Add rancher_certificate resource type (#12717)

This commit is contained in:
Raphaël Pinson 2017-03-15 15:22:34 +01:00 committed by Paul Stack
parent 4f58099a0e
commit 8ccd38013e
4 changed files with 347 additions and 0 deletions

View File

@ -49,6 +49,7 @@ func Provider() terraform.ResourceProvider {
},
ResourcesMap: map[string]*schema.Resource{
"rancher_certificate": resourceRancherCertificate(),
"rancher_environment": resourceRancherEnvironment(),
"rancher_host": resourceRancherHost(),
"rancher_registration_token": resourceRancherRegistrationToken(),

View File

@ -0,0 +1,277 @@
package rancher
import (
"fmt"
"log"
"time"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/helper/schema"
rancher "github.com/rancher/go-rancher/client"
)
func resourceRancherCertificate() *schema.Resource {
return &schema.Resource{
Create: resourceRancherCertificateCreate,
Read: resourceRancherCertificateRead,
Update: resourceRancherCertificateUpdate,
Delete: resourceRancherCertificateDelete,
Importer: &schema.ResourceImporter{
State: resourceRancherCertificateImport,
},
Schema: map[string]*schema.Schema{
"id": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"name": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"description": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"environment_id": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"cert": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"cert_chain": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"key": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"cn": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"algorithm": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"cert_fingerprint": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"expires_at": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"issued_at": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"issuer": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"key_size": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"serial_number": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
"subject_alternative_names": &schema.Schema{
Type: schema.TypeSet,
Elem: &schema.Schema{Type: schema.TypeString},
Computed: true,
},
"version": &schema.Schema{
Type: schema.TypeString,
Computed: true,
},
},
}
}
func resourceRancherCertificateCreate(d *schema.ResourceData, meta interface{}) error {
log.Printf("[INFO][rancher] Creating Certificate: %s", d.Id())
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
if err != nil {
return err
}
name := d.Get("name").(string)
description := d.Get("description").(string)
cert := d.Get("cert").(string)
certChain := d.Get("cert_chain").(string)
key := d.Get("key").(string)
certificate := rancher.Certificate{
Name: name,
Description: description,
Cert: cert,
CertChain: certChain,
Key: key,
}
newCertificate, err := client.Certificate.Create(&certificate)
if err != nil {
return err
}
stateConf := &resource.StateChangeConf{
Pending: []string{"active", "removed", "removing"},
Target: []string{"active"},
Refresh: CertificateStateRefreshFunc(client, newCertificate.Id),
Timeout: 10 * time.Minute,
Delay: 1 * time.Second,
MinTimeout: 3 * time.Second,
}
_, waitErr := stateConf.WaitForState()
if waitErr != nil {
return fmt.Errorf(
"Error waiting for registry credential (%s) to be created: %s", newCertificate.Id, waitErr)
}
d.SetId(newCertificate.Id)
log.Printf("[INFO] Certificate ID: %s", d.Id())
return resourceRancherCertificateUpdate(d, meta)
}
func resourceRancherCertificateRead(d *schema.ResourceData, meta interface{}) error {
log.Printf("[INFO] Refreshing Certificate: %s", d.Id())
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
if err != nil {
return err
}
certificate, err := client.Certificate.ById(d.Id())
if err != nil {
return err
}
log.Printf("[INFO] Certificate Name: %s", certificate.Name)
d.Set("description", certificate.Description)
d.Set("name", certificate.Name)
// Computed values
d.Set("cn", certificate.CN)
d.Set("algorithm", certificate.Algorithm)
d.Set("cert_fingerprint", certificate.CertFingerprint)
d.Set("expires_at", certificate.ExpiresAt)
d.Set("issued_at", certificate.IssuedAt)
d.Set("issuer", certificate.Issuer)
d.Set("key_size", certificate.KeySize)
d.Set("serial_number", certificate.SerialNumber)
d.Set("subject_alternative_names", certificate.SubjectAlternativeNames)
d.Set("version", certificate.Version)
return nil
}
func resourceRancherCertificateUpdate(d *schema.ResourceData, meta interface{}) error {
log.Printf("[INFO] Updating Certificate: %s", d.Id())
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
if err != nil {
return err
}
certificate, err := client.Certificate.ById(d.Id())
if err != nil {
return err
}
name := d.Get("name").(string)
description := d.Get("description").(string)
cert := d.Get("cert").(string)
certChain := d.Get("cert_chain").(string)
key := d.Get("key").(string)
data := map[string]interface{}{
"name": &name,
"description": &description,
"cert": &cert,
"cert_chain": &certChain,
"key": &key,
}
var newCertificate rancher.Certificate
if err := client.Update("certificate", &certificate.Resource, data, &newCertificate); err != nil {
return err
}
return resourceRancherCertificateRead(d, meta)
}
func resourceRancherCertificateDelete(d *schema.ResourceData, meta interface{}) error {
log.Printf("[INFO] Deleting Certificate: %s", d.Id())
id := d.Id()
client, err := meta.(*Config).EnvironmentClient(d.Get("environment_id").(string))
if err != nil {
return err
}
certificate, err := client.Certificate.ById(id)
if err != nil {
return err
}
if err := client.Certificate.Delete(certificate); err != nil {
return fmt.Errorf("Error deleting Certificate: %s", err)
}
log.Printf("[DEBUG] Waiting for certificate (%s) to be removed", id)
stateConf := &resource.StateChangeConf{
Pending: []string{"active", "removed", "removing"},
Target: []string{"removed"},
Refresh: CertificateStateRefreshFunc(client, id),
Timeout: 10 * time.Minute,
Delay: 1 * time.Second,
MinTimeout: 3 * time.Second,
}
_, waitErr := stateConf.WaitForState()
if waitErr != nil {
return fmt.Errorf(
"Error waiting for certificate (%s) to be removed: %s", id, waitErr)
}
d.SetId("")
return nil
}
func resourceRancherCertificateImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
envID, resourceID := splitID(d.Id())
d.SetId(resourceID)
if envID != "" {
d.Set("environment_id", envID)
} else {
client, err := meta.(*Config).GlobalClient()
if err != nil {
return []*schema.ResourceData{}, err
}
stack, err := client.Environment.ById(d.Id())
if err != nil {
return []*schema.ResourceData{}, err
}
d.Set("environment_id", stack.AccountId)
}
return []*schema.ResourceData{d}, nil
}
// CertificateStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
// a Rancher Certificate.
func CertificateStateRefreshFunc(client *rancher.RancherClient, certificateID string) resource.StateRefreshFunc {
return func() (interface{}, string, error) {
cert, err := client.Certificate.ById(certificateID)
if err != nil {
return nil, "", err
}
return cert, cert.State, nil
}
}

View File

@ -0,0 +1,66 @@
---
layout: "rancher"
page_title: "Rancher: rancher_certificate"
sidebar_current: "docs-rancher-resource-certificate"
description: |-
Provides a Rancher Certificate resource. This can be used to create certificates for rancher environments and retrieve their information.
---
# rancher\_certificate
Provides a Rancher Certificate resource. This can be used to create certificates for rancher environments and retrieve their information.
## Example Usage
```hcl
# Create a new Rancher Certificate
resource rancher_certificate "foo" {
name = "foo"
description = "my foo certificate"
environment_id = "${rancher_environment.test.id}"
cert = "${file("server.crt")}"
key = "${file("server.key")}"
}
```
## Argument Reference
The following arguments are supported:
* `name` - (Required) The name of the registry credential.
* `description` - (Optional) A registry credential description.
* `environment_id` - (Required) The ID of the environment to create the certificate for.
* `cert` - (Required) The certificate content.
* `cert_chain` - (Optional) The certificate chain.
* `key` - (Required) The certificate key.
## Attributes Reference
The following attributes are exported:
* `cn` - The certificate CN.
* `algorithm` - The certificate algorithm.
* `cert_fingerprint` - The certificate fingerprint.
* `expires_at` - The certificate expiration date.
* `issued_at` - The certificate creation date.
* `issuer` - The certificate issuer.
* `key_size` - The certificate key size.
* `serial_number` - The certificate serial number.
* `subject_alternative_names` - The list of certificate Subject Alternative Names.
* `version` - The certificate version.
## Import
Registry credentials can be imported using the Registry and credentials
IDs in the format `<environment_id>/<certificate_id>`
```
$ terraform import rancher_certificate.mycert 1sp31/1c605
```
If the credentials for the Rancher provider have access to the global API,
then `environment_id` can be omitted e.g.
```
$ terraform import rancher_certificate.mycert 1c605
```

View File

@ -13,6 +13,9 @@
<li<%= sidebar_current(/^docs-rancher-resource/) %>>
<a href="#">Resources</a>
<ul class="nav nav-visible">
<li<%= sidebar_current("docs-rancher-resource-certificate") %>>
<a href="/docs/providers/rancher/r/certificate.html">rancher_certificate</a>
</li>
<li<%= sidebar_current("docs-rancher-resource-environment") %>>
<a href="/docs/providers/rancher/r/environment.html">rancher_environment</a>
</li>