terraform/vendor/github.com/terraform-providers/terraform-provider-openstack/openstack/resource_openstack_networki...

525 lines
15 KiB
Go

package openstack
import (
"fmt"
"log"
"time"
"github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/attributestags"
"github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/extradhcpopts"
"github.com/gophercloud/gophercloud/openstack/networking/v2/ports"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/helper/validation"
)
func resourceNetworkingPortV2() *schema.Resource {
return &schema.Resource{
Create: resourceNetworkingPortV2Create,
Read: resourceNetworkingPortV2Read,
Update: resourceNetworkingPortV2Update,
Delete: resourceNetworkingPortV2Delete,
Importer: &schema.ResourceImporter{
State: schema.ImportStatePassthrough,
},
Timeouts: &schema.ResourceTimeout{
Create: schema.DefaultTimeout(10 * time.Minute),
Delete: schema.DefaultTimeout(10 * time.Minute),
},
Schema: map[string]*schema.Schema{
"region": {
Type: schema.TypeString,
Optional: true,
Computed: true,
ForceNew: true,
},
"name": {
Type: schema.TypeString,
Optional: true,
ForceNew: false,
},
"description": {
Type: schema.TypeString,
Optional: true,
},
"network_id": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"admin_state_up": {
Type: schema.TypeBool,
Optional: true,
ForceNew: false,
Computed: true,
},
"mac_address": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Computed: true,
},
"tenant_id": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Computed: true,
},
"device_owner": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Computed: true,
},
"security_group_ids": {
Type: schema.TypeSet,
Optional: true,
ForceNew: false,
Elem: &schema.Schema{Type: schema.TypeString},
Set: schema.HashString,
},
"no_security_groups": {
Type: schema.TypeBool,
Optional: true,
ForceNew: false,
},
"device_id": {
Type: schema.TypeString,
Optional: true,
ForceNew: true,
Computed: true,
},
"fixed_ip": {
Type: schema.TypeList,
Optional: true,
ForceNew: false,
ConflictsWith: []string{"no_fixed_ip"},
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"subnet_id": {
Type: schema.TypeString,
Required: true,
},
"ip_address": {
Type: schema.TypeString,
Optional: true,
ValidateFunc: validation.SingleIP(),
},
},
},
},
"no_fixed_ip": {
Type: schema.TypeBool,
Optional: true,
ForceNew: false,
ConflictsWith: []string{"fixed_ip"},
},
"allowed_address_pairs": {
Type: schema.TypeSet,
Optional: true,
ForceNew: false,
Set: resourceNetworkingPortV2AllowedAddressPairsHash,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"ip_address": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validation.SingleIP(),
},
"mac_address": {
Type: schema.TypeString,
Optional: true,
},
},
},
},
"extra_dhcp_option": {
Type: schema.TypeSet,
Optional: true,
ForceNew: false,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"name": {
Type: schema.TypeString,
Required: true,
},
"value": {
Type: schema.TypeString,
Required: true,
},
"ip_version": {
Type: schema.TypeInt,
Default: 4,
Optional: true,
},
},
},
},
"value_specs": {
Type: schema.TypeMap,
Optional: true,
ForceNew: true,
},
"all_fixed_ips": {
Type: schema.TypeList,
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
"all_security_group_ids": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
Set: schema.HashString,
},
"tags": {
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
"all_tags": {
Type: schema.TypeSet,
Computed: true,
Elem: &schema.Schema{Type: schema.TypeString},
},
},
}
}
func resourceNetworkingPortV2Create(d *schema.ResourceData, meta interface{}) error {
config := meta.(*Config)
networkingClient, err := config.networkingV2Client(GetRegion(d, config))
if err != nil {
return fmt.Errorf("Error creating OpenStack networking client: %s", err)
}
securityGroups := expandToStringSlice(d.Get("security_group_ids").(*schema.Set).List())
noSecurityGroups := d.Get("no_security_groups").(bool)
// Check and make sure an invalid security group configuration wasn't given.
if noSecurityGroups && len(securityGroups) > 0 {
return fmt.Errorf("Cannot have both no_security_groups and security_group_ids set for openstack_networking_port_v2")
}
allowedAddressPairs := d.Get("allowed_address_pairs").(*schema.Set)
createOpts := PortCreateOpts{
ports.CreateOpts{
Name: d.Get("name").(string),
Description: d.Get("description").(string),
NetworkID: d.Get("network_id").(string),
MACAddress: d.Get("mac_address").(string),
TenantID: d.Get("tenant_id").(string),
DeviceOwner: d.Get("device_owner").(string),
DeviceID: d.Get("device_id").(string),
FixedIPs: expandNetworkingPortFixedIPV2(d),
AllowedAddressPairs: expandNetworkingPortAllowedAddressPairsV2(allowedAddressPairs),
},
MapValueSpecs(d),
}
if v, ok := d.GetOkExists("admin_state_up"); ok {
asu := v.(bool)
createOpts.AdminStateUp = &asu
}
if noSecurityGroups {
securityGroups = []string{}
createOpts.SecurityGroups = &securityGroups
}
// Only set SecurityGroups if one was specified.
// Otherwise this would mimic the no_security_groups action.
if len(securityGroups) > 0 {
createOpts.SecurityGroups = &securityGroups
}
// Declare a finalCreateOpts interface to hold either the
// base create options or the extended DHCP options.
var finalCreateOpts ports.CreateOptsBuilder
finalCreateOpts = createOpts
dhcpOpts := d.Get("extra_dhcp_option").(*schema.Set)
if dhcpOpts.Len() > 0 {
finalCreateOpts = extradhcpopts.CreateOptsExt{
CreateOptsBuilder: createOpts,
ExtraDHCPOpts: expandNetworkingPortDHCPOptsV2Create(dhcpOpts),
}
}
log.Printf("[DEBUG] openstack_networking_port_v2 create options: %#v", finalCreateOpts)
// Create a Neutron port and set extra DHCP options if they're specified.
var p struct {
ports.Port
extradhcpopts.ExtraDHCPOptsExt
}
err = ports.Create(networkingClient, finalCreateOpts).ExtractInto(&p)
if err != nil {
return fmt.Errorf("Error creating openstack_networking_port_v2: %s", err)
}
log.Printf("[DEBUG] Waiting for openstack_networking_port_v2 %s to become available.", p.ID)
stateConf := &resource.StateChangeConf{
Target: []string{"ACTIVE", "DOWN"},
Refresh: resourceNetworkingPortV2StateRefreshFunc(networkingClient, p.ID),
Timeout: d.Timeout(schema.TimeoutCreate),
Delay: 5 * time.Second,
MinTimeout: 3 * time.Second,
}
_, err = stateConf.WaitForState()
if err != nil {
return fmt.Errorf("Error waiting for openstack_networking_port_v2 %s to become available: %s", p.ID, err)
}
d.SetId(p.ID)
tags := networkV2AttributesTags(d)
if len(tags) > 0 {
tagOpts := attributestags.ReplaceAllOpts{Tags: tags}
tags, err := attributestags.ReplaceAll(networkingClient, "ports", p.ID, tagOpts).Extract()
if err != nil {
return fmt.Errorf("Error setting tags on openstack_networking_port_v2 %s: %s", p.ID, err)
}
log.Printf("[DEBUG] Set tags %s on openstack_networking_port_v2 %s", tags, p.ID)
}
log.Printf("[DEBUG] Created openstack_networking_port_v2 %s: %#v", p.ID, p)
return resourceNetworkingPortV2Read(d, meta)
}
func resourceNetworkingPortV2Read(d *schema.ResourceData, meta interface{}) error {
config := meta.(*Config)
networkingClient, err := config.networkingV2Client(GetRegion(d, config))
if err != nil {
return fmt.Errorf("Error creating OpenStack networking client: %s", err)
}
var p struct {
ports.Port
extradhcpopts.ExtraDHCPOptsExt
}
err = ports.Get(networkingClient, d.Id()).ExtractInto(&p)
if err != nil {
return CheckDeleted(d, err, "Error getting openstack_networking_port_v2")
}
log.Printf("[DEBUG] Retrieved openstack_networking_port_v2 %s: %#v", d.Id(), p)
d.Set("name", p.Name)
d.Set("description", p.Description)
d.Set("admin_state_up", p.AdminStateUp)
d.Set("network_id", p.NetworkID)
d.Set("mac_address", p.MACAddress)
d.Set("tenant_id", p.TenantID)
d.Set("device_owner", p.DeviceOwner)
d.Set("device_id", p.DeviceID)
networkV2ReadAttributesTags(d, p.Tags)
// Set a slice of all returned Fixed IPs.
// This will be in the order returned by the API,
// which is usually alpha-numeric.
d.Set("all_fixed_ips", expandNetworkingPortFixedIPToStringSlice(p.FixedIPs))
// Set all security groups.
// This can be different from what the user specified since
// the port can have the "default" group automatically applied.
d.Set("all_security_group_ids", p.SecurityGroups)
d.Set("allowed_address_pairs", flattenNetworkingPortAllowedAddressPairsV2(p.MACAddress, p.AllowedAddressPairs))
d.Set("extra_dhcp_option", flattenNetworkingPortDHCPOptsV2(p.ExtraDHCPOptsExt))
d.Set("region", GetRegion(d, config))
return nil
}
func resourceNetworkingPortV2Update(d *schema.ResourceData, meta interface{}) error {
config := meta.(*Config)
networkingClient, err := config.networkingV2Client(GetRegion(d, config))
if err != nil {
return fmt.Errorf("Error creating OpenStack networking client: %s", err)
}
securityGroups := expandToStringSlice(d.Get("security_group_ids").(*schema.Set).List())
noSecurityGroups := d.Get("no_security_groups").(bool)
// Check and make sure an invalid security group configuration wasn't given.
if noSecurityGroups && len(securityGroups) > 0 {
return fmt.Errorf("Cannot have both no_security_groups and security_group_ids set for openstack_networking_port_v2")
}
var hasChange bool
var updateOpts ports.UpdateOpts
if d.HasChange("allowed_address_pairs") {
hasChange = true
allowedAddressPairs := d.Get("allowed_address_pairs").(*schema.Set)
aap := expandNetworkingPortAllowedAddressPairsV2(allowedAddressPairs)
updateOpts.AllowedAddressPairs = &aap
}
if d.HasChange("no_security_groups") {
if noSecurityGroups {
hasChange = true
v := []string{}
updateOpts.SecurityGroups = &v
}
}
if d.HasChange("security_group_ids") {
hasChange = true
updateOpts.SecurityGroups = &securityGroups
}
if d.HasChange("name") {
hasChange = true
name := d.Get("name").(string)
updateOpts.Name = &name
}
if d.HasChange("description") {
hasChange = true
description := d.Get("description").(string)
updateOpts.Description = &description
}
if d.HasChange("admin_state_up") {
hasChange = true
asu := d.Get("admin_state_up").(bool)
updateOpts.AdminStateUp = &asu
}
if d.HasChange("device_owner") {
hasChange = true
deviceOwner := d.Get("device_owner").(string)
updateOpts.DeviceOwner = &deviceOwner
}
if d.HasChange("device_id") {
hasChange = true
deviceId := d.Get("device_id").(string)
updateOpts.DeviceID = &deviceId
}
if d.HasChange("fixed_ip") || d.HasChange("no_fixed_ip") {
fixedIPs := expandNetworkingPortFixedIPV2(d)
if fixedIPs != nil {
hasChange = true
updateOpts.FixedIPs = fixedIPs
}
}
// At this point, perform the update for all "standard" port changes.
if hasChange {
log.Printf("[DEBUG] openstack_networking_port_v2 %s update options: %#v", d.Id(), updateOpts)
_, err = ports.Update(networkingClient, d.Id(), updateOpts).Extract()
if err != nil {
return fmt.Errorf("Error updating OpenStack Neutron Port: %s", err)
}
}
// Next, perform any dhcp option changes.
if d.HasChange("extra_dhcp_option") {
o, n := d.GetChange("extra_dhcp_option")
oldDHCPOpts := o.(*schema.Set)
newDHCPOpts := n.(*schema.Set)
// Delete all old DHCP options, regardless of if they still exist.
// If they do still exist, they will be re-added below.
if oldDHCPOpts.Len() != 0 {
deleteExtraDHCPOpts := expandNetworkingPortDHCPOptsV2Delete(oldDHCPOpts)
dhcpUpdateOpts := extradhcpopts.UpdateOptsExt{
UpdateOptsBuilder: &ports.UpdateOpts{},
ExtraDHCPOpts: deleteExtraDHCPOpts,
}
log.Printf("[DEBUG] Deleting old DHCP opts for openstack_networking_port_v2 %s", d.Id())
_, err = ports.Update(networkingClient, d.Id(), dhcpUpdateOpts).Extract()
if err != nil {
return fmt.Errorf("Error updating OpenStack Neutron Port: %s", err)
}
}
// Add any new DHCP options and re-add previously set DHCP options.
if newDHCPOpts.Len() != 0 {
updateExtraDHCPOpts := expandNetworkingPortDHCPOptsV2Update(newDHCPOpts)
dhcpUpdateOpts := extradhcpopts.UpdateOptsExt{
UpdateOptsBuilder: &ports.UpdateOpts{},
ExtraDHCPOpts: updateExtraDHCPOpts,
}
log.Printf("[DEBUG] Updating openstack_networking_port_v2 %s with options: %#v", d.Id(), dhcpUpdateOpts)
_, err = ports.Update(networkingClient, d.Id(), dhcpUpdateOpts).Extract()
if err != nil {
return fmt.Errorf("Error updating openstack_networking_port_v2 %s: %s", d.Id(), err)
}
}
}
// Next, perform any required updates to the tags.
if d.HasChange("tags") {
tags := networkV2UpdateAttributesTags(d)
tagOpts := attributestags.ReplaceAllOpts{Tags: tags}
tags, err := attributestags.ReplaceAll(networkingClient, "ports", d.Id(), tagOpts).Extract()
if err != nil {
return fmt.Errorf("Error setting tags on openstack_networking_port_v2 %s: %s", d.Id(), err)
}
log.Printf("[DEBUG] Set tags %s on openstack_networking_port_v2 %s", tags, d.Id())
}
return resourceNetworkingPortV2Read(d, meta)
}
func resourceNetworkingPortV2Delete(d *schema.ResourceData, meta interface{}) error {
config := meta.(*Config)
networkingClient, err := config.networkingV2Client(GetRegion(d, config))
if err != nil {
return fmt.Errorf("Error creating OpenStack networking client: %s", err)
}
if err := ports.Delete(networkingClient, d.Id()).ExtractErr(); err != nil {
return CheckDeleted(d, err, "Error deleting openstack_networking_port_v2")
}
stateConf := &resource.StateChangeConf{
Pending: []string{"ACTIVE"},
Target: []string{"DELETED"},
Refresh: resourceNetworkingPortV2StateRefreshFunc(networkingClient, d.Id()),
Timeout: d.Timeout(schema.TimeoutDelete),
Delay: 5 * time.Second,
MinTimeout: 3 * time.Second,
}
_, err = stateConf.WaitForState()
if err != nil {
return fmt.Errorf("Error waiting for openstack_networking_port_v2 %s to delete: %s", d.Id(), err)
}
d.SetId("")
return nil
}