mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-09 23:54:17 -06:00
410 lines
10 KiB
Go
410 lines
10 KiB
Go
package cloudstack
|
|
|
|
import (
|
|
"fmt"
|
|
"log"
|
|
"sync"
|
|
"time"
|
|
|
|
"strconv"
|
|
"strings"
|
|
|
|
"github.com/hashicorp/go-multierror"
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
"github.com/xanzy/go-cloudstack/cloudstack"
|
|
)
|
|
|
|
func resourceCloudStackPortForward() *schema.Resource {
|
|
return &schema.Resource{
|
|
Create: resourceCloudStackPortForwardCreate,
|
|
Read: resourceCloudStackPortForwardRead,
|
|
Update: resourceCloudStackPortForwardUpdate,
|
|
Delete: resourceCloudStackPortForwardDelete,
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
"ip_address_id": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
ForceNew: true,
|
|
},
|
|
|
|
"managed": &schema.Schema{
|
|
Type: schema.TypeBool,
|
|
Optional: true,
|
|
Default: false,
|
|
},
|
|
|
|
"project": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Optional: true,
|
|
ForceNew: true,
|
|
},
|
|
|
|
"forward": &schema.Schema{
|
|
Type: schema.TypeSet,
|
|
Required: true,
|
|
Elem: &schema.Resource{
|
|
Schema: map[string]*schema.Schema{
|
|
"protocol": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
|
|
"private_port": &schema.Schema{
|
|
Type: schema.TypeInt,
|
|
Required: true,
|
|
},
|
|
|
|
"public_port": &schema.Schema{
|
|
Type: schema.TypeInt,
|
|
Required: true,
|
|
},
|
|
|
|
"virtual_machine_id": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Required: true,
|
|
},
|
|
|
|
"uuid": &schema.Schema{
|
|
Type: schema.TypeString,
|
|
Computed: true,
|
|
},
|
|
},
|
|
},
|
|
},
|
|
},
|
|
}
|
|
}
|
|
|
|
func resourceCloudStackPortForwardCreate(d *schema.ResourceData, meta interface{}) error {
|
|
// We need to set this upfront in order to be able to save a partial state
|
|
d.SetId(d.Get("ip_address_id").(string))
|
|
|
|
// Create all forwards that are configured
|
|
if nrs := d.Get("forward").(*schema.Set); nrs.Len() > 0 {
|
|
// Create an empty schema.Set to hold all forwards
|
|
forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set)
|
|
|
|
err := createPortForwards(d, meta, forwards, nrs)
|
|
|
|
// We need to update this first to preserve the correct state
|
|
d.Set("forward", forwards)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return resourceCloudStackPortForwardRead(d, meta)
|
|
}
|
|
|
|
func createPortForwards(d *schema.ResourceData, meta interface{}, forwards *schema.Set, nrs *schema.Set) error {
|
|
var errs *multierror.Error
|
|
|
|
var wg sync.WaitGroup
|
|
wg.Add(nrs.Len())
|
|
|
|
sem := make(chan struct{}, 10)
|
|
for _, forward := range nrs.List() {
|
|
// Put in a tiny sleep here to avoid DoS'ing the API
|
|
time.Sleep(500 * time.Millisecond)
|
|
|
|
go func(forward map[string]interface{}) {
|
|
defer wg.Done()
|
|
sem <- struct{}{}
|
|
|
|
// Create a single forward
|
|
err := createPortForward(d, meta, forward)
|
|
|
|
// If we have a UUID, we need to save the forward
|
|
if forward["uuid"].(string) != "" {
|
|
forwards.Add(forward)
|
|
}
|
|
|
|
if err != nil {
|
|
errs = multierror.Append(errs, err)
|
|
}
|
|
|
|
<-sem
|
|
}(forward.(map[string]interface{}))
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
return errs.ErrorOrNil()
|
|
}
|
|
|
|
func createPortForward(d *schema.ResourceData, meta interface{}, forward map[string]interface{}) error {
|
|
cs := meta.(*cloudstack.CloudStackClient)
|
|
|
|
// Make sure all required parameters are there
|
|
if err := verifyPortForwardParams(d, forward); err != nil {
|
|
return err
|
|
}
|
|
|
|
vm, _, err := cs.VirtualMachine.GetVirtualMachineByID(
|
|
forward["virtual_machine_id"].(string),
|
|
cloudstack.WithProject(d.Get("project").(string)),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Create a new parameter struct
|
|
p := cs.Firewall.NewCreatePortForwardingRuleParams(d.Id(), forward["private_port"].(int),
|
|
forward["protocol"].(string), forward["public_port"].(int), vm.Id)
|
|
|
|
// Set the network ID of the default network, needed when public IP address
|
|
// is not associated with any Guest network yet (VPC case)
|
|
p.SetNetworkid(vm.Nic[0].Networkid)
|
|
|
|
// Do not open the firewall automatically in any case
|
|
p.SetOpenfirewall(false)
|
|
|
|
r, err := cs.Firewall.CreatePortForwardingRule(p)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
forward["uuid"] = r.Id
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceCloudStackPortForwardRead(d *schema.ResourceData, meta interface{}) error {
|
|
cs := meta.(*cloudstack.CloudStackClient)
|
|
|
|
// First check if the IP address is still associated
|
|
_, count, err := cs.Address.GetPublicIpAddressByID(
|
|
d.Id(),
|
|
cloudstack.WithProject(d.Get("project").(string)),
|
|
)
|
|
if err != nil {
|
|
if count == 0 {
|
|
log.Printf(
|
|
"[DEBUG] IP address with ID %s is no longer associated", d.Id())
|
|
d.SetId("")
|
|
return nil
|
|
}
|
|
|
|
return err
|
|
}
|
|
|
|
// Get all the forwards from the running environment
|
|
p := cs.Firewall.NewListPortForwardingRulesParams()
|
|
p.SetIpaddressid(d.Id())
|
|
p.SetListall(true)
|
|
|
|
if err := setProjectid(p, cs, d); err != nil {
|
|
return err
|
|
}
|
|
|
|
l, err := cs.Firewall.ListPortForwardingRules(p)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Make a map of all the forwards so we can easily find a forward
|
|
forwardMap := make(map[string]*cloudstack.PortForwardingRule, l.Count)
|
|
for _, f := range l.PortForwardingRules {
|
|
forwardMap[f.Id] = f
|
|
}
|
|
|
|
// Create an empty schema.Set to hold all forwards
|
|
forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set)
|
|
|
|
// Read all forwards that are configured
|
|
if rs := d.Get("forward").(*schema.Set); rs.Len() > 0 {
|
|
for _, forward := range rs.List() {
|
|
forward := forward.(map[string]interface{})
|
|
|
|
id, ok := forward["uuid"]
|
|
if !ok || id.(string) == "" {
|
|
continue
|
|
}
|
|
|
|
// Get the forward
|
|
f, ok := forwardMap[id.(string)]
|
|
if !ok {
|
|
forward["uuid"] = ""
|
|
continue
|
|
}
|
|
|
|
// Delete the known rule so only unknown rules remain in the ruleMap
|
|
delete(forwardMap, id.(string))
|
|
|
|
privPort, err := strconv.Atoi(f.Privateport)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
pubPort, err := strconv.Atoi(f.Publicport)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
// Update the values
|
|
forward["protocol"] = f.Protocol
|
|
forward["private_port"] = privPort
|
|
forward["public_port"] = pubPort
|
|
forward["virtual_machine_id"] = f.Virtualmachineid
|
|
|
|
forwards.Add(forward)
|
|
}
|
|
}
|
|
|
|
// If this is a managed resource, add all unknown forwards to dummy forwards
|
|
managed := d.Get("managed").(bool)
|
|
if managed && len(forwardMap) > 0 {
|
|
for uuid := range forwardMap {
|
|
// Make a dummy forward to hold the unknown UUID
|
|
forward := map[string]interface{}{
|
|
"protocol": uuid,
|
|
"private_port": 0,
|
|
"public_port": 0,
|
|
"virtual_machine_id": uuid,
|
|
"uuid": uuid,
|
|
}
|
|
|
|
// Add the dummy forward to the forwards set
|
|
forwards.Add(forward)
|
|
}
|
|
}
|
|
|
|
if forwards.Len() > 0 {
|
|
d.Set("forward", forwards)
|
|
} else if !managed {
|
|
d.SetId("")
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceCloudStackPortForwardUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
// Check if the forward set as a whole has changed
|
|
if d.HasChange("forward") {
|
|
o, n := d.GetChange("forward")
|
|
ors := o.(*schema.Set).Difference(n.(*schema.Set))
|
|
nrs := n.(*schema.Set).Difference(o.(*schema.Set))
|
|
|
|
// We need to start with a rule set containing all the rules we
|
|
// already have and want to keep. Any rules that are not deleted
|
|
// correctly and any newly created rules, will be added to this
|
|
// set to make sure we end up in a consistent state
|
|
forwards := o.(*schema.Set).Intersection(n.(*schema.Set))
|
|
|
|
// First loop through all the old forwards and delete them
|
|
if ors.Len() > 0 {
|
|
err := deletePortForwards(d, meta, forwards, ors)
|
|
|
|
// We need to update this first to preserve the correct state
|
|
d.Set("forward", forwards)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Then loop through all the new forwards and create them
|
|
if nrs.Len() > 0 {
|
|
err := createPortForwards(d, meta, forwards, nrs)
|
|
|
|
// We need to update this first to preserve the correct state
|
|
d.Set("forward", forwards)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return resourceCloudStackPortForwardRead(d, meta)
|
|
}
|
|
|
|
func resourceCloudStackPortForwardDelete(d *schema.ResourceData, meta interface{}) error {
|
|
// Create an empty rule set to hold all rules that where
|
|
// not deleted correctly
|
|
forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set)
|
|
|
|
// Delete all forwards
|
|
if ors := d.Get("forward").(*schema.Set); ors.Len() > 0 {
|
|
err := deletePortForwards(d, meta, forwards, ors)
|
|
|
|
// We need to update this first to preserve the correct state
|
|
d.Set("forward", forwards)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func deletePortForwards(d *schema.ResourceData, meta interface{}, forwards *schema.Set, ors *schema.Set) error {
|
|
var errs *multierror.Error
|
|
|
|
var wg sync.WaitGroup
|
|
wg.Add(ors.Len())
|
|
|
|
sem := make(chan struct{}, 10)
|
|
for _, forward := range ors.List() {
|
|
// Put a sleep here to avoid DoS'ing the API
|
|
time.Sleep(500 * time.Millisecond)
|
|
|
|
go func(forward map[string]interface{}) {
|
|
defer wg.Done()
|
|
sem <- struct{}{}
|
|
|
|
// Delete a single forward
|
|
err := deletePortForward(d, meta, forward)
|
|
|
|
// If we have a UUID, we need to save the forward
|
|
if forward["uuid"].(string) != "" {
|
|
forwards.Add(forward)
|
|
}
|
|
|
|
if err != nil {
|
|
errs = multierror.Append(errs, err)
|
|
}
|
|
|
|
<-sem
|
|
}(forward.(map[string]interface{}))
|
|
}
|
|
|
|
wg.Wait()
|
|
|
|
return errs.ErrorOrNil()
|
|
}
|
|
|
|
func deletePortForward(d *schema.ResourceData, meta interface{}, forward map[string]interface{}) error {
|
|
cs := meta.(*cloudstack.CloudStackClient)
|
|
|
|
// Create the parameter struct
|
|
p := cs.Firewall.NewDeletePortForwardingRuleParams(forward["uuid"].(string))
|
|
|
|
// Delete the forward
|
|
if _, err := cs.Firewall.DeletePortForwardingRule(p); err != nil {
|
|
// This is a very poor way to be told the ID does no longer exist :(
|
|
if !strings.Contains(err.Error(), fmt.Sprintf(
|
|
"Invalid parameter id value=%s due to incorrect long value format, "+
|
|
"or entity does not exist", forward["uuid"].(string))) {
|
|
return err
|
|
}
|
|
}
|
|
|
|
// Empty the UUID of this rule
|
|
forward["uuid"] = ""
|
|
|
|
return nil
|
|
}
|
|
|
|
func verifyPortForwardParams(d *schema.ResourceData, forward map[string]interface{}) error {
|
|
protocol := forward["protocol"].(string)
|
|
if protocol != "tcp" && protocol != "udp" {
|
|
return fmt.Errorf(
|
|
"%s is not a valid protocol. Valid options are 'tcp' and 'udp'", protocol)
|
|
}
|
|
return nil
|
|
}
|