mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-06 14:13:16 -06:00
e3e8261857
* provider/azurerm: support import of virtual_machine TF_ACC=1 go test ./builtin/providers/azurerm -v -run "TestAccAzureRMVirtualMachine_(basic|import)" -timeout 120m === RUN TestAccAzureRMVirtualMachine_importBasic --- PASS: TestAccAzureRMVirtualMachine_importBasic (561.08s) === RUN TestAccAzureRMVirtualMachine_basicLinuxMachine --- PASS: TestAccAzureRMVirtualMachine_basicLinuxMachine (677.49s) === RUN TestAccAzureRMVirtualMachine_basicLinuxMachine_disappears --- PASS: TestAccAzureRMVirtualMachine_basicLinuxMachine_disappears (674.21s) === RUN TestAccAzureRMVirtualMachine_basicWindowsMachine --- PASS: TestAccAzureRMVirtualMachine_basicWindowsMachine (1105.18s) PASS ok github.com/hashicorp/terraform/builtin/providers/azurerm 3017.970s * provider/azurerm: support import of servicebus_namespace TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMServiceBusNamespace_import -timeout 120m === RUN TestAccAzureRMServiceBusNamespace_importBasic --- PASS: TestAccAzureRMServiceBusNamespace_importBasic (345.80s) PASS ok github.com/hashicorp/terraform/builtin/providers/azurerm 345.879s * provider/azurerm: document import of servicebus_topic and servicebus_subscription * provider/azurerm: support import of dns record resources TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMDns[A-z]+Record_importBasic -timeout 120m === RUN TestAccAzureRMDnsARecord_importBasic --- PASS: TestAccAzureRMDnsARecord_importBasic (102.84s) === RUN TestAccAzureRMDnsAAAARecord_importBasic --- PASS: TestAccAzureRMDnsAAAARecord_importBasic (100.59s) === RUN TestAccAzureRMDnsCNameRecord_importBasic --- PASS: TestAccAzureRMDnsCNameRecord_importBasic (98.94s) === RUN TestAccAzureRMDnsMxRecord_importBasic --- PASS: TestAccAzureRMDnsMxRecord_importBasic (107.30s) === RUN TestAccAzureRMDnsNsRecord_importBasic --- PASS: TestAccAzureRMDnsNsRecord_importBasic (98.55s) === RUN TestAccAzureRMDnsSrvRecord_importBasic --- PASS: TestAccAzureRMDnsSrvRecord_importBasic (100.19s) === RUN TestAccAzureRMDnsTxtRecord_importBasic --- PASS: TestAccAzureRMDnsTxtRecord_importBasic (97.49s) PASS ok github.com/hashicorp/terraform/builtin/providers/azurerm 706.000s * provider/azurerm: support import of cdn_endpoint, document profile import TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMCdnEndpoint_import -timeout 120m === RUN TestAccAzureRMCdnEndpoint_importWithTags --- PASS: TestAccAzureRMCdnEndpoint_importWithTags (207.83s) PASS ok github.com/hashicorp/terraform/builtin/providers/azurerm 207.907s * provider/azurerm: support import of sql_server, fix sql_firewall import TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMSql[A-z]+_importBasic -timeout 120m === RUN TestAccAzureRMSqlFirewallRule_importBasic --- PASS: TestAccAzureRMSqlFirewallRule_importBasic (153.72s) === RUN TestAccAzureRMSqlServer_importBasic --- PASS: TestAccAzureRMSqlServer_importBasic (119.83s) PASS ok github.com/hashicorp/terraform/builtin/providers/azurerm 273.630s
148 lines
4.1 KiB
Go
148 lines
4.1 KiB
Go
package azurerm
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
"github.com/jen20/riviera/azure"
|
|
"github.com/jen20/riviera/sql"
|
|
)
|
|
|
|
func resourceArmSqlFirewallRule() *schema.Resource {
|
|
return &schema.Resource{
|
|
Create: resourceArmSqlFirewallRuleCreate,
|
|
Read: resourceArmSqlFirewallRuleRead,
|
|
Update: resourceArmSqlFirewallRuleCreate,
|
|
Delete: resourceArmSqlFirewallRuleDelete,
|
|
Importer: &schema.ResourceImporter{
|
|
State: schema.ImportStatePassthrough,
|
|
},
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
|
|
"resource_group_name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
|
|
"server_name": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
|
|
"start_ip_address": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
|
|
"end_ip_address": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func resourceArmSqlFirewallRuleCreate(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ArmClient)
|
|
rivieraClient := client.rivieraClient
|
|
|
|
createRequest := rivieraClient.NewRequest()
|
|
createRequest.Command = &sql.CreateOrUpdateFirewallRule{
|
|
Name: d.Get("name").(string),
|
|
ResourceGroupName: d.Get("resource_group_name").(string),
|
|
ServerName: d.Get("server_name").(string),
|
|
StartIPAddress: azure.String(d.Get("start_ip_address").(string)),
|
|
EndIPAddress: azure.String(d.Get("end_ip_address").(string)),
|
|
}
|
|
|
|
createResponse, err := createRequest.Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("Error creating SQL Server Firewall Rule: %s", err)
|
|
}
|
|
if !createResponse.IsSuccessful() {
|
|
return fmt.Errorf("Error creating SQL Server Firewall Rule: %s", createResponse.Error)
|
|
}
|
|
|
|
readRequest := rivieraClient.NewRequest()
|
|
readRequest.Command = &sql.GetFirewallRule{
|
|
Name: d.Get("name").(string),
|
|
ResourceGroupName: d.Get("resource_group_name").(string),
|
|
ServerName: d.Get("server_name").(string),
|
|
}
|
|
|
|
readResponse, err := readRequest.Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("Error reading SQL Server Firewall Rule: %s", err)
|
|
}
|
|
if !readResponse.IsSuccessful() {
|
|
return fmt.Errorf("Error reading SQL Server Firewall Rule: %s", readResponse.Error)
|
|
}
|
|
|
|
resp := readResponse.Parsed.(*sql.GetFirewallRuleResponse)
|
|
d.SetId(*resp.ID)
|
|
|
|
return resourceArmSqlFirewallRuleRead(d, meta)
|
|
}
|
|
|
|
func resourceArmSqlFirewallRuleRead(d *schema.ResourceData, meta interface{}) error {
|
|
id, err := parseAzureResourceID(d.Id())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
resGroup := id.ResourceGroup
|
|
|
|
client := meta.(*ArmClient)
|
|
rivieraClient := client.rivieraClient
|
|
|
|
readRequest := rivieraClient.NewRequestForURI(d.Id())
|
|
readRequest.Command = &sql.GetFirewallRule{}
|
|
|
|
readResponse, err := readRequest.Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("Error reading SQL Server Firewall Rule: %s", err)
|
|
}
|
|
if !readResponse.IsSuccessful() {
|
|
log.Printf("[INFO] Error reading SQL Server Firewall Rule %q - removing from state", d.Id())
|
|
d.SetId("")
|
|
return fmt.Errorf("Error reading SQL Server Firewall Rule: %s", readResponse.Error)
|
|
}
|
|
|
|
resp := readResponse.Parsed.(*sql.GetFirewallRuleResponse)
|
|
|
|
d.Set("resource_group_name", resGroup)
|
|
d.Set("location", azureRMNormalizeLocation(*resp.Location))
|
|
d.Set("name", resp.Name)
|
|
d.Set("server_name", id.Path["servers"])
|
|
d.Set("start_ip_address", resp.StartIPAddress)
|
|
d.Set("end_ip_address", resp.EndIPAddress)
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceArmSqlFirewallRuleDelete(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ArmClient)
|
|
rivieraClient := client.rivieraClient
|
|
|
|
deleteRequest := rivieraClient.NewRequestForURI(d.Id())
|
|
deleteRequest.Command = &sql.DeleteFirewallRule{}
|
|
|
|
deleteResponse, err := deleteRequest.Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("Error deleting SQL Server Firewall Rule: %s", err)
|
|
}
|
|
if !deleteResponse.IsSuccessful() {
|
|
return fmt.Errorf("Error deleting SQL Server Firewall Rule: %s", deleteResponse.Error)
|
|
}
|
|
|
|
return nil
|
|
}
|