package aws import ( "strconv" "strings" "github.com/mitchellh/goamz/autoscaling" "github.com/mitchellh/goamz/ec2" "github.com/mitchellh/goamz/elb" ) // Takes the result of flatmap.Expand for an array of listeners and // returns ELB API compatible objects func expandListeners(configured []interface{}) ([]elb.Listener, error) { listeners := make([]elb.Listener, 0, len(configured)) // Loop over our configured listeners and create // an array of goamz compatabile objects for _, listener := range configured { newL := listener.(map[string]interface{}) instancePort, err := strconv.ParseInt(newL["instance_port"].(string), 0, 0) lbPort, err := strconv.ParseInt(newL["lb_port"].(string), 0, 0) if err != nil { return nil, err } l := elb.Listener{ InstancePort: instancePort, InstanceProtocol: newL["instance_protocol"].(string), LoadBalancerPort: lbPort, Protocol: newL["lb_protocol"].(string), } listeners = append(listeners, l) } return listeners, nil } // Takes the result of flatmap.Expand for an array of ingress/egress // security group rules and returns EC2 API compatible objects func expandIPPerms(configured []interface{}) ([]ec2.IPPerm, error) { perms := make([]ec2.IPPerm, 0, len(configured)) // Loop over our configured permissions and create // an array of goamz/ec2 compatabile objects for _, perm := range configured { newP := perm.(map[string]interface{}) // Loop over the array of sg ids and built // compatibile goamz objects expandedGroups := []ec2.UserSecurityGroup{} configGroups, ok := newP["security_groups"].([]interface{}) if ok { gs := expandStringList(configGroups) for _, g := range gs { newG := ec2.UserSecurityGroup{ Id: g, } expandedGroups = append(expandedGroups, newG) } } fromPort, err := strconv.Atoi(newP["from_port"].(string)) toPort, err := strconv.Atoi(newP["to_port"].(string)) if err != nil { return nil, err } // Create the permission objet p := ec2.IPPerm{ Protocol: newP["protocol"].(string), FromPort: fromPort, ToPort: toPort, SourceIPs: expandStringList(newP["cidr_blocks"].([]interface{})), SourceGroups: expandedGroups, } perms = append(perms, p) } return perms, nil } // Flattens an array of ipPerms into a list of primitives that // flatmap.Flatten() can handle func flattenIPPerms(list []ec2.IPPerm) []map[string]interface{} { result := make([]map[string]interface{}, 0, len(list)) for _, perm := range list { n := make(map[string]interface{}) n["from_port"] = perm.FromPort n["protocol"] = perm.Protocol n["to_port"] = perm.ToPort n["cidr_blocks"] = perm.SourceIPs if v := flattenSecurityGroups(perm.SourceGroups); len(v) > 0 { n["security_groups"] = v } result = append(result, n) } return result } // Flattens an array of UserSecurityGroups into a []string func flattenSecurityGroups(list []ec2.UserSecurityGroup) []string { result := make([]string, 0, len(list)) for _, g := range list { result = append(result, g.Id) } return result } // Flattens an array of SecurityGroups into a []string func flattenAutoscalingSecurityGroups(list []autoscaling.SecurityGroup) []string { result := make([]string, 0, len(list)) for _, g := range list { result = append(result, g.SecurityGroup) } return result } // Flattens an array of AvailabilityZones into a []string func flattenAvailabilityZones(list []autoscaling.AvailabilityZone) []string { result := make([]string, 0, len(list)) for _, g := range list { result = append(result, g.AvailabilityZone) } return result } // Flattens an array of LoadBalancerName into a []string func flattenLoadBalancers(list []autoscaling.LoadBalancerName) []string { result := make([]string, 0, len(list)) for _, g := range list { if g.LoadBalancerName != "" { result = append(result, g.LoadBalancerName) } } return result } // Flattens an array of Instances into a []string func flattenInstances(list []elb.Instance) []string { result := make([]string, 0, len(list)) for _, i := range list { result = append(result, i.InstanceId) } return result } // Takes the result of flatmap.Expand for an array of strings // and returns a []string func expandStringList(configured []interface{}) []string { // here we special case the * expanded lists. For example: // // instances = ["${aws_instance.foo.*.id}"] // if len(configured) == 1 && strings.Contains(configured[0].(string), ",") { return strings.Split(configured[0].(string), ",") } vs := make([]string, 0, len(configured)) for _, v := range configured { vs = append(vs, v.(string)) } return vs }