2015-12-08 23:30:12 +01:00
|
|
|
package azurerm
|
|
|
|
|
|
|
|
import (
|
2016-01-05 22:43:52 +01:00
|
|
|
"fmt"
|
2016-01-20 16:25:26 +01:00
|
|
|
"log"
|
2016-01-05 22:43:52 +01:00
|
|
|
"net/http"
|
2016-02-18 22:33:01 +01:00
|
|
|
"reflect"
|
2015-12-08 23:30:12 +01:00
|
|
|
"strings"
|
|
|
|
|
2016-01-20 16:25:26 +01:00
|
|
|
"github.com/Azure/azure-sdk-for-go/Godeps/_workspace/src/github.com/Azure/go-autorest/autorest"
|
2016-01-29 16:48:20 +01:00
|
|
|
"github.com/hashicorp/go-multierror"
|
2016-01-08 16:55:46 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/mutexkv"
|
2016-02-18 22:33:01 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
2015-12-08 23:30:12 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2016-02-18 22:33:01 +01:00
|
|
|
riviera "github.com/jen20/riviera/azure"
|
2015-12-08 23:30:12 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
// Provider returns a terraform.ResourceProvider.
|
|
|
|
func Provider() terraform.ResourceProvider {
|
|
|
|
return &schema.Provider{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"subscription_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2015-12-09 02:25:05 +01:00
|
|
|
Required: true,
|
2015-12-09 00:50:48 +01:00
|
|
|
DefaultFunc: schema.EnvDefaultFunc("ARM_SUBSCRIPTION_ID", ""),
|
2015-12-08 23:30:12 +01:00
|
|
|
},
|
|
|
|
|
|
|
|
"client_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2015-12-09 02:25:05 +01:00
|
|
|
Required: true,
|
2015-12-08 23:30:12 +01:00
|
|
|
DefaultFunc: schema.EnvDefaultFunc("ARM_CLIENT_ID", ""),
|
|
|
|
},
|
|
|
|
|
|
|
|
"client_secret": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2015-12-09 02:25:05 +01:00
|
|
|
Required: true,
|
2015-12-08 23:30:12 +01:00
|
|
|
DefaultFunc: schema.EnvDefaultFunc("ARM_CLIENT_SECRET", ""),
|
|
|
|
},
|
|
|
|
|
|
|
|
"tenant_id": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2015-12-09 02:25:05 +01:00
|
|
|
Required: true,
|
2015-12-08 23:30:12 +01:00
|
|
|
DefaultFunc: schema.EnvDefaultFunc("ARM_TENANT_ID", ""),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
|
|
|
|
ResourcesMap: map[string]*schema.Resource{
|
2016-01-07 23:32:49 +01:00
|
|
|
"azurerm_resource_group": resourceArmResourceGroup(),
|
|
|
|
"azurerm_virtual_network": resourceArmVirtualNetwork(),
|
|
|
|
"azurerm_local_network_gateway": resourceArmLocalNetworkGateway(),
|
|
|
|
"azurerm_availability_set": resourceArmAvailabilitySet(),
|
|
|
|
"azurerm_network_security_group": resourceArmNetworkSecurityGroup(),
|
2016-01-08 16:55:46 +01:00
|
|
|
"azurerm_network_security_rule": resourceArmNetworkSecurityRule(),
|
2016-01-08 01:20:49 +01:00
|
|
|
"azurerm_public_ip": resourceArmPublicIp(),
|
2016-01-08 23:50:01 +01:00
|
|
|
"azurerm_subnet": resourceArmSubnet(),
|
2016-01-09 21:01:30 +01:00
|
|
|
"azurerm_network_interface": resourceArmNetworkInterface(),
|
2016-01-10 02:35:58 +01:00
|
|
|
"azurerm_route_table": resourceArmRouteTable(),
|
2016-01-10 16:02:48 +01:00
|
|
|
"azurerm_route": resourceArmRoute(),
|
2016-01-19 11:11:37 +01:00
|
|
|
"azurerm_cdn_profile": resourceArmCdnProfile(),
|
2016-01-19 19:08:56 +01:00
|
|
|
"azurerm_cdn_endpoint": resourceArmCdnEndpoint(),
|
2016-01-10 01:22:00 +01:00
|
|
|
"azurerm_storage_account": resourceArmStorageAccount(),
|
2016-01-26 21:45:18 +01:00
|
|
|
"azurerm_storage_container": resourceArmStorageContainer(),
|
|
|
|
"azurerm_storage_blob": resourceArmStorageBlob(),
|
2016-01-27 13:27:58 +01:00
|
|
|
"azurerm_storage_queue": resourceArmStorageQueue(),
|
2016-02-03 01:48:09 +01:00
|
|
|
"azurerm_dns_zone": resourceArmDnsZone(),
|
2016-02-05 12:28:48 +01:00
|
|
|
"azurerm_dns_a_record": resourceArmDnsARecord(),
|
2016-02-05 13:14:09 +01:00
|
|
|
"azurerm_dns_aaaa_record": resourceArmDnsAAAARecord(),
|
2016-02-05 13:51:33 +01:00
|
|
|
"azurerm_dns_cname_record": resourceArmDnsCNameRecord(),
|
2016-02-06 19:42:54 +01:00
|
|
|
"azurerm_dns_txt_record": resourceArmDnsTxtRecord(),
|
2016-02-06 20:09:52 +01:00
|
|
|
"azurerm_dns_ns_record": resourceArmDnsNsRecord(),
|
2016-02-07 23:26:56 +01:00
|
|
|
"azurerm_dns_mx_record": resourceArmDnsMxRecord(),
|
2016-02-07 22:49:02 +01:00
|
|
|
"azurerm_dns_srv_record": resourceArmDnsSrvRecord(),
|
2016-02-04 00:08:56 +01:00
|
|
|
"azurerm_sql_server": resourceArmSqlServer(),
|
2016-02-05 00:36:50 +01:00
|
|
|
"azurerm_sql_database": resourceArmSqlDatabase(),
|
2016-02-08 22:13:59 +01:00
|
|
|
"azurerm_sql_firewall_rule": resourceArmSqlFirewallRule(),
|
2015-12-08 23:30:12 +01:00
|
|
|
},
|
|
|
|
ConfigureFunc: providerConfigure,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Config is the configuration structure used to instantiate a
|
|
|
|
// new Azure management client.
|
|
|
|
type Config struct {
|
|
|
|
ManagementURL string
|
|
|
|
|
|
|
|
SubscriptionID string
|
|
|
|
ClientID string
|
|
|
|
ClientSecret string
|
|
|
|
TenantID string
|
|
|
|
}
|
|
|
|
|
2016-01-29 16:48:20 +01:00
|
|
|
func (c Config) validate() error {
|
|
|
|
var err *multierror.Error
|
|
|
|
|
|
|
|
if c.SubscriptionID == "" {
|
|
|
|
err = multierror.Append(err, fmt.Errorf("Subscription ID must be configured for the AzureRM provider"))
|
|
|
|
}
|
|
|
|
if c.ClientID == "" {
|
|
|
|
err = multierror.Append(err, fmt.Errorf("Client ID must be configured for the AzureRM provider"))
|
|
|
|
}
|
|
|
|
if c.ClientSecret == "" {
|
|
|
|
err = multierror.Append(err, fmt.Errorf("Client Secret must be configured for the AzureRM provider"))
|
|
|
|
}
|
|
|
|
if c.TenantID == "" {
|
|
|
|
err = multierror.Append(err, fmt.Errorf("Tenant ID must be configured for the AzureRM provider"))
|
|
|
|
}
|
|
|
|
|
|
|
|
return err.ErrorOrNil()
|
|
|
|
}
|
|
|
|
|
2015-12-08 23:30:12 +01:00
|
|
|
func providerConfigure(d *schema.ResourceData) (interface{}, error) {
|
|
|
|
config := Config{
|
|
|
|
SubscriptionID: d.Get("subscription_id").(string),
|
|
|
|
ClientID: d.Get("client_id").(string),
|
|
|
|
ClientSecret: d.Get("client_secret").(string),
|
|
|
|
TenantID: d.Get("tenant_id").(string),
|
|
|
|
}
|
|
|
|
|
2016-01-29 16:48:20 +01:00
|
|
|
if err := config.validate(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-12-08 23:30:12 +01:00
|
|
|
client, err := config.getArmClient()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-01-05 22:43:52 +01:00
|
|
|
err = registerAzureResourceProvidersWithSubscription(&config, client)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2015-12-08 23:30:12 +01:00
|
|
|
return client, nil
|
|
|
|
}
|
|
|
|
|
2016-01-05 22:43:52 +01:00
|
|
|
// registerAzureResourceProvidersWithSubscription uses the providers client to register
|
|
|
|
// all Azure resource providers which the Terraform provider may require (regardless of
|
|
|
|
// whether they are actually used by the configuration or not). It was confirmed by Microsoft
|
|
|
|
// that this is the approach their own internal tools also take.
|
|
|
|
func registerAzureResourceProvidersWithSubscription(config *Config, client *ArmClient) error {
|
|
|
|
providerClient := client.providers
|
|
|
|
|
2016-02-18 22:33:01 +01:00
|
|
|
providers := []string{"Microsoft.Network", "Microsoft.Compute", "Microsoft.Cdn", "Microsoft.Storage", "Microsoft.Sql"}
|
2016-01-05 22:43:52 +01:00
|
|
|
|
|
|
|
for _, v := range providers {
|
|
|
|
res, err := providerClient.Register(v)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if res.StatusCode != http.StatusOK {
|
|
|
|
return fmt.Errorf("Error registering provider %q with subscription %q", v, config.SubscriptionID)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-01-20 16:25:26 +01:00
|
|
|
// azureRMNormalizeLocation is a function which normalises human-readable region/location
|
|
|
|
// names (e.g. "West US") to the values used and returned by the Azure API (e.g. "westus").
|
|
|
|
// In state we track the API internal version as it is easier to go from the human form
|
|
|
|
// to the canonical form than the other way around.
|
2015-12-08 23:30:12 +01:00
|
|
|
func azureRMNormalizeLocation(location interface{}) string {
|
|
|
|
input := location.(string)
|
|
|
|
return strings.Replace(strings.ToLower(input), " ", "", -1)
|
|
|
|
}
|
2016-01-08 16:55:46 +01:00
|
|
|
|
2016-01-20 16:25:26 +01:00
|
|
|
// pollIndefinitelyAsNeeded is a terrible hack which is necessary because the Azure
|
|
|
|
// Storage API (and perhaps others) can have response times way beyond the default
|
|
|
|
// retry timeouts, with no apparent upper bound. This effectively causes the client
|
|
|
|
// to continue polling when it reaches the configured timeout. My investigations
|
|
|
|
// suggest that this is neccesary when deleting and recreating a storage account with
|
|
|
|
// the same name in a short (though undetermined) time period.
|
|
|
|
//
|
|
|
|
// It is possible that this will give Terraform the appearance of being slow in
|
|
|
|
// future: I have attempted to mitigate this by logging whenever this happens. We
|
|
|
|
// may want to revisit this with configurable timeouts in the future as clearly
|
|
|
|
// unbounded wait loops is not ideal. It does seem preferable to the current situation
|
|
|
|
// where our polling loop will time out _with an operation in progress_, but no ID
|
|
|
|
// for the resource - so the state will not know about it, and conflicts will occur
|
|
|
|
// on the next run.
|
|
|
|
func pollIndefinitelyAsNeeded(client autorest.Client, response *http.Response, acceptableCodes ...int) (*http.Response, error) {
|
|
|
|
var resp *http.Response
|
|
|
|
var err error
|
|
|
|
|
|
|
|
for {
|
|
|
|
resp, err = client.PollAsNeeded(response, acceptableCodes...)
|
|
|
|
if err != nil {
|
|
|
|
if resp.StatusCode != http.StatusAccepted {
|
|
|
|
log.Printf("[DEBUG] Starting new polling loop for %q", response.Request.URL.Path)
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return resp, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-01-08 16:55:46 +01:00
|
|
|
// armMutexKV is the instance of MutexKV for ARM resources
|
|
|
|
var armMutexKV = mutexkv.NewMutexKV()
|
2016-02-18 22:33:01 +01:00
|
|
|
|
|
|
|
func azureStateRefreshFunc(resourceURI string, client *ArmClient, command riviera.APICall) resource.StateRefreshFunc {
|
|
|
|
return func() (interface{}, string, error) {
|
|
|
|
req := client.rivieraClient.NewRequestForURI(resourceURI)
|
|
|
|
req.Command = command
|
|
|
|
|
|
|
|
res, err := req.Execute()
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", fmt.Errorf("Error executing %T command in azureStateRefreshFunc", req.Command)
|
|
|
|
}
|
|
|
|
|
|
|
|
var value reflect.Value
|
|
|
|
if reflect.ValueOf(res.Parsed).Kind() == reflect.Ptr {
|
|
|
|
value = reflect.ValueOf(res.Parsed).Elem()
|
|
|
|
} else {
|
|
|
|
value = reflect.ValueOf(res.Parsed)
|
|
|
|
}
|
|
|
|
|
|
|
|
for i := 0; i < value.NumField(); i++ { // iterates through every struct type field
|
|
|
|
tag := value.Type().Field(i).Tag // returns the tag string
|
|
|
|
tagValue := tag.Get("mapstructure")
|
|
|
|
if tagValue == "provisioningState" {
|
|
|
|
return res.Parsed, value.Field(i).Elem().String(), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
panic(fmt.Errorf("azureStateRefreshFunc called on structure %T with no mapstructure:provisioningState tag. This is a bug", res.Parsed))
|
|
|
|
}
|
|
|
|
}
|