package azurerm import ( "fmt" "log" "net/http" "time" "github.com/Azure/azure-sdk-for-go/arm/network" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/schema" ) func resourceArmNetworkSecurityRule() *schema.Resource { return &schema.Resource{ Create: resourceArmNetworkSecurityRuleCreate, Read: resourceArmNetworkSecurityRuleRead, Update: resourceArmNetworkSecurityRuleCreate, Delete: resourceArmNetworkSecurityRuleDelete, Schema: map[string]*schema.Schema{ "name": &schema.Schema{ Type: schema.TypeString, Required: true, ForceNew: true, }, "resource_group_name": &schema.Schema{ Type: schema.TypeString, Required: true, ForceNew: true, }, "network_security_group_name": &schema.Schema{ Type: schema.TypeString, Required: true, }, "description": &schema.Schema{ Type: schema.TypeString, Optional: true, ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) { value := v.(string) if len(value) > 140 { errors = append(errors, fmt.Errorf( "The network security rule description can be no longer than 140 chars")) } return }, }, "protocol": &schema.Schema{ Type: schema.TypeString, Required: true, ValidateFunc: validateNetworkSecurityRuleProtocol, }, "source_port_range": &schema.Schema{ Type: schema.TypeString, Required: true, }, "destination_port_range": &schema.Schema{ Type: schema.TypeString, Required: true, }, "source_address_prefix": &schema.Schema{ Type: schema.TypeString, Required: true, }, "destination_address_prefix": &schema.Schema{ Type: schema.TypeString, Required: true, }, "access": &schema.Schema{ Type: schema.TypeString, Required: true, ValidateFunc: validateNetworkSecurityRuleAccess, }, "priority": &schema.Schema{ Type: schema.TypeInt, Required: true, ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) { value := v.(int) if value < 100 || value > 4096 { errors = append(errors, fmt.Errorf( "The `priority` can only be between 100 and 4096")) } return }, }, "direction": &schema.Schema{ Type: schema.TypeString, Required: true, ValidateFunc: validateNetworkSecurityRuleDirection, }, }, } } func resourceArmNetworkSecurityRuleCreate(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient) secClient := client.secRuleClient name := d.Get("name").(string) nsgName := d.Get("network_security_group_name").(string) resGroup := d.Get("resource_group_name").(string) source_port_range := d.Get("source_port_range").(string) destination_port_range := d.Get("destination_port_range").(string) source_address_prefix := d.Get("source_address_prefix").(string) destination_address_prefix := d.Get("destination_address_prefix").(string) priority := d.Get("priority").(int) access := d.Get("access").(string) direction := d.Get("direction").(string) protocol := d.Get("protocol").(string) armMutexKV.Lock(nsgName) defer armMutexKV.Unlock(nsgName) properties := network.SecurityRulePropertiesFormat{ SourcePortRange: &source_port_range, DestinationPortRange: &destination_port_range, SourceAddressPrefix: &source_address_prefix, DestinationAddressPrefix: &destination_address_prefix, Priority: &priority, Access: network.SecurityRuleAccess(access), Direction: network.SecurityRuleDirection(direction), Protocol: network.SecurityRuleProtocol(protocol), } if v, ok := d.GetOk("description"); ok { description := v.(string) properties.Description = &description } sgr := network.SecurityRule{ Name: &name, Properties: &properties, } resp, err := secClient.CreateOrUpdate(resGroup, nsgName, name, sgr) if err != nil { return err } d.SetId(*resp.ID) log.Printf("[DEBUG] Waiting for Network Security Rule (%s) to become available", name) stateConf := &resource.StateChangeConf{ Pending: []string{"Accepted", "Updating"}, Target: []string{"Succeeded"}, Refresh: securityRuleStateRefreshFunc(client, resGroup, nsgName, name), Timeout: 10 * time.Minute, } if _, err := stateConf.WaitForState(); err != nil { return fmt.Errorf("Error waiting for Network Securty Rule (%s) to become available: %s", name, err) } return resourceArmNetworkSecurityRuleRead(d, meta) } func resourceArmNetworkSecurityRuleRead(d *schema.ResourceData, meta interface{}) error { secRuleClient := meta.(*ArmClient).secRuleClient id, err := parseAzureResourceID(d.Id()) if err != nil { return err } resGroup := id.ResourceGroup networkSGName := id.Path["networkSecurityGroups"] sgRuleName := id.Path["securityRules"] resp, err := secRuleClient.Get(resGroup, networkSGName, sgRuleName) if resp.StatusCode == http.StatusNotFound { d.SetId("") return nil } if err != nil { return fmt.Errorf("Error making Read request on Azure Network Security Rule %s: %s", sgRuleName, err) } return nil } func resourceArmNetworkSecurityRuleDelete(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient) secRuleClient := client.secRuleClient id, err := parseAzureResourceID(d.Id()) if err != nil { return err } resGroup := id.ResourceGroup nsgName := id.Path["networkSecurityGroups"] sgRuleName := id.Path["securityRules"] armMutexKV.Lock(nsgName) defer armMutexKV.Unlock(nsgName) _, err = secRuleClient.Delete(resGroup, nsgName, sgRuleName) return err } func securityRuleStateRefreshFunc(client *ArmClient, resourceGroupName string, networkSecurityGroupName string, securityRuleName string) resource.StateRefreshFunc { return func() (interface{}, string, error) { res, err := client.secRuleClient.Get(resourceGroupName, networkSecurityGroupName, securityRuleName) if err != nil { return nil, "", fmt.Errorf("Error issuing read request in securityGroupStateRefreshFunc to Azure ARM for network security rule '%s' (RG: '%s') (NSG: '%s'): %s", securityRuleName, resourceGroupName, networkSecurityGroupName, err) } return res, *res.Properties.ProvisioningState, nil } }