180 lines
4.6 KiB
Go
180 lines
4.6 KiB
Go
package google
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
"google.golang.org/api/compute/v1"
|
|
"google.golang.org/api/googleapi"
|
|
)
|
|
|
|
func resourceComputeVpnTunnel() *schema.Resource {
|
|
return &schema.Resource{
|
|
// Unfortunately, the VPNTunnelService does not support update
|
|
// operations. This is why everything is marked forcenew
|
|
Create: resourceComputeVpnTunnelCreate,
|
|
Read: resourceComputeVpnTunnelRead,
|
|
Delete: resourceComputeVpnTunnelDelete,
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
"description": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
},
|
|
"region": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
},
|
|
"peer_ip": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
"shared_secret": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
"target_vpn_gateway": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
"ike_version": &schema.Schema{
|
|
Type: schema.TypeInt,
|
|
Optional: true,
|
|
Default: 2,
|
|
ForceNew: true,
|
|
},
|
|
"local_traffic_selector": &schema.Schema{
|
|
Type: schema.TypeSet,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
Set: schema.HashString,
|
|
},
|
|
"detailed_status": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
"self_link": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func resourceComputeVpnTunnelCreate(d *schema.ResourceData, meta interface{}) error {
|
|
config := meta.(*Config)
|
|
|
|
name := d.Get("name").(string)
|
|
region := getOptionalRegion(d, config)
|
|
peerIp := d.Get("peer_ip").(string)
|
|
sharedSecret := d.Get("shared_secret").(string)
|
|
targetVpnGateway := d.Get("target_vpn_gateway").(string)
|
|
ikeVersion := d.Get("ike_version").(int)
|
|
project := config.Project
|
|
|
|
if ikeVersion < 1 || ikeVersion > 2 {
|
|
return fmt.Errorf("Only IKE version 1 or 2 supported, not %d", ikeVersion)
|
|
}
|
|
|
|
// Build up the list of sources
|
|
var localTrafficSelectors []string
|
|
if v := d.Get("local_traffic_selector").(*schema.Set); v.Len() > 0 {
|
|
localTrafficSelectors = make([]string, v.Len())
|
|
for i, v := range v.List() {
|
|
localTrafficSelectors[i] = v.(string)
|
|
}
|
|
}
|
|
|
|
vpnTunnelsService := compute.NewVpnTunnelsService(config.clientCompute)
|
|
|
|
vpnTunnel := &compute.VpnTunnel{
|
|
Name: name,
|
|
PeerIp: peerIp,
|
|
SharedSecret: sharedSecret,
|
|
TargetVpnGateway: targetVpnGateway,
|
|
IkeVersion: int64(ikeVersion),
|
|
LocalTrafficSelector: localTrafficSelectors,
|
|
}
|
|
|
|
if v, ok := d.GetOk("description"); ok {
|
|
vpnTunnel.Description = v.(string)
|
|
}
|
|
|
|
op, err := vpnTunnelsService.Insert(project, region, vpnTunnel).Do()
|
|
if err != nil {
|
|
return fmt.Errorf("Error Inserting VPN Tunnel %s : %s", name, err)
|
|
}
|
|
|
|
err = computeOperationWaitRegion(config, op, region, "Inserting VPN Tunnel")
|
|
if err != nil {
|
|
return fmt.Errorf("Error Waiting to Insert VPN Tunnel %s: %s", name, err)
|
|
}
|
|
|
|
return resourceComputeVpnTunnelRead(d, meta)
|
|
}
|
|
|
|
func resourceComputeVpnTunnelRead(d *schema.ResourceData, meta interface{}) error {
|
|
config := meta.(*Config)
|
|
|
|
name := d.Get("name").(string)
|
|
region := getOptionalRegion(d, config)
|
|
project := config.Project
|
|
|
|
vpnTunnelsService := compute.NewVpnTunnelsService(config.clientCompute)
|
|
|
|
vpnTunnel, err := vpnTunnelsService.Get(project, region, name).Do()
|
|
if err != nil {
|
|
if gerr, ok := err.(*googleapi.Error); ok && gerr.Code == 404 {
|
|
log.Printf("[WARN] Removing VPN Tunnel %q because it's gone", d.Get("name").(string))
|
|
// The resource doesn't exist anymore
|
|
d.SetId("")
|
|
|
|
return nil
|
|
}
|
|
|
|
return fmt.Errorf("Error Reading VPN Tunnel %s: %s", name, err)
|
|
}
|
|
|
|
d.Set("detailed_status", vpnTunnel.DetailedStatus)
|
|
d.Set("self_link", vpnTunnel.SelfLink)
|
|
|
|
d.SetId(name)
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceComputeVpnTunnelDelete(d *schema.ResourceData, meta interface{}) error {
|
|
config := meta.(*Config)
|
|
|
|
name := d.Get("name").(string)
|
|
region := getOptionalRegion(d, config)
|
|
project := config.Project
|
|
|
|
vpnTunnelsService := compute.NewVpnTunnelsService(config.clientCompute)
|
|
|
|
op, err := vpnTunnelsService.Delete(project, region, name).Do()
|
|
if err != nil {
|
|
return fmt.Errorf("Error Reading VPN Tunnel %s: %s", name, err)
|
|
}
|
|
|
|
err = computeOperationWaitRegion(config, op, region, "Deleting VPN Tunnel")
|
|
if err != nil {
|
|
return fmt.Errorf("Error Waiting to Delete VPN Tunnel %s: %s", name, err)
|
|
}
|
|
|
|
return nil
|
|
}
|