2016-10-07 20:14:26 +02:00
|
|
|
package azurerm
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
|
|
|
"regexp"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/Azure/azure-sdk-for-go/arm/network"
|
|
|
|
"github.com/hashicorp/errwrap"
|
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
"github.com/jen20/riviera/azure"
|
|
|
|
)
|
|
|
|
|
|
|
|
func resourceArmLoadBalancerRule() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceArmLoadBalancerRuleCreate,
|
|
|
|
Read: resourceArmLoadBalancerRuleRead,
|
|
|
|
Update: resourceArmLoadBalancerRuleCreate,
|
|
|
|
Delete: resourceArmLoadBalancerRuleDelete,
|
2017-02-01 18:17:51 +01:00
|
|
|
Importer: &schema.ResourceImporter{
|
|
|
|
State: loadBalancerSubResourceStateImporter,
|
|
|
|
},
|
2016-10-07 20:14:26 +02:00
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"name": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
ValidateFunc: validateArmLoadBalancerRuleName,
|
|
|
|
},
|
|
|
|
|
2017-06-01 11:18:22 +02:00
|
|
|
"location": deprecatedLocationSchema(),
|
2016-10-07 20:14:26 +02:00
|
|
|
|
|
|
|
"resource_group_name": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"loadbalancer_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"frontend_ip_configuration_name": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"frontend_ip_configuration_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"backend_address_pool_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"protocol": {
|
2017-02-22 21:30:07 +01:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
StateFunc: ignoreCaseStateFunc,
|
|
|
|
DiffSuppressFunc: ignoreCaseDiffSuppressFunc,
|
2016-10-07 20:14:26 +02:00
|
|
|
},
|
|
|
|
|
|
|
|
"frontend_port": {
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"backend_port": {
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"probe_id": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"enable_floating_ip": {
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
Default: false,
|
|
|
|
},
|
|
|
|
|
|
|
|
"idle_timeout_in_minutes": {
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"load_distribution": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceArmLoadBalancerRuleCreate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
client := meta.(*ArmClient)
|
|
|
|
lbClient := client.loadBalancerClient
|
|
|
|
|
2016-10-19 14:51:47 +02:00
|
|
|
loadBalancerID := d.Get("loadbalancer_id").(string)
|
|
|
|
armMutexKV.Lock(loadBalancerID)
|
|
|
|
defer armMutexKV.Unlock(loadBalancerID)
|
|
|
|
|
|
|
|
loadBalancer, exists, err := retrieveLoadBalancerById(loadBalancerID, meta)
|
2016-10-07 20:14:26 +02:00
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err)
|
|
|
|
}
|
|
|
|
if !exists {
|
|
|
|
d.SetId("")
|
|
|
|
log.Printf("[INFO] LoadBalancer %q not found. Removing from state", d.Get("name").(string))
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
newLbRule, err := expandAzureRmLoadBalancerRule(d, loadBalancer)
|
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Exanding LoadBalancer Rule {{err}}", err)
|
|
|
|
}
|
|
|
|
|
2016-12-06 09:39:47 +01:00
|
|
|
lbRules := append(*loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules, *newLbRule)
|
2016-11-11 12:09:00 +01:00
|
|
|
|
|
|
|
existingRule, existingRuleIndex, exists := findLoadBalancerRuleByName(loadBalancer, d.Get("name").(string))
|
|
|
|
if exists {
|
2017-01-12 14:57:07 +01:00
|
|
|
if d.Get("name").(string) == *existingRule.Name {
|
|
|
|
// this rule is being updated/reapplied remove old copy from the slice
|
2016-11-11 12:09:00 +01:00
|
|
|
lbRules = append(lbRules[:existingRuleIndex], lbRules[existingRuleIndex+1:]...)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-12-06 09:39:47 +01:00
|
|
|
loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules = &lbRules
|
2016-10-07 20:14:26 +02:00
|
|
|
resGroup, loadBalancerName, err := resourceGroupAndLBNameFromId(d.Get("loadbalancer_id").(string))
|
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer Name and Group: {{err}}", err)
|
|
|
|
}
|
|
|
|
|
2017-06-01 11:18:22 +02:00
|
|
|
_, error := lbClient.CreateOrUpdate(resGroup, loadBalancerName, *loadBalancer, make(chan struct{}))
|
|
|
|
err = <-error
|
2016-10-07 20:14:26 +02:00
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Creating/Updating LoadBalancer {{err}}", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
read, err := lbClient.Get(resGroup, loadBalancerName, "")
|
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer {{err}}", err)
|
|
|
|
}
|
|
|
|
if read.ID == nil {
|
|
|
|
return fmt.Errorf("Cannot read LoadBalancer %s (resource group %s) ID", loadBalancerName, resGroup)
|
|
|
|
}
|
|
|
|
|
2016-10-17 19:21:30 +02:00
|
|
|
var rule_id string
|
2016-12-06 09:39:47 +01:00
|
|
|
for _, LoadBalancingRule := range *(*read.LoadBalancerPropertiesFormat).LoadBalancingRules {
|
2016-10-18 11:44:15 +02:00
|
|
|
if *LoadBalancingRule.Name == d.Get("name").(string) {
|
|
|
|
rule_id = *LoadBalancingRule.ID
|
2016-10-17 19:21:30 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if rule_id != "" {
|
|
|
|
d.SetId(rule_id)
|
|
|
|
} else {
|
2016-10-18 15:00:38 +02:00
|
|
|
return fmt.Errorf("Cannot find created LoadBalancer Rule ID %q", rule_id)
|
2016-10-17 19:21:30 +02:00
|
|
|
}
|
2016-10-07 20:14:26 +02:00
|
|
|
|
|
|
|
log.Printf("[DEBUG] Waiting for LoadBalancer (%s) to become available", loadBalancerName)
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
|
|
Pending: []string{"Accepted", "Updating"},
|
|
|
|
Target: []string{"Succeeded"},
|
|
|
|
Refresh: loadbalancerStateRefreshFunc(client, resGroup, loadBalancerName),
|
|
|
|
Timeout: 10 * time.Minute,
|
|
|
|
}
|
|
|
|
if _, err := stateConf.WaitForState(); err != nil {
|
|
|
|
return fmt.Errorf("Error waiting for LoadBalancer (%s) to become available: %s", loadBalancerName, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return resourceArmLoadBalancerRuleRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceArmLoadBalancerRuleRead(d *schema.ResourceData, meta interface{}) error {
|
2017-02-01 18:17:51 +01:00
|
|
|
id, err := parseAzureResourceID(d.Id())
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
name := id.Path["loadBalancingRules"]
|
|
|
|
|
2016-10-17 19:21:30 +02:00
|
|
|
loadBalancer, exists, err := retrieveLoadBalancerById(d.Get("loadbalancer_id").(string), meta)
|
2016-10-07 20:14:26 +02:00
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err)
|
|
|
|
}
|
|
|
|
if !exists {
|
|
|
|
d.SetId("")
|
2017-02-01 18:17:51 +01:00
|
|
|
log.Printf("[INFO] LoadBalancer %q not found. Removing from state", name)
|
2016-10-07 20:14:26 +02:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-01 18:17:51 +01:00
|
|
|
config, _, exists := findLoadBalancerRuleByName(loadBalancer, name)
|
2017-01-31 16:55:17 +01:00
|
|
|
if !exists {
|
|
|
|
d.SetId("")
|
2017-02-01 18:17:51 +01:00
|
|
|
log.Printf("[INFO] LoadBalancer Rule %q not found. Removing from state", name)
|
2017-01-31 16:55:17 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Set("name", config.Name)
|
2017-02-01 18:17:51 +01:00
|
|
|
d.Set("resource_group_name", id.ResourceGroup)
|
2017-01-31 16:55:17 +01:00
|
|
|
|
|
|
|
d.Set("protocol", config.LoadBalancingRulePropertiesFormat.Protocol)
|
|
|
|
d.Set("frontend_port", config.LoadBalancingRulePropertiesFormat.FrontendPort)
|
|
|
|
d.Set("backend_port", config.LoadBalancingRulePropertiesFormat.BackendPort)
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.EnableFloatingIP != nil {
|
|
|
|
d.Set("enable_floating_ip", config.LoadBalancingRulePropertiesFormat.EnableFloatingIP)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.IdleTimeoutInMinutes != nil {
|
|
|
|
d.Set("idle_timeout_in_minutes", config.LoadBalancingRulePropertiesFormat.IdleTimeoutInMinutes)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration != nil {
|
2017-02-01 18:17:51 +01:00
|
|
|
fipID, err := parseAzureResourceID(*config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration.ID)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Set("frontend_ip_configuration_name", fipID.Path["frontendIPConfigurations"])
|
2017-01-31 16:55:17 +01:00
|
|
|
d.Set("frontend_ip_configuration_id", config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.BackendAddressPool != nil {
|
|
|
|
d.Set("backend_address_pool_id", config.LoadBalancingRulePropertiesFormat.BackendAddressPool.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.Probe != nil {
|
|
|
|
d.Set("probe_id", config.LoadBalancingRulePropertiesFormat.Probe.ID)
|
|
|
|
}
|
|
|
|
|
|
|
|
if config.LoadBalancingRulePropertiesFormat.LoadDistribution != "" {
|
|
|
|
d.Set("load_distribution", config.LoadBalancingRulePropertiesFormat.LoadDistribution)
|
2016-10-07 20:14:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceArmLoadBalancerRuleDelete(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
client := meta.(*ArmClient)
|
|
|
|
lbClient := client.loadBalancerClient
|
|
|
|
|
2016-10-19 14:51:47 +02:00
|
|
|
loadBalancerID := d.Get("loadbalancer_id").(string)
|
|
|
|
armMutexKV.Lock(loadBalancerID)
|
|
|
|
defer armMutexKV.Unlock(loadBalancerID)
|
|
|
|
|
|
|
|
loadBalancer, exists, err := retrieveLoadBalancerById(loadBalancerID, meta)
|
2016-10-07 20:14:26 +02:00
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err)
|
|
|
|
}
|
|
|
|
if !exists {
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
_, index, exists := findLoadBalancerRuleByName(loadBalancer, d.Get("name").(string))
|
|
|
|
if !exists {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-12-06 09:39:47 +01:00
|
|
|
oldLbRules := *loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules
|
2016-10-07 20:14:26 +02:00
|
|
|
newLbRules := append(oldLbRules[:index], oldLbRules[index+1:]...)
|
2016-12-06 09:39:47 +01:00
|
|
|
loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules = &newLbRules
|
2016-10-07 20:14:26 +02:00
|
|
|
|
|
|
|
resGroup, loadBalancerName, err := resourceGroupAndLBNameFromId(d.Get("loadbalancer_id").(string))
|
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer Name and Group: {{err}}", err)
|
|
|
|
}
|
|
|
|
|
2017-06-01 11:18:22 +02:00
|
|
|
_, error := lbClient.CreateOrUpdate(resGroup, loadBalancerName, *loadBalancer, make(chan struct{}))
|
|
|
|
err = <-error
|
2016-10-07 20:14:26 +02:00
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Creating/Updating LoadBalancer {{err}}", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
read, err := lbClient.Get(resGroup, loadBalancerName, "")
|
|
|
|
if err != nil {
|
|
|
|
return errwrap.Wrapf("Error Getting LoadBalancer {{err}}", err)
|
|
|
|
}
|
|
|
|
if read.ID == nil {
|
|
|
|
return fmt.Errorf("Cannot read LoadBalancer %s (resource group %s) ID", loadBalancerName, resGroup)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandAzureRmLoadBalancerRule(d *schema.ResourceData, lb *network.LoadBalancer) (*network.LoadBalancingRule, error) {
|
|
|
|
|
|
|
|
properties := network.LoadBalancingRulePropertiesFormat{
|
|
|
|
Protocol: network.TransportProtocol(d.Get("protocol").(string)),
|
|
|
|
FrontendPort: azure.Int32(int32(d.Get("frontend_port").(int))),
|
|
|
|
BackendPort: azure.Int32(int32(d.Get("backend_port").(int))),
|
|
|
|
EnableFloatingIP: azure.Bool(d.Get("enable_floating_ip").(bool)),
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := d.GetOk("idle_timeout_in_minutes"); ok {
|
|
|
|
properties.IdleTimeoutInMinutes = azure.Int32(int32(v.(int)))
|
|
|
|
}
|
|
|
|
|
|
|
|
if v := d.Get("load_distribution").(string); v != "" {
|
|
|
|
properties.LoadDistribution = network.LoadDistribution(v)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v := d.Get("frontend_ip_configuration_name").(string); v != "" {
|
|
|
|
rule, _, exists := findLoadBalancerFrontEndIpConfigurationByName(lb, v)
|
|
|
|
if !exists {
|
|
|
|
return nil, fmt.Errorf("[ERROR] Cannot find FrontEnd IP Configuration with the name %s", v)
|
|
|
|
}
|
|
|
|
|
|
|
|
feip := network.SubResource{
|
|
|
|
ID: rule.ID,
|
|
|
|
}
|
|
|
|
|
|
|
|
properties.FrontendIPConfiguration = &feip
|
|
|
|
}
|
|
|
|
|
|
|
|
if v := d.Get("backend_address_pool_id").(string); v != "" {
|
|
|
|
beAP := network.SubResource{
|
|
|
|
ID: &v,
|
|
|
|
}
|
|
|
|
|
|
|
|
properties.BackendAddressPool = &beAP
|
|
|
|
}
|
|
|
|
|
|
|
|
if v := d.Get("probe_id").(string); v != "" {
|
|
|
|
pid := network.SubResource{
|
|
|
|
ID: &v,
|
|
|
|
}
|
|
|
|
|
|
|
|
properties.Probe = &pid
|
|
|
|
}
|
|
|
|
|
|
|
|
lbRule := network.LoadBalancingRule{
|
2016-12-06 09:39:47 +01:00
|
|
|
Name: azure.String(d.Get("name").(string)),
|
|
|
|
LoadBalancingRulePropertiesFormat: &properties,
|
2016-10-07 20:14:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return &lbRule, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func validateArmLoadBalancerRuleName(v interface{}, k string) (ws []string, errors []error) {
|
|
|
|
value := v.(string)
|
2016-10-20 02:58:44 +02:00
|
|
|
if !regexp.MustCompile(`^[a-zA-Z_0-9.-]+$`).MatchString(value) {
|
2016-10-07 20:14:26 +02:00
|
|
|
errors = append(errors, fmt.Errorf(
|
2016-10-20 02:58:44 +02:00
|
|
|
"only word characters, numbers, underscores, periods, and hyphens allowed in %q: %q",
|
2016-10-07 20:14:26 +02:00
|
|
|
k, value))
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(value) > 80 {
|
|
|
|
errors = append(errors, fmt.Errorf(
|
|
|
|
"%q cannot be longer than 80 characters: %q", k, value))
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(value) == 0 {
|
|
|
|
errors = append(errors, fmt.Errorf(
|
|
|
|
"%q cannot be an empty string: %q", k, value))
|
|
|
|
}
|
2016-10-20 02:58:44 +02:00
|
|
|
if !regexp.MustCompile(`[a-zA-Z0-9_]$`).MatchString(value) {
|
2016-10-07 20:14:26 +02:00
|
|
|
errors = append(errors, fmt.Errorf(
|
2016-10-20 02:58:44 +02:00
|
|
|
"%q must end with a word character, number, or underscore: %q", k, value))
|
2016-10-07 20:14:26 +02:00
|
|
|
}
|
|
|
|
|
2016-10-20 02:58:44 +02:00
|
|
|
if !regexp.MustCompile(`^[a-zA-Z0-9]`).MatchString(value) {
|
2016-10-07 20:14:26 +02:00
|
|
|
errors = append(errors, fmt.Errorf(
|
2016-10-20 02:58:44 +02:00
|
|
|
"%q must start with a word character or number: %q", k, value))
|
2016-10-07 20:14:26 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|