providers/aws: resource_aws_security_group using helper/schema
This commit is contained in:
parent
6d6cd793e0
commit
89041c0595
|
@ -16,7 +16,8 @@ func Provider() *schema.Provider {
|
||||||
|
|
||||||
return &schema.Provider{
|
return &schema.Provider{
|
||||||
ResourcesMap: map[string]*schema.Resource{
|
ResourcesMap: map[string]*schema.Resource{
|
||||||
"aws_eip": resourceAwsEip(),
|
"aws_eip": resourceAwsEip(),
|
||||||
|
"aws_security_group": resourceAwsSecurityGroup(),
|
||||||
},
|
},
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,95 +3,186 @@ package aws
|
||||||
import (
|
import (
|
||||||
"fmt"
|
"fmt"
|
||||||
"log"
|
"log"
|
||||||
|
"strings"
|
||||||
"time"
|
"time"
|
||||||
|
|
||||||
"github.com/hashicorp/terraform/flatmap"
|
|
||||||
"github.com/hashicorp/terraform/helper/config"
|
|
||||||
"github.com/hashicorp/terraform/helper/diff"
|
|
||||||
"github.com/hashicorp/terraform/helper/resource"
|
"github.com/hashicorp/terraform/helper/resource"
|
||||||
|
"github.com/hashicorp/terraform/helper/schema"
|
||||||
"github.com/hashicorp/terraform/terraform"
|
"github.com/hashicorp/terraform/terraform"
|
||||||
"github.com/mitchellh/goamz/ec2"
|
"github.com/mitchellh/goamz/ec2"
|
||||||
)
|
)
|
||||||
|
|
||||||
func resource_aws_security_group_create(
|
func resourceAwsSecurityGroup() *schema.Resource {
|
||||||
s *terraform.ResourceState,
|
return &schema.Resource{
|
||||||
d *terraform.ResourceDiff,
|
Create: resourceAwsSecurityGroupCreate,
|
||||||
meta interface{}) (*terraform.ResourceState, error) {
|
Read: resourceAwsSecurityGroupRead,
|
||||||
|
Delete: resourceAwsSecurityGroupDelete,
|
||||||
|
|
||||||
|
Schema: map[string]*schema.Schema{
|
||||||
|
"name": &schema.Schema{
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
ForceNew: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"description": &schema.Schema{
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"vpc_id": &schema.Schema{
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Optional: true,
|
||||||
|
ForceNew: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"ingress": &schema.Schema{
|
||||||
|
Type: schema.TypeList,
|
||||||
|
Required: true,
|
||||||
|
Elem: &schema.Resource{
|
||||||
|
Schema: map[string]*schema.Schema{
|
||||||
|
"from_port": &schema.Schema{
|
||||||
|
Type: schema.TypeInt,
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"to_port": &schema.Schema{
|
||||||
|
Type: schema.TypeInt,
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"protocol": &schema.Schema{
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Required: true,
|
||||||
|
},
|
||||||
|
|
||||||
|
"cidr_blocks": &schema.Schema{
|
||||||
|
Type: schema.TypeList,
|
||||||
|
Optional: true,
|
||||||
|
Elem: &schema.Schema{Type: schema.TypeString},
|
||||||
|
},
|
||||||
|
|
||||||
|
"security_groups": &schema.Schema{
|
||||||
|
Type: schema.TypeList,
|
||||||
|
Optional: true,
|
||||||
|
Elem: &schema.Schema{Type: schema.TypeString},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
|
||||||
|
"owner_id": &schema.Schema{
|
||||||
|
Type: schema.TypeString,
|
||||||
|
Computed: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func resourceAwsSecurityGroupCreate(d *schema.ResourceData, meta interface{}) error {
|
||||||
p := meta.(*ResourceProvider)
|
p := meta.(*ResourceProvider)
|
||||||
ec2conn := p.ec2conn
|
ec2conn := p.ec2conn
|
||||||
|
|
||||||
// Merge the diff into the state so that we have all the attributes
|
|
||||||
// properly.
|
|
||||||
rs := s.MergeDiff(d)
|
|
||||||
|
|
||||||
securityGroupOpts := ec2.SecurityGroup{
|
securityGroupOpts := ec2.SecurityGroup{
|
||||||
Name: rs.Attributes["name"],
|
Name: d.Get("name").(string),
|
||||||
}
|
}
|
||||||
|
|
||||||
if rs.Attributes["vpc_id"] != "" {
|
if v := d.Get("vpc_id"); v != nil {
|
||||||
securityGroupOpts.VpcId = rs.Attributes["vpc_id"]
|
securityGroupOpts.VpcId = v.(string)
|
||||||
}
|
}
|
||||||
|
|
||||||
if rs.Attributes["description"] != "" {
|
if v := d.Get("description"); v != nil {
|
||||||
securityGroupOpts.Description = rs.Attributes["description"]
|
securityGroupOpts.Description = v.(string)
|
||||||
}
|
}
|
||||||
|
|
||||||
log.Printf("[DEBUG] Security Group create configuration: %#v", securityGroupOpts)
|
log.Printf(
|
||||||
|
"[DEBUG] Security Group create configuration: %#v", securityGroupOpts)
|
||||||
createResp, err := ec2conn.CreateSecurityGroup(securityGroupOpts)
|
createResp, err := ec2conn.CreateSecurityGroup(securityGroupOpts)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, fmt.Errorf("Error creating Security Group: %s", err)
|
return fmt.Errorf("Error creating Security Group: %s", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
rs.ID = createResp.Id
|
d.SetId(createResp.Id)
|
||||||
group := createResp.SecurityGroup
|
group := createResp.SecurityGroup
|
||||||
|
|
||||||
log.Printf("[INFO] Security Group ID: %s", rs.ID)
|
log.Printf("[INFO] Security Group ID: %s", d.Id())
|
||||||
|
|
||||||
// Wait for the security group to truly exist
|
// Wait for the security group to truly exist
|
||||||
log.Printf(
|
log.Printf(
|
||||||
"[DEBUG] Waiting for Security Group (%s) to exist",
|
"[DEBUG] Waiting for Security Group (%s) to exist",
|
||||||
rs.ID)
|
d.Id())
|
||||||
stateConf := &resource.StateChangeConf{
|
stateConf := &resource.StateChangeConf{
|
||||||
Pending: []string{""},
|
Pending: []string{""},
|
||||||
Target: "exists",
|
Target: "exists",
|
||||||
Refresh: SGStateRefreshFunc(ec2conn, rs.ID),
|
Refresh: SGStateRefreshFunc(ec2conn, d.Id()),
|
||||||
Timeout: 1 * time.Minute,
|
Timeout: 1 * time.Minute,
|
||||||
}
|
}
|
||||||
if _, err := stateConf.WaitForState(); err != nil {
|
if _, err := stateConf.WaitForState(); err != nil {
|
||||||
return s, fmt.Errorf(
|
return fmt.Errorf(
|
||||||
"Error waiting for Security Group (%s) to become available: %s",
|
"Error waiting for Security Group (%s) to become available: %s",
|
||||||
rs.ID, err)
|
d.Id(), err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Expand the "ingress" array to goamz compat []ec2.IPPerm
|
// Expand the "ingress" array to goamz compat []ec2.IPPerm
|
||||||
ingressRules := []ec2.IPPerm{}
|
ingressRaw := d.Get("ingress")
|
||||||
v, ok := flatmap.Expand(rs.Attributes, "ingress").([]interface{})
|
if ingressRaw == nil {
|
||||||
if ok {
|
ingressRaw = []interface{}{}
|
||||||
ingressRules, err = expandIPPerms(v)
|
|
||||||
if err != nil {
|
|
||||||
return rs, err
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
ingressList := ingressRaw.([]interface{})
|
||||||
|
if len(ingressList) > 0 {
|
||||||
|
ingressRules := make([]ec2.IPPerm, len(ingressList))
|
||||||
|
for i, mRaw := range ingressList {
|
||||||
|
var perm ec2.IPPerm
|
||||||
|
m := mRaw.(map[string]interface{})
|
||||||
|
|
||||||
|
perm.FromPort = m["from_port"].(int)
|
||||||
|
perm.ToPort = m["to_port"].(int)
|
||||||
|
perm.Protocol = m["protocol"].(string)
|
||||||
|
|
||||||
|
if raw, ok := m["security_groups"]; ok {
|
||||||
|
list := raw.([]interface{})
|
||||||
|
perm.SourceGroups = make([]ec2.UserSecurityGroup, len(list))
|
||||||
|
for i, v := range list {
|
||||||
|
name := v.(string)
|
||||||
|
ownerId, id := "", name
|
||||||
|
if items := strings.Split(id, "/"); len(items) > 1 {
|
||||||
|
ownerId, id = items[0], items[1]
|
||||||
|
}
|
||||||
|
|
||||||
|
perm.SourceGroups[i] = ec2.UserSecurityGroup{
|
||||||
|
Id: id,
|
||||||
|
OwnerId: ownerId,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if raw, ok := m["cidr_blocks"]; ok {
|
||||||
|
list := raw.([]interface{})
|
||||||
|
perm.SourceIPs = make([]string, len(list))
|
||||||
|
for i, v := range list {
|
||||||
|
perm.SourceIPs[i] = v.(string)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ingressRules[i] = perm
|
||||||
|
}
|
||||||
|
|
||||||
if len(ingressRules) > 0 {
|
|
||||||
_, err = ec2conn.AuthorizeSecurityGroup(group, ingressRules)
|
_, err = ec2conn.AuthorizeSecurityGroup(group, ingressRules)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return rs, fmt.Errorf("Error authorizing security group ingress rules: %s", err)
|
return fmt.Errorf("Error authorizing security group ingress rules: %s", err)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
return resource_aws_security_group_refresh(rs, meta)
|
return resourceAwsSecurityGroupRead(d, meta)
|
||||||
}
|
}
|
||||||
|
|
||||||
func resource_aws_security_group_destroy(
|
func resourceAwsSecurityGroupDelete(d *schema.ResourceData, meta interface{}) error {
|
||||||
s *terraform.ResourceState,
|
|
||||||
meta interface{}) error {
|
|
||||||
p := meta.(*ResourceProvider)
|
p := meta.(*ResourceProvider)
|
||||||
ec2conn := p.ec2conn
|
ec2conn := p.ec2conn
|
||||||
|
|
||||||
log.Printf("[DEBUG] Security Group destroy: %v", s.ID)
|
log.Printf("[DEBUG] Security Group destroy: %v", d.Id())
|
||||||
|
|
||||||
_, err := ec2conn.DeleteSecurityGroup(ec2.SecurityGroup{Id: s.ID})
|
_, err := ec2conn.DeleteSecurityGroup(ec2.SecurityGroup{Id: d.Id()})
|
||||||
if err != nil {
|
if err != nil {
|
||||||
ec2err, ok := err.(*ec2.Error)
|
ec2err, ok := err.(*ec2.Error)
|
||||||
if ok && ec2err.Code == "InvalidGroup.NotFound" {
|
if ok && ec2err.Code == "InvalidGroup.NotFound" {
|
||||||
|
@ -102,60 +193,26 @@ func resource_aws_security_group_destroy(
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
func resource_aws_security_group_refresh(
|
func resourceAwsSecurityGroupRead(d *schema.ResourceData, meta interface{}) error {
|
||||||
s *terraform.ResourceState,
|
|
||||||
meta interface{}) (*terraform.ResourceState, error) {
|
|
||||||
p := meta.(*ResourceProvider)
|
p := meta.(*ResourceProvider)
|
||||||
ec2conn := p.ec2conn
|
ec2conn := p.ec2conn
|
||||||
|
|
||||||
sgRaw, _, err := SGStateRefreshFunc(ec2conn, s.ID)()
|
sgRaw, _, err := SGStateRefreshFunc(ec2conn, d.Id())()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return s, err
|
return err
|
||||||
}
|
}
|
||||||
if sgRaw == nil {
|
if sgRaw == nil {
|
||||||
return nil, nil
|
d.SetId("")
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return resource_aws_security_group_update_state(
|
sg := sgRaw.(*ec2.SecurityGroupInfo)
|
||||||
s, sgRaw.(*ec2.SecurityGroupInfo))
|
|
||||||
}
|
|
||||||
|
|
||||||
func resource_aws_security_group_diff(
|
var deps []terraform.ResourceDependency
|
||||||
s *terraform.ResourceState,
|
|
||||||
c *terraform.ResourceConfig,
|
|
||||||
meta interface{}) (*terraform.ResourceDiff, error) {
|
|
||||||
|
|
||||||
b := &diff.ResourceBuilder{
|
// Gather our ingress rules
|
||||||
Attrs: map[string]diff.AttrType{
|
ingressRules := make([]map[string]interface{}, len(sg.IPPerms))
|
||||||
"name": diff.AttrTypeCreate,
|
for i, perm := range sg.IPPerms {
|
||||||
"description": diff.AttrTypeUpdate,
|
|
||||||
"ingress": diff.AttrTypeUpdate,
|
|
||||||
"vpc_id": diff.AttrTypeCreate,
|
|
||||||
},
|
|
||||||
|
|
||||||
ComputedAttrs: []string{
|
|
||||||
"owner_id",
|
|
||||||
"vpc_id",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
|
|
||||||
return b.Diff(s, c)
|
|
||||||
}
|
|
||||||
|
|
||||||
func resource_aws_security_group_update_state(
|
|
||||||
s *terraform.ResourceState,
|
|
||||||
sg *ec2.SecurityGroupInfo) (*terraform.ResourceState, error) {
|
|
||||||
|
|
||||||
s.Attributes["description"] = sg.Description
|
|
||||||
s.Attributes["name"] = sg.Name
|
|
||||||
s.Attributes["vpc_id"] = sg.VpcId
|
|
||||||
s.Attributes["owner_id"] = sg.OwnerId
|
|
||||||
|
|
||||||
// Flatten our ingress values
|
|
||||||
toFlatten := make(map[string]interface{})
|
|
||||||
|
|
||||||
ingressRules := make([]map[string]interface{}, 0, len(sg.IPPerms))
|
|
||||||
for _, perm := range sg.IPPerms {
|
|
||||||
n := make(map[string]interface{})
|
n := make(map[string]interface{})
|
||||||
n["from_port"] = perm.FromPort
|
n["from_port"] = perm.FromPort
|
||||||
n["protocol"] = perm.Protocol
|
n["protocol"] = perm.Protocol
|
||||||
|
@ -168,50 +225,31 @@ func resource_aws_security_group_update_state(
|
||||||
if len(perm.SourceGroups) > 0 {
|
if len(perm.SourceGroups) > 0 {
|
||||||
// We depend on other security groups
|
// We depend on other security groups
|
||||||
for _, v := range perm.SourceGroups {
|
for _, v := range perm.SourceGroups {
|
||||||
s.Dependencies = append(s.Dependencies,
|
deps = append(deps,
|
||||||
terraform.ResourceDependency{ID: v.Id},
|
terraform.ResourceDependency{ID: v.Id},
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
n["security_groups"] = flattenSecurityGroups(perm.SourceGroups)
|
n["security_groups"] = flattenSecurityGroups(perm.SourceGroups)
|
||||||
}
|
}
|
||||||
|
|
||||||
// Reverse the order, as Amazon sorts it the reverse of how we created
|
ingressRules[i] = n
|
||||||
// it.
|
|
||||||
ingressRules = append([]map[string]interface{}{n}, ingressRules...)
|
|
||||||
}
|
}
|
||||||
|
|
||||||
toFlatten["ingress"] = ingressRules
|
if v := d.Get("vpc_id"); v != nil && v.(string) != "" {
|
||||||
|
deps = append(deps,
|
||||||
for k, v := range flatmap.Flatten(toFlatten) {
|
terraform.ResourceDependency{ID: v.(string)},
|
||||||
s.Attributes[k] = v
|
|
||||||
}
|
|
||||||
|
|
||||||
if s.Attributes["vpc_id"] != "" {
|
|
||||||
s.Dependencies = append(s.Dependencies,
|
|
||||||
terraform.ResourceDependency{ID: s.Attributes["vpc_id"]},
|
|
||||||
)
|
)
|
||||||
}
|
}
|
||||||
|
|
||||||
return s, nil
|
d.Set("description", sg.Description)
|
||||||
}
|
d.Set("name", sg.Name)
|
||||||
|
d.Set("vpc_id", sg.VpcId)
|
||||||
|
d.Set("owner_id", sg.OwnerId)
|
||||||
|
d.Set("ingress", ingressRules)
|
||||||
|
d.SetDependencies(deps)
|
||||||
|
|
||||||
func resource_aws_security_group_validation() *config.Validator {
|
return nil
|
||||||
return &config.Validator{
|
|
||||||
Required: []string{
|
|
||||||
"name",
|
|
||||||
"description",
|
|
||||||
"ingress.*",
|
|
||||||
"ingress.*.from_port",
|
|
||||||
"ingress.*.to_port",
|
|
||||||
"ingress.*.protocol",
|
|
||||||
},
|
|
||||||
Optional: []string{
|
|
||||||
"vpc_id",
|
|
||||||
"owner_id",
|
|
||||||
"ingress.*.cidr_blocks.*",
|
|
||||||
"ingress.*.security_groups.*",
|
|
||||||
},
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
|
|
||||||
// SGStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
|
// SGStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
|
||||||
|
|
|
@ -128,14 +128,6 @@ func init() {
|
||||||
Refresh: resource_aws_s3_bucket_refresh,
|
Refresh: resource_aws_s3_bucket_refresh,
|
||||||
},
|
},
|
||||||
|
|
||||||
"aws_security_group": resource.Resource{
|
|
||||||
ConfigValidator: resource_aws_security_group_validation(),
|
|
||||||
Create: resource_aws_security_group_create,
|
|
||||||
Destroy: resource_aws_security_group_destroy,
|
|
||||||
Diff: resource_aws_security_group_diff,
|
|
||||||
Refresh: resource_aws_security_group_refresh,
|
|
||||||
},
|
|
||||||
|
|
||||||
"aws_subnet": resource.Resource{
|
"aws_subnet": resource.Resource{
|
||||||
Create: resource_aws_subnet_create,
|
Create: resource_aws_subnet_create,
|
||||||
Destroy: resource_aws_subnet_destroy,
|
Destroy: resource_aws_subnet_destroy,
|
||||||
|
|
Loading…
Reference in New Issue