:00
|
|
|
package azure
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
|
2015-06-05 16:12:21 +02:00
|
|
|
"github.com/Azure/azure-sdk-for-go/management"
|
|
|
|
"github.com/Azure/azure-sdk-for-go/management/virtualnetwork"
|
2015-05-28 00:50:45 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/hashcode"
|
2015-04-30 10:58:45 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
virtualNetworkRetrievalError = "Error retrieving Virtual Network Configuration: %s"
|
|
|
|
)
|
|
|
|
|
|
|
|
func resourceAzureVirtualNetwork() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceAzureVirtualNetworkCreate,
|
|
|
|
Read: resourceAzureVirtualNetworkRead,
|
|
|
|
Update: resourceAzureVirtualNetworkUpdate,
|
|
|
|
Delete: resourceAzureVirtualNetworkDelete,
|
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"address_space": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Required: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
},
|
|
|
|
|
2015-06-05 16:12:21 +02:00
|
|
|
"dns_servers_names": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
2015-04-30 10:58:45 +02:00
|
|
|
"subnet": &schema.Schema{
|
2015-05-28 00:50:45 +02:00
|
|
|
Type: schema.TypeSet,
|
2015-04-30 10:58:45 +02:00
|
|
|
Required: true,
|
2015-05-28 00:50:45 +02:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
"address_prefix": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
"security_group": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Set: resourceAzureSubnetHash,
|
2015-04-30 10:58:45 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
"location": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAzureVirtualNetworkCreate(d *schema.ResourceData, meta interface{}) error {
|
2015-05-29 00:10:21 +02:00
|
|
|
ac := meta.(*Client)
|
|
|
|
mc := ac.mgmtClient
|
2015-06-16 19:54:52 +02:00
|
|
|
vnetClient := ac.vnetClient
|
2015-04-30 10:58:45 +02:00
|
|
|
|
|
|
|
name := d.Get("name").(string)
|
|
|
|
|
2015-05-29 00:10:21 +02:00
|
|
|
// Lock the client just before we get the virtual network configuration and immediately
|
|
|
|
// set an defer to unlock the client again whenever this function exits
|
|
|
|
ac.mutex.Lock()
|
|
|
|
defer ac.mutex.Unlock()
|
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
nc, err := vnetClient.GetVirtualNetworkConfiguration()
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
2015-06-30 01:12:12 +02:00
|
|
|
if management.IsResourceNotFoundError(err) {
|
|
|
|
// if no network config exists yet; create a new one now:
|
2015-04-30 10:58:45 +02:00
|
|
|
nc = virtualnetwork.NetworkConfiguration{}
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf(virtualNetworkRetrievalError, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, n := range nc.Configuration.VirtualNetworkSites {
|
|
|
|
if n.Name == name {
|
|
|
|
return fmt.Errorf("Virtual Network %s already exists!", name)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-05 16:12:21 +02:00
|
|
|
network := createVirtualNetwork(d)
|
2015-04-30 10:58:45 +02:00
|
|
|
nc.Configuration.VirtualNetworkSites = append(nc.Configuration.VirtualNetworkSites, network)
|
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
req, err := vnetClient.SetVirtualNetworkConfiguration(nc)
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating Virtual Network %s: %s", name, err)
|
|
|
|
}
|
|
|
|
|
2015-05-22 15:31:14 +02:00
|
|
|
// Wait until the virtual network is created
|
|
|
|
if err := mc.WaitForOperation(req, nil); err != nil {
|
2015-05-28 00:50:45 +02:00
|
|
|
return fmt.Errorf("Error waiting for Virtual Network %s to be created: %s", name, err)
|
2015-05-22 15:31:14 +02:00
|
|
|
}
|
|
|
|
|
2015-04-30 10:58:45 +02:00
|
|
|
d.SetId(name)
|
|
|
|
|
2015-05-28 00:50:45 +02:00
|
|
|
if err := associateSecurityGroups(d, meta); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-04-30 10:58:45 +02:00
|
|
|
return resourceAzureVirtualNetworkRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAzureVirtualNetworkRead(d *schema.ResourceData, meta interface{}) error {
|
2015-06-16 19:54:52 +02:00
|
|
|
ac := meta.(*Client)
|
|
|
|
vnetClient := ac.vnetClient
|
|
|
|
secGroupClient := ac.secGroupClient
|
2015-04-30 10:58:45 +02:00
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
nc, err := vnetClient.GetVirtualNetworkConfiguration()
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf(virtualNetworkRetrievalError, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, n := range nc.Configuration.VirtualNetworkSites {
|
|
|
|
if n.Name == d.Id() {
|
|
|
|
d.Set("address_space", n.AddressSpace.AddressPrefix)
|
|
|
|
d.Set("location", n.Location)
|
|
|
|
|
2015-05-28 00:50:45 +02:00
|
|
|
// Create a new set to hold all configured subnets
|
|
|
|
subnets := &schema.Set{
|
|
|
|
F: resourceAzureSubnetHash,
|
|
|
|
}
|
|
|
|
|
|
|
|
// Loop through all endpoints
|
2015-04-30 10:58:45 +02:00
|
|
|
for _, s := range n.Subnets {
|
2015-05-28 00:50:45 +02:00
|
|
|
subnet := map[string]interface{}{}
|
|
|
|
|
|
|
|
// Get the associated (if any) security group
|
2015-06-16 19:54:52 +02:00
|
|
|
sg, err := secGroupClient.GetNetworkSecurityGroupForSubnet(s.Name, d.Id())
|
2015-05-28 00:50:45 +02:00
|
|
|
if err != nil && !management.IsResourceNotFoundError(err) {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error retrieving Network Security Group associations of subnet %s: %s", s.Name, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Update the values
|
|
|
|
subnet["name"] = s.Name
|
|
|
|
subnet["address_prefix"] = s.AddressPrefix
|
|
|
|
subnet["security_group"] = sg.Name
|
|
|
|
|
|
|
|
subnets.Add(subnet)
|
2015-04-30 10:58:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
d.Set("subnet", subnets)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
log.Printf("[DEBUG] Virtual Network %s does no longer exist", d.Id())
|
|
|
|
d.SetId("")
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAzureVirtualNetworkUpdate(d *schema.ResourceData, meta interface{}) error {
|
2015-05-29 00:10:21 +02:00
|
|
|
ac := meta.(*Client)
|
|
|
|
mc := ac.mgmtClient
|
2015-06-16 19:54:52 +02:00
|
|
|
vnetClient := ac.vnetClient
|
2015-05-29 00:10:21 +02:00
|
|
|
|
|
|
|
// Lock the client just before we get the virtual network configuration and immediately
|
|
|
|
// set an defer to unlock the client again whenever this function exits
|
|
|
|
ac.mutex.Lock()
|
|
|
|
defer ac.mutex.Unlock()
|
2015-04-30 10:58:45 +02:00
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
nc, err := vnetClient.GetVirtualNetworkConfiguration()
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf(virtualNetworkRetrievalError, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
found := false
|
|
|
|
for i, n := range nc.Configuration.VirtualNetworkSites {
|
|
|
|
if n.Name == d.Id() {
|
2015-06-05 16:12:21 +02:00
|
|
|
network := createVirtualNetwork(d)
|
2015-04-30 10:58:45 +02:00
|
|
|
nc.Configuration.VirtualNetworkSites[i] = network
|
|
|
|
|
|
|
|
found = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if !found {
|
|
|
|
return fmt.Errorf("Virtual Network %s does not exists!", d.Id())
|
|
|
|
}
|
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
req, err := vnetClient.SetVirtualNetworkConfiguration(nc)
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error updating Virtual Network %s: %s", d.Id(), err)
|
|
|
|
}
|
|
|
|
|
2015-05-22 15:31:14 +02:00
|
|
|
// Wait until the virtual network is updated
|
|
|
|
if err := mc.WaitForOperation(req, nil); err != nil {
|
2015-05-28 00:50:45 +02:00
|
|
|
return fmt.Errorf("Error waiting for Virtual Network %s to be updated: %s", d.Id(), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := associateSecurityGroups(d, meta); err != nil {
|
|
|
|
return err
|
2015-05-22 15:31:14 +02:00
|
|
|
}
|
|
|
|
|
2015-04-30 10:58:45 +02:00
|
|
|
return resourceAzureVirtualNetworkRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceAzureVirtualNetworkDelete(d *schema.ResourceData, meta interface{}) error {
|
2015-05-29 00:10:21 +02:00
|
|
|
ac := meta.(*Client)
|
|
|
|
mc := ac.mgmtClient
|
2015-06-16 19:54:52 +02:00
|
|
|
vnetClient := ac.vnetClient
|
2015-05-29 00:10:21 +02:00
|
|
|
|
|
|
|
// Lock the client just before we get the virtual network configuration and immediately
|
|
|
|
// set an defer to unlock the client again whenever this function exits
|
|
|
|
ac.mutex.Lock()
|
|
|
|
defer ac.mutex.Unlock()
|
2015-04-30 10:58:45 +02:00
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
nc, err := vnetClient.GetVirtualNetworkConfiguration()
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf(virtualNetworkRetrievalError, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
filtered := nc.Configuration.VirtualNetworkSites[:0]
|
|
|
|
for _, n := range nc.Configuration.VirtualNetworkSites {
|
|
|
|
if n.Name != d.Id() {
|
|
|
|
filtered = append(filtered, n)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
nc.Configuration.VirtualNetworkSites = filtered
|
|
|
|
|
2015-06-16 19:54:52 +02:00
|
|
|
req, err := vnetClient.SetVirtualNetworkConfiguration(nc)
|
2015-04-30 10:58:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error deleting Virtual Network %s: %s", d.Id(), err)
|
|
|
|
}
|
|
|
|
|
2015-05-22 15:31:14 +02:00
|
|
|
// Wait until the virtual network is deleted
|
|
|
|
if err := mc.WaitForOperation(req, nil); err != nil {
|
2015-05-28 00:50:45 +02:00
|
|
|
return fmt.Errorf("Error waiting for Virtual Network %s to be deleted: %s", d.Id(), err)
|
2015-05-22 15:31:14 +02:00
|
|
|
}
|
|
|
|
|
2015-04-30 10:58:45 +02:00
|
|
|
d.SetId("")
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-05-28 00:50:45 +02:00
|
|
|
func resourceAzureSubnetHash(v interface{}) int {
|
|
|
|
m := v.(map[string]interface{})
|
|
|
|
subnet := m["name"].(string) + m["address_prefix"].(string) + m["security_group"].(string)
|
|
|
|
return hashcode.String(subnet)
|
|
|
|
}
|
|
|
|
|
2015-06-05 16:12:21 +02:00
|
|
|
func createVirtualNetwork(d *schema.ResourceData) virtualnetwork.VirtualNetworkSite {
|
|
|
|
// fetch address spaces:
|
|
|
|
var prefixes []string
|
|
|
|
for _, prefix := range d.Get("address_space").([]interface{}) {
|
|
|
|
prefixes = append(prefixes, prefix.(string))
|
2015-04-30 10:58:45 +02:00
|
|
|
}
|
|
|
|
|
2015-06-05 16:12:21 +02:00
|
|
|
// fetch DNS references:
|
|
|
|
var dnsRefs []virtualnetwork.DNSServerRef
|
|
|
|
for _, dns := range d.Get("dns_servers_names").([]interface{}) {
|
|
|
|
dnsRefs = append(dnsRefs, virtualnetwork.DNSServerRef{
|
|
|
|
Name: dns.(string),
|
|
|
|
})
|
2015-04-30 10:58:45 +02:00
|
|
|
}
|
|
|
|
|
2015-05-28 00:50:45 +02:00
|
|
|
// Add all subnets that are configured
|
|
|
|
var subnets []virtualnetwork.Subnet
|
|
|
|
if rs := d.Get("subnet").(*schema.Set); rs.Len() > 0 {
|
|
|
|
for _, subnet := range rs.List() {
|
|
|
|
subnet := subnet.(map[string]interface{})
|
|
|
|
subnets = append(subnets, virtualnetwork.Subnet{
|
|
|
|
Name: subnet["name"].(string),
|
|
|
|
AddressPrefix: subnet["address_prefix"].(string),
|
|
|
|
})
|
|
|
|
}
|
2015-04-30 10:58:45 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return virtualnetwork.VirtualNetworkSite{
|
2015-06-05 16:12:21 +02:00
|
|
|
Name: d.Get("name").(string),
|
|
|
|
Location: d.Get("location").(string),
|
|
|
|
AddressSpace: virtualnetwork.AddressSpace{
|
|
|
|
AddressPrefix: prefixes,
|
|
|
|
},
|
|
|
|
DNSServersRef: dnsRefs,
|
|
|
|
Subnets: subnets,
|
|
|
|
}
|
2015-04-30 10:58:45 +02:00
|
|
|
}
|
2015-05-28 00:50:45 +02:00
|
|
|
|
|
|
|
func associateSecurityGroups(d *schema.ResourceData, meta interface{}) error {
|
2015-06-16 19:54:52 +02:00
|
|
|
azureClient := meta.(*Client)
|
|
|
|
mc := azureClient.mgmtClient
|
|
|
|
secGroupClient := azureClient.secGroupClient
|
2015-05-28 00:50:45 +02:00
|
|
|
|
|
|
|
virtualNetwork := d.Get("name").(string)
|
|
|
|
|
|
|
|
if rs := d.Get("subnet").(*schema.Set); rs.Len() > 0 {
|
|
|
|
for _, subnet := range rs.List() {
|
|
|
|
subnet := subnet.(map[string]interface{})
|
|
|
|
securityGroup := subnet["security_group"].(string)
|
|
|
|
subnetName := subnet["name"].(string)
|
|
|
|
|
|
|
|
// Get the associated (if any) security group
|
2015-06-16 19:54:52 +02:00
|
|
|
sg, err := secGroupClient.GetNetworkSecurityGroupForSubnet(subnetName, d.Id())
|
2015-05-28 00:50:45 +02:00
|
|
|
if err != nil && !management.IsResourceNotFoundError(err) {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error retrieving Network Security Group associations of subnet %s: %s", subnetName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the desired and actual security group are the same, were done so can just continue
|
|
|
|
if sg.Name == securityGroup {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// If there is an associated security group, make sure we first remove it from the subnet
|
|
|
|
if sg.Name != "" {
|
2015-06-16 19:54:52 +02:00
|
|
|
req, err := secGroupClient.RemoveNetworkSecurityGroupFromSubnet(sg.Name, subnetName, virtualNetwork)
|
2015-05-28 00:50:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error removing Network Security Group %s from subnet %s: %s",
|
|
|
|
securityGroup, subnetName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait until the security group is associated
|
|
|
|
if err := mc.WaitForOperation(req, nil); err != nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error waiting for Network Security Group %s to be removed from subnet %s: %s",
|
|
|
|
securityGroup, subnetName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If the desired security group is not empty, assign the security group to the subnet
|
|
|
|
if securityGroup != "" {
|
2015-06-16 19:54:52 +02:00
|
|
|
req, err := secGroupClient.AddNetworkSecurityToSubnet(securityGroup, subnetName, virtualNetwork)
|
2015-05-28 00:50:45 +02:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error associating Network Security Group %s to subnet %s: %s",
|
|
|
|
securityGroup, subnetName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Wait until the security group is associated
|
|
|
|
if err := mc.WaitForOperation(req, nil); err != nil {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"Error waiting for Network Security Group %s to be associated with subnet %s: %s",
|
|
|
|
securityGroup, subnetName, err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|