279 lines
6.5 KiB
Go
279 lines
6.5 KiB
Go
package aws
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/hashicorp/terraform/flatmap"
|
|
"github.com/hashicorp/terraform/helper/config"
|
|
"github.com/hashicorp/terraform/helper/diff"
|
|
"github.com/hashicorp/terraform/helper/multierror"
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
"github.com/mitchellh/goamz/rds"
|
|
)
|
|
|
|
func resource_aws_db_security_group_create(
|
|
s *terraform.ResourceState,
|
|
d *terraform.ResourceDiff,
|
|
meta interface{}) (*terraform.ResourceState, error) {
|
|
p := meta.(*ResourceProvider)
|
|
conn := p.rdsconn
|
|
|
|
// Merge the diff into the state so that we have all the attributes
|
|
// properly.
|
|
rs := s.MergeDiff(d)
|
|
|
|
var err error
|
|
var errs []error
|
|
|
|
opts := rds.CreateDBSecurityGroup{
|
|
DBSecurityGroupName: rs.Attributes["name"],
|
|
DBSecurityGroupDescription: rs.Attributes["description"],
|
|
}
|
|
|
|
log.Printf("[DEBUG] DB Security Group create configuration: %#v", opts)
|
|
_, err = conn.CreateDBSecurityGroup(&opts)
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error creating DB Security Group: %s", err)
|
|
}
|
|
|
|
rs.ID = rs.Attributes["name"]
|
|
|
|
log.Printf("[INFO] DB Security Group ID: %s", rs.ID)
|
|
|
|
v, err := resource_aws_db_security_group_retrieve(rs.ID, conn)
|
|
if err != nil {
|
|
return rs, err
|
|
}
|
|
|
|
if _, ok := rs.Attributes["ingress.#"]; ok {
|
|
ingresses := flatmap.Expand(
|
|
rs.Attributes, "ingress").([]interface{})
|
|
|
|
for _, ing := range ingresses {
|
|
err = authorize_ingress_rule(ing, v.Name, conn)
|
|
|
|
if err != nil {
|
|
errs = append(errs, err)
|
|
}
|
|
}
|
|
|
|
if len(errs) > 0 {
|
|
return rs, &multierror.Error{Errors: errs}
|
|
}
|
|
}
|
|
|
|
log.Println(
|
|
"[INFO] Waiting for Ingress Authorizations to be authorized")
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
Pending: []string{"authorizing"},
|
|
Target: "authorized",
|
|
Refresh: DBSecurityGroupStateRefreshFunc(rs.ID, conn),
|
|
Timeout: 10 * time.Minute,
|
|
}
|
|
|
|
// Wait, catching any errors
|
|
_, err = stateConf.WaitForState()
|
|
if err != nil {
|
|
return rs, err
|
|
}
|
|
|
|
return resource_aws_db_security_group_update_state(rs, v)
|
|
}
|
|
|
|
func resource_aws_db_security_group_update(
|
|
s *terraform.ResourceState,
|
|
d *terraform.ResourceDiff,
|
|
meta interface{}) (*terraform.ResourceState, error) {
|
|
|
|
panic("Cannot update DB")
|
|
|
|
return nil, nil
|
|
}
|
|
|
|
func resource_aws_db_security_group_destroy(
|
|
s *terraform.ResourceState,
|
|
meta interface{}) error {
|
|
p := meta.(*ResourceProvider)
|
|
conn := p.rdsconn
|
|
|
|
log.Printf("[DEBUG] DB Security Group destroy: %v", s.ID)
|
|
|
|
opts := rds.DeleteDBSecurityGroup{DBSecurityGroupName: s.ID}
|
|
|
|
log.Printf("[DEBUG] DB Security Group destroy configuration: %v", opts)
|
|
_, err := conn.DeleteDBSecurityGroup(&opts)
|
|
|
|
if err != nil {
|
|
newerr, ok := err.(*rds.Error)
|
|
if ok && newerr.Code == "InvalidDBSecurityGroup.NotFound" {
|
|
return nil
|
|
}
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func resource_aws_db_security_group_refresh(
|
|
s *terraform.ResourceState,
|
|
meta interface{}) (*terraform.ResourceState, error) {
|
|
p := meta.(*ResourceProvider)
|
|
conn := p.rdsconn
|
|
|
|
v, err := resource_aws_db_security_group_retrieve(s.ID, conn)
|
|
|
|
if err != nil {
|
|
return s, err
|
|
}
|
|
|
|
return resource_aws_db_security_group_update_state(s, v)
|
|
}
|
|
|
|
func resource_aws_db_security_group_diff(
|
|
s *terraform.ResourceState,
|
|
c *terraform.ResourceConfig,
|
|
meta interface{}) (*terraform.ResourceDiff, error) {
|
|
|
|
b := &diff.ResourceBuilder{
|
|
Attrs: map[string]diff.AttrType{
|
|
"name": diff.AttrTypeCreate,
|
|
"description": diff.AttrTypeCreate,
|
|
"ingress": diff.AttrTypeCreate,
|
|
},
|
|
|
|
ComputedAttrs: []string{
|
|
"ingress_cidr",
|
|
"ingress_security_groups",
|
|
},
|
|
}
|
|
|
|
return b.Diff(s, c)
|
|
}
|
|
|
|
func resource_aws_db_security_group_update_state(
|
|
s *terraform.ResourceState,
|
|
v *rds.DBSecurityGroup) (*terraform.ResourceState, error) {
|
|
|
|
s.Attributes["name"] = v.Name
|
|
s.Attributes["description"] = v.Description
|
|
|
|
// Flatten our group values
|
|
toFlatten := make(map[string]interface{})
|
|
|
|
if len(v.EC2SecurityGroupOwnerIds) > 0 && v.EC2SecurityGroupOwnerIds[0] != "" {
|
|
toFlatten["ingress_security_groups"] = v.EC2SecurityGroupOwnerIds
|
|
}
|
|
|
|
if len(v.CidrIps) > 0 && v.CidrIps[0] != "" {
|
|
toFlatten["ingress_cidr"] = v.CidrIps
|
|
}
|
|
|
|
for k, v := range flatmap.Flatten(toFlatten) {
|
|
s.Attributes[k] = v
|
|
}
|
|
|
|
return s, nil
|
|
}
|
|
|
|
func resource_aws_db_security_group_retrieve(id string, conn *rds.Rds) (*rds.DBSecurityGroup, error) {
|
|
opts := rds.DescribeDBSecurityGroups{
|
|
DBSecurityGroupName: id,
|
|
}
|
|
|
|
log.Printf("[DEBUG] DB Security Group describe configuration: %#v", opts)
|
|
|
|
resp, err := conn.DescribeDBSecurityGroups(&opts)
|
|
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error retrieving DB Security Groups: %s", err)
|
|
}
|
|
|
|
if len(resp.DBSecurityGroups) != 1 ||
|
|
resp.DBSecurityGroups[0].Name != id {
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Unable to find DB Security Group: %#v", resp.DBSecurityGroups)
|
|
}
|
|
}
|
|
|
|
v := resp.DBSecurityGroups[0]
|
|
|
|
return &v, nil
|
|
}
|
|
|
|
// Authorizes the ingress rule on the db security group
|
|
func authorize_ingress_rule(ingress interface{}, dbSecurityGroupName string, conn *rds.Rds) error {
|
|
ing := ingress.(map[string]interface{})
|
|
|
|
opts := rds.AuthorizeDBSecurityGroupIngress{
|
|
DBSecurityGroupName: dbSecurityGroupName,
|
|
}
|
|
|
|
if attr, ok := ing["cidr"].(string); ok && attr != "" {
|
|
opts.Cidr = attr
|
|
}
|
|
|
|
if attr, ok := ing["security_group_name"].(string); ok && attr != "" {
|
|
opts.EC2SecurityGroupName = attr
|
|
}
|
|
|
|
if attr, ok := ing["security_group_id"].(string); ok && attr != "" {
|
|
opts.EC2SecurityGroupId = attr
|
|
}
|
|
|
|
if attr, ok := ing["security_group_owner_id"].(string); ok && attr != "" {
|
|
opts.EC2SecurityGroupOwnerId = attr
|
|
}
|
|
|
|
log.Printf("[DEBUG] Authorize ingress rule configuration: %#v", opts)
|
|
|
|
_, err := conn.AuthorizeDBSecurityGroupIngress(&opts)
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("Error authorizing security group ingress: %s", err)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func resource_aws_db_security_group_validation() *config.Validator {
|
|
return &config.Validator{
|
|
Required: []string{
|
|
"name",
|
|
"description",
|
|
},
|
|
Optional: []string{
|
|
"ingress.*",
|
|
"ingress.*.cidr",
|
|
"ingress.*.security_group_name",
|
|
"ingress.*.security_group_id",
|
|
"ingress.*.security_group_owner_id",
|
|
},
|
|
}
|
|
}
|
|
|
|
func DBSecurityGroupStateRefreshFunc(id string, conn *rds.Rds) resource.StateRefreshFunc {
|
|
return func() (interface{}, string, error) {
|
|
v, err := resource_aws_db_security_group_retrieve(id, conn)
|
|
|
|
if err != nil {
|
|
log.Printf("Error on retrieving DB Security Group when waiting: %s", err)
|
|
return nil, "", err
|
|
}
|
|
|
|
statuses := append(v.EC2SecurityGroupStatuses, v.CidrStatuses...)
|
|
|
|
for _, stat := range statuses {
|
|
// Not done
|
|
if stat != "authorized" {
|
|
return nil, "authorizing", nil
|
|
}
|
|
}
|
|
|
|
return v, "authorized", nil
|
|
}
|
|
}
|