package azurerm import ( "fmt" "log" "net/http" "regexp" "github.com/Azure/azure-sdk-for-go/arm/containerregistry" "github.com/hashicorp/terraform/helper/hashcode" "github.com/hashicorp/terraform/helper/schema" "github.com/jen20/riviera/azure" ) func resourceArmContainerRegistry() *schema.Resource { return &schema.Resource{ Create: resourceArmContainerRegistryCreate, Read: resourceArmContainerRegistryRead, Update: resourceArmContainerRegistryCreate, Delete: resourceArmContainerRegistryDelete, Importer: &schema.ResourceImporter{ State: schema.ImportStatePassthrough, }, Schema: map[string]*schema.Schema{ "name": { Type: schema.TypeString, Required: true, ForceNew: true, ValidateFunc: validateAzureRMContainerRegistryName, }, "resource_group_name": { Type: schema.TypeString, Required: true, ForceNew: true, }, "location": locationSchema(), "admin_enabled": { Type: schema.TypeBool, Optional: true, Default: false, }, "storage_account": { Type: schema.TypeSet, Required: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "name": { Type: schema.TypeString, Required: true, }, "access_key": { Type: schema.TypeString, Required: true, Sensitive: true, }, }, }, }, "login_server": { Type: schema.TypeString, Computed: true, }, "admin_username": { Type: schema.TypeString, Computed: true, }, "admin_password": { Type: schema.TypeString, Computed: true, }, "tags": tagsSchema(), }, } } func resourceArmContainerRegistryCreate(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient).containerRegistryClient log.Printf("[INFO] preparing arguments for AzureRM Container Registry creation.") resourceGroup := d.Get("resource_group_name").(string) name := d.Get("name").(string) location := d.Get("location").(string) adminUserEnabled := d.Get("admin_enabled").(bool) tags := d.Get("tags").(map[string]interface{}) parameters := containerregistry.Registry{ Location: &location, RegistryProperties: &containerregistry.RegistryProperties{ AdminUserEnabled: &adminUserEnabled, }, Tags: expandTags(tags), } accounts := d.Get("storage_account").(*schema.Set).List() account := accounts[0].(map[string]interface{}) storageAccountName := account["name"].(string) storageAccountAccessKey := account["access_key"].(string) parameters.RegistryProperties.StorageAccount = &containerregistry.StorageAccountProperties{ Name: azure.String(storageAccountName), AccessKey: azure.String(storageAccountAccessKey), } _, err := client.CreateOrUpdate(resourceGroup, name, parameters) if err != nil { return err } read, err := client.GetProperties(resourceGroup, name) if err != nil { return err } if read.ID == nil { return fmt.Errorf("Cannot read Container Registry %s (resource group %s) ID", name, resourceGroup) } d.SetId(*read.ID) return resourceArmContainerRegistryRead(d, meta) } func resourceArmContainerRegistryRead(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient).containerRegistryClient id, err := parseAzureResourceID(d.Id()) if err != nil { return err } resourceGroup := id.ResourceGroup name := id.Path["registries"] resp, err := client.GetProperties(resourceGroup, name) if err != nil { return fmt.Errorf("Error making Read request on Azure Container Registry %s: %s", name, err) } if resp.StatusCode == http.StatusNotFound { d.SetId("") return nil } d.Set("name", resp.Name) d.Set("resource_group_name", resourceGroup) d.Set("location", azureRMNormalizeLocation(*resp.Location)) d.Set("admin_enabled", resp.AdminUserEnabled) d.Set("login_server", resp.LoginServer) if resp.StorageAccount != nil { flattenArmContainerRegistryStorageAccount(d, resp.StorageAccount) } if *resp.AdminUserEnabled { credsResp, err := client.GetCredentials(resourceGroup, name) if err != nil { return fmt.Errorf("Error making Read request on Azure Container Registry %s for Credentials: %s", name, err) } d.Set("admin_username", credsResp.Username) d.Set("admin_password", credsResp.Password) } else { d.Set("admin_username", "") d.Set("admin_password", "") } flattenAndSetTags(d, resp.Tags) return nil } func resourceArmContainerRegistryDelete(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient).containerRegistryClient id, err := parseAzureResourceID(d.Id()) if err != nil { return err } resourceGroup := id.ResourceGroup name := id.Path["registries"] resp, err := client.Delete(resourceGroup, name) if resp.StatusCode != http.StatusOK { return fmt.Errorf("Error issuing Azure ARM delete request of Container Registry '%s': %s", name, err) } return nil } func flattenArmContainerRegistryStorageAccount(d *schema.ResourceData, properties *containerregistry.StorageAccountProperties) { storageAccounts := schema.Set{ F: resourceAzureRMContainerRegistryStorageAccountHash, } storageAccount := map[string]interface{}{} storageAccount["name"] = properties.Name storageAccounts.Add(storageAccount) d.Set("storage_account", &storageAccounts) } func resourceAzureRMContainerRegistryStorageAccountHash(v interface{}) int { m := v.(map[string]interface{}) name := m["name"].(*string) return hashcode.String(*name) } func validateAzureRMContainerRegistryName(v interface{}, k string) (ws []string, errors []error) { value := v.(string) if !regexp.MustCompile(`^[a-zA-Z0-9]+$`).MatchString(value) { errors = append(errors, fmt.Errorf( "alpha numeric characters only are allowed in %q: %q", k, value)) } if 5 > len(value) { errors = append(errors, fmt.Errorf("%q cannot be less than 5 characters: %q", k, value)) } if len(value) >= 50 { errors = append(errors, fmt.Errorf("%q cannot be longer than 50 characters: %q %d", k, value, len(value))) } return }