terraform/builtin/providers/aws/resource_aws_codedeploy_dep...

691 lines
20 KiB
Go

package aws
import (
"bytes"
"fmt"
"log"
"regexp"
"sort"
"time"
"github.com/hashicorp/terraform/helper/hashcode"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/helper/schema"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/codedeploy"
)
func resourceAwsCodeDeployDeploymentGroup() *schema.Resource {
return &schema.Resource{
Create: resourceAwsCodeDeployDeploymentGroupCreate,
Read: resourceAwsCodeDeployDeploymentGroupRead,
Update: resourceAwsCodeDeployDeploymentGroupUpdate,
Delete: resourceAwsCodeDeployDeploymentGroupDelete,
Schema: map[string]*schema.Schema{
"app_name": &schema.Schema{
Type: schema.TypeString,
Required: true,
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
value := v.(string)
if len(value) > 100 {
errors = append(errors, fmt.Errorf(
"%q cannot exceed 100 characters", k))
}
return
},
},
"deployment_group_name": &schema.Schema{
Type: schema.TypeString,
Required: true,
ForceNew: true,
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
value := v.(string)
if len(value) > 100 {
errors = append(errors, fmt.Errorf(
"%q cannot exceed 100 characters", k))
}
return
},
},
"service_role_arn": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"alarm_configuration": &schema.Schema{
Type: schema.TypeList,
Optional: true,
MaxItems: 1,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"alarms": &schema.Schema{
Type: schema.TypeSet,
MaxItems: 10,
Optional: true,
Set: schema.HashString,
Elem: &schema.Schema{Type: schema.TypeString},
},
"enabled": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
},
"ignore_poll_alarm_failure": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
Default: false,
},
},
},
},
"auto_rollback_configuration": &schema.Schema{
Type: schema.TypeList,
Optional: true,
MaxItems: 1,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"enabled": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
},
"events": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Set: schema.HashString,
Elem: &schema.Schema{Type: schema.TypeString},
},
},
},
},
"autoscaling_groups": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Schema{Type: schema.TypeString},
Set: schema.HashString,
},
"deployment_config_name": &schema.Schema{
Type: schema.TypeString,
Optional: true,
Default: "CodeDeployDefault.OneAtATime",
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
value := v.(string)
if len(value) > 100 {
errors = append(errors, fmt.Errorf(
"%q cannot exceed 100 characters", k))
}
return
},
},
"ec2_tag_filter": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"type": &schema.Schema{
Type: schema.TypeString,
Optional: true,
ValidateFunc: validateTagFilters,
},
"value": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
},
},
Set: resourceAwsCodeDeployTagFilterHash,
},
"on_premises_instance_tag_filter": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"key": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"type": &schema.Schema{
Type: schema.TypeString,
Optional: true,
ValidateFunc: validateTagFilters,
},
"value": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
},
},
Set: resourceAwsCodeDeployTagFilterHash,
},
"trigger_configuration": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"trigger_events": &schema.Schema{
Type: schema.TypeSet,
Required: true,
Set: schema.HashString,
Elem: &schema.Schema{
Type: schema.TypeString,
ValidateFunc: validateTriggerEvent,
},
},
"trigger_name": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"trigger_target_arn": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
},
},
Set: resourceAwsCodeDeployTriggerConfigHash,
},
},
}
}
func resourceAwsCodeDeployDeploymentGroupCreate(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).codedeployconn
application := d.Get("app_name").(string)
deploymentGroup := d.Get("deployment_group_name").(string)
input := codedeploy.CreateDeploymentGroupInput{
ApplicationName: aws.String(application),
DeploymentGroupName: aws.String(deploymentGroup),
ServiceRoleArn: aws.String(d.Get("service_role_arn").(string)),
}
if attr, ok := d.GetOk("deployment_config_name"); ok {
input.DeploymentConfigName = aws.String(attr.(string))
}
if attr, ok := d.GetOk("autoscaling_groups"); ok {
input.AutoScalingGroups = expandStringList(attr.(*schema.Set).List())
}
if attr, ok := d.GetOk("on_premises_instance_tag_filter"); ok {
onPremFilters := buildOnPremTagFilters(attr.(*schema.Set).List())
input.OnPremisesInstanceTagFilters = onPremFilters
}
if attr, ok := d.GetOk("ec2_tag_filter"); ok {
ec2TagFilters := buildEC2TagFilters(attr.(*schema.Set).List())
input.Ec2TagFilters = ec2TagFilters
}
if attr, ok := d.GetOk("trigger_configuration"); ok {
triggerConfigs := buildTriggerConfigs(attr.(*schema.Set).List())
input.TriggerConfigurations = triggerConfigs
}
if attr, ok := d.GetOk("auto_rollback_configuration"); ok {
input.AutoRollbackConfiguration = buildAutoRollbackConfig(attr.([]interface{}))
}
if attr, ok := d.GetOk("alarm_configuration"); ok {
input.AlarmConfiguration = buildAlarmConfig(attr.([]interface{}))
}
// Retry to handle IAM role eventual consistency.
var resp *codedeploy.CreateDeploymentGroupOutput
var err error
err = resource.Retry(5*time.Minute, func() *resource.RetryError {
resp, err = conn.CreateDeploymentGroup(&input)
if err != nil {
retry := false
codedeployErr, ok := err.(awserr.Error)
if !ok {
return resource.NonRetryableError(err)
}
if codedeployErr.Code() == "InvalidRoleException" {
retry = true
}
if codedeployErr.Code() == "InvalidTriggerConfigException" {
r := regexp.MustCompile("^Topic ARN .+ is not valid$")
if r.MatchString(codedeployErr.Message()) {
retry = true
}
}
if retry {
log.Printf("[DEBUG] Trying to create deployment group again: %q",
codedeployErr.Message())
return resource.RetryableError(err)
}
return resource.NonRetryableError(err)
}
return nil
})
if err != nil {
return err
}
d.SetId(*resp.DeploymentGroupId)
return resourceAwsCodeDeployDeploymentGroupRead(d, meta)
}
func resourceAwsCodeDeployDeploymentGroupRead(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).codedeployconn
log.Printf("[DEBUG] Reading CodeDeploy DeploymentGroup %s", d.Id())
resp, err := conn.GetDeploymentGroup(&codedeploy.GetDeploymentGroupInput{
ApplicationName: aws.String(d.Get("app_name").(string)),
DeploymentGroupName: aws.String(d.Get("deployment_group_name").(string)),
})
if err != nil {
if ec2err, ok := err.(awserr.Error); ok && ec2err.Code() == "DeploymentGroupDoesNotExistException" {
log.Printf("[INFO] CodeDeployment DeploymentGroup %s not found", d.Get("deployment_group_name").(string))
d.SetId("")
return nil
}
return err
}
d.Set("app_name", resp.DeploymentGroupInfo.ApplicationName)
d.Set("autoscaling_groups", resp.DeploymentGroupInfo.AutoScalingGroups)
d.Set("deployment_config_name", resp.DeploymentGroupInfo.DeploymentConfigName)
d.Set("deployment_group_name", resp.DeploymentGroupInfo.DeploymentGroupName)
d.Set("service_role_arn", resp.DeploymentGroupInfo.ServiceRoleArn)
if err := d.Set("ec2_tag_filter", ec2TagFiltersToMap(resp.DeploymentGroupInfo.Ec2TagFilters)); err != nil {
return err
}
if err := d.Set("on_premises_instance_tag_filter", onPremisesTagFiltersToMap(resp.DeploymentGroupInfo.OnPremisesInstanceTagFilters)); err != nil {
return err
}
if err := d.Set("trigger_configuration", triggerConfigsToMap(resp.DeploymentGroupInfo.TriggerConfigurations)); err != nil {
return err
}
if err := d.Set("auto_rollback_configuration", autoRollbackConfigToMap(resp.DeploymentGroupInfo.AutoRollbackConfiguration)); err != nil {
return err
}
if err := d.Set("alarm_configuration", alarmConfigToMap(resp.DeploymentGroupInfo.AlarmConfiguration)); err != nil {
return err
}
return nil
}
func resourceAwsCodeDeployDeploymentGroupUpdate(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).codedeployconn
input := codedeploy.UpdateDeploymentGroupInput{
ApplicationName: aws.String(d.Get("app_name").(string)),
CurrentDeploymentGroupName: aws.String(d.Get("deployment_group_name").(string)),
ServiceRoleArn: aws.String(d.Get("service_role_arn").(string)),
}
if d.HasChange("autoscaling_groups") {
_, n := d.GetChange("autoscaling_groups")
input.AutoScalingGroups = expandStringList(n.(*schema.Set).List())
}
if d.HasChange("deployment_config_name") {
_, n := d.GetChange("deployment_config_name")
input.DeploymentConfigName = aws.String(n.(string))
}
if d.HasChange("deployment_group_name") {
_, n := d.GetChange("deployment_group_name")
input.NewDeploymentGroupName = aws.String(n.(string))
}
// TagFilters aren't like tags. They don't append. They simply replace.
if d.HasChange("on_premises_instance_tag_filter") {
_, n := d.GetChange("on_premises_instance_tag_filter")
onPremFilters := buildOnPremTagFilters(n.(*schema.Set).List())
input.OnPremisesInstanceTagFilters = onPremFilters
}
if d.HasChange("ec2_tag_filter") {
_, n := d.GetChange("ec2_tag_filter")
ec2Filters := buildEC2TagFilters(n.(*schema.Set).List())
input.Ec2TagFilters = ec2Filters
}
if d.HasChange("trigger_configuration") {
_, n := d.GetChange("trigger_configuration")
triggerConfigs := buildTriggerConfigs(n.(*schema.Set).List())
input.TriggerConfigurations = triggerConfigs
}
if d.HasChange("auto_rollback_configuration") {
_, n := d.GetChange("auto_rollback_configuration")
input.AutoRollbackConfiguration = buildAutoRollbackConfig(n.([]interface{}))
}
if d.HasChange("alarm_configuration") {
_, n := d.GetChange("alarm_configuration")
input.AlarmConfiguration = buildAlarmConfig(n.([]interface{}))
}
log.Printf("[DEBUG] Updating CodeDeploy DeploymentGroup %s", d.Id())
// Retry to handle IAM role eventual consistency.
err := resource.Retry(5*time.Minute, func() *resource.RetryError {
_, err := conn.UpdateDeploymentGroup(&input)
if err != nil {
retry := false
codedeployErr, ok := err.(awserr.Error)
if !ok {
return resource.NonRetryableError(err)
}
if codedeployErr.Code() == "InvalidRoleException" {
retry = true
}
if codedeployErr.Code() == "InvalidTriggerConfigException" {
r := regexp.MustCompile("^Topic ARN .+ is not valid$")
if r.MatchString(codedeployErr.Message()) {
retry = true
}
}
if retry {
log.Printf("[DEBUG] Retrying Code Deployment Group Update: %q",
codedeployErr.Message())
return resource.RetryableError(err)
}
return resource.NonRetryableError(err)
}
return nil
})
if err != nil {
return err
}
return resourceAwsCodeDeployDeploymentGroupRead(d, meta)
}
func resourceAwsCodeDeployDeploymentGroupDelete(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).codedeployconn
log.Printf("[DEBUG] Deleting CodeDeploy DeploymentGroup %s", d.Id())
_, err := conn.DeleteDeploymentGroup(&codedeploy.DeleteDeploymentGroupInput{
ApplicationName: aws.String(d.Get("app_name").(string)),
DeploymentGroupName: aws.String(d.Get("deployment_group_name").(string)),
})
if err != nil {
return err
}
d.SetId("")
return nil
}
// buildOnPremTagFilters converts raw schema lists into a list of
// codedeploy.TagFilters.
func buildOnPremTagFilters(configured []interface{}) []*codedeploy.TagFilter {
filters := make([]*codedeploy.TagFilter, 0)
for _, raw := range configured {
var filter codedeploy.TagFilter
m := raw.(map[string]interface{})
if v, ok := m["key"]; ok {
filter.Key = aws.String(v.(string))
}
if v, ok := m["type"]; ok {
filter.Type = aws.String(v.(string))
}
if v, ok := m["value"]; ok {
filter.Value = aws.String(v.(string))
}
filters = append(filters, &filter)
}
return filters
}
// buildEC2TagFilters converts raw schema lists into a list of
// codedeploy.EC2TagFilters.
func buildEC2TagFilters(configured []interface{}) []*codedeploy.EC2TagFilter {
filters := make([]*codedeploy.EC2TagFilter, 0)
for _, raw := range configured {
var filter codedeploy.EC2TagFilter
m := raw.(map[string]interface{})
filter.Key = aws.String(m["key"].(string))
filter.Type = aws.String(m["type"].(string))
filter.Value = aws.String(m["value"].(string))
filters = append(filters, &filter)
}
return filters
}
// buildTriggerConfigs converts a raw schema list into a list of
// codedeploy.TriggerConfig.
func buildTriggerConfigs(configured []interface{}) []*codedeploy.TriggerConfig {
configs := make([]*codedeploy.TriggerConfig, 0, len(configured))
for _, raw := range configured {
var config codedeploy.TriggerConfig
m := raw.(map[string]interface{})
config.TriggerEvents = expandStringSet(m["trigger_events"].(*schema.Set))
config.TriggerName = aws.String(m["trigger_name"].(string))
config.TriggerTargetArn = aws.String(m["trigger_target_arn"].(string))
configs = append(configs, &config)
}
return configs
}
// buildAutoRollbackConfig converts a raw schema list containing a map[string]interface{}
// into a single codedeploy.AutoRollbackConfiguration
func buildAutoRollbackConfig(configured []interface{}) *codedeploy.AutoRollbackConfiguration {
result := &codedeploy.AutoRollbackConfiguration{}
if len(configured) == 1 {
config := configured[0].(map[string]interface{})
result.Enabled = aws.Bool(config["enabled"].(bool))
result.Events = expandStringSet(config["events"].(*schema.Set))
} else { // delete the configuration
result.Enabled = aws.Bool(false)
result.Events = make([]*string, 0)
}
return result
}
// buildAlarmConfig converts a raw schema list containing a map[string]interface{}
// into a single codedeploy.AlarmConfiguration
func buildAlarmConfig(configured []interface{}) *codedeploy.AlarmConfiguration {
result := &codedeploy.AlarmConfiguration{}
if len(configured) == 1 {
config := configured[0].(map[string]interface{})
names := expandStringSet(config["alarms"].(*schema.Set))
alarms := make([]*codedeploy.Alarm, 0, len(names))
for _, name := range names {
alarm := &codedeploy.Alarm{
Name: name,
}
alarms = append(alarms, alarm)
}
result.Alarms = alarms
result.Enabled = aws.Bool(config["enabled"].(bool))
result.IgnorePollAlarmFailure = aws.Bool(config["ignore_poll_alarm_failure"].(bool))
} else { // delete the configuration
result.Alarms = make([]*codedeploy.Alarm, 0)
result.Enabled = aws.Bool(false)
result.IgnorePollAlarmFailure = aws.Bool(false)
}
return result
}
// ec2TagFiltersToMap converts lists of tag filters into a []map[string]string.
func ec2TagFiltersToMap(list []*codedeploy.EC2TagFilter) []map[string]string {
result := make([]map[string]string, 0, len(list))
for _, tf := range list {
l := make(map[string]string)
if tf.Key != nil && *tf.Key != "" {
l["key"] = *tf.Key
}
if tf.Value != nil && *tf.Value != "" {
l["value"] = *tf.Value
}
if tf.Type != nil && *tf.Type != "" {
l["type"] = *tf.Type
}
result = append(result, l)
}
return result
}
// onPremisesTagFiltersToMap converts lists of on-prem tag filters into a []map[string]string.
func onPremisesTagFiltersToMap(list []*codedeploy.TagFilter) []map[string]string {
result := make([]map[string]string, 0, len(list))
for _, tf := range list {
l := make(map[string]string)
if tf.Key != nil && *tf.Key != "" {
l["key"] = *tf.Key
}
if tf.Value != nil && *tf.Value != "" {
l["value"] = *tf.Value
}
if tf.Type != nil && *tf.Type != "" {
l["type"] = *tf.Type
}
result = append(result, l)
}
return result
}
// triggerConfigsToMap converts a list of []*codedeploy.TriggerConfig into a []map[string]interface{}
func triggerConfigsToMap(list []*codedeploy.TriggerConfig) []map[string]interface{} {
result := make([]map[string]interface{}, 0, len(list))
for _, tc := range list {
item := make(map[string]interface{})
item["trigger_events"] = schema.NewSet(schema.HashString, flattenStringList(tc.TriggerEvents))
item["trigger_name"] = *tc.TriggerName
item["trigger_target_arn"] = *tc.TriggerTargetArn
result = append(result, item)
}
return result
}
// autoRollbackConfigToMap converts a codedeploy.AutoRollbackConfiguration
// into a []map[string]interface{} list containing a single item
func autoRollbackConfigToMap(config *codedeploy.AutoRollbackConfiguration) []map[string]interface{} {
result := make([]map[string]interface{}, 0, 1)
// only create configurations that are enabled or temporarily disabled (retaining events)
// otherwise empty configurations will be created
if config != nil && (*config.Enabled == true || len(config.Events) > 0) {
item := make(map[string]interface{})
item["enabled"] = *config.Enabled
item["events"] = schema.NewSet(schema.HashString, flattenStringList(config.Events))
result = append(result, item)
}
return result
}
// alarmConfigToMap converts a codedeploy.AlarmConfiguration
// into a []map[string]interface{} list containing a single item
func alarmConfigToMap(config *codedeploy.AlarmConfiguration) []map[string]interface{} {
result := make([]map[string]interface{}, 0, 1)
// only create configurations that are enabled or temporarily disabled (retaining alarms)
// otherwise empty configurations will be created
if config != nil && (*config.Enabled == true || len(config.Alarms) > 0) {
names := make([]*string, 0, len(config.Alarms))
for _, alarm := range config.Alarms {
names = append(names, alarm.Name)
}
item := make(map[string]interface{})
item["alarms"] = schema.NewSet(schema.HashString, flattenStringList(names))
item["enabled"] = *config.Enabled
item["ignore_poll_alarm_failure"] = *config.IgnorePollAlarmFailure
result = append(result, item)
}
return result
}
func resourceAwsCodeDeployTagFilterHash(v interface{}) int {
var buf bytes.Buffer
m := v.(map[string]interface{})
// Nothing's actually required in tag filters, so we must check the
// presence of all values before attempting a hash.
if v, ok := m["key"]; ok {
buf.WriteString(fmt.Sprintf("%s-", v.(string)))
}
if v, ok := m["type"]; ok {
buf.WriteString(fmt.Sprintf("%s-", v.(string)))
}
if v, ok := m["value"]; ok {
buf.WriteString(fmt.Sprintf("%s-", v.(string)))
}
return hashcode.String(buf.String())
}
func resourceAwsCodeDeployTriggerConfigHash(v interface{}) int {
var buf bytes.Buffer
m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%s-", m["trigger_name"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["trigger_target_arn"].(string)))
if triggerEvents, ok := m["trigger_events"]; ok {
names := triggerEvents.(*schema.Set).List()
strings := make([]string, len(names))
for i, raw := range names {
strings[i] = raw.(string)
}
sort.Strings(strings)
for _, s := range strings {
buf.WriteString(fmt.Sprintf("%s-", s))
}
}
return hashcode.String(buf.String())
}
func validateTriggerEvent(v interface{}, k string) (ws []string, errors []error) {
value := v.(string)
triggerEvents := map[string]bool{
"DeploymentStart": true,
"DeploymentStop": true,
"DeploymentSuccess": true,
"DeploymentFailure": true,
"DeploymentRollback": true,
"InstanceStart": true,
"InstanceSuccess": true,
"InstanceFailure": true,
}
if !triggerEvents[value] {
errors = append(errors, fmt.Errorf("%q must be a valid event type value: %q", k, value))
}
return
}