github.com/danp/terraform@v0.9.5-0.20170426144147-39d740081351/builtin/providers/aws/resource_aws_vpn_gateway.go (about)

     1  package aws
     2  
     3  import (
     4  	"fmt"
     5  	"log"
     6  	"time"
     7  
     8  	"github.com/aws/aws-sdk-go/aws"
     9  	"github.com/aws/aws-sdk-go/aws/awserr"
    10  	"github.com/aws/aws-sdk-go/service/ec2"
    11  	"github.com/hashicorp/terraform/helper/resource"
    12  	"github.com/hashicorp/terraform/helper/schema"
    13  )
    14  
    15  func resourceAwsVpnGateway() *schema.Resource {
    16  	return &schema.Resource{
    17  		Create: resourceAwsVpnGatewayCreate,
    18  		Read:   resourceAwsVpnGatewayRead,
    19  		Update: resourceAwsVpnGatewayUpdate,
    20  		Delete: resourceAwsVpnGatewayDelete,
    21  		Importer: &schema.ResourceImporter{
    22  			State: schema.ImportStatePassthrough,
    23  		},
    24  
    25  		Schema: map[string]*schema.Schema{
    26  			"availability_zone": &schema.Schema{
    27  				Type:     schema.TypeString,
    28  				Optional: true,
    29  				ForceNew: true,
    30  			},
    31  
    32  			"vpc_id": &schema.Schema{
    33  				Type:     schema.TypeString,
    34  				Optional: true,
    35  				Computed: true,
    36  			},
    37  
    38  			"tags": tagsSchema(),
    39  		},
    40  	}
    41  }
    42  
    43  func resourceAwsVpnGatewayCreate(d *schema.ResourceData, meta interface{}) error {
    44  	conn := meta.(*AWSClient).ec2conn
    45  
    46  	createOpts := &ec2.CreateVpnGatewayInput{
    47  		AvailabilityZone: aws.String(d.Get("availability_zone").(string)),
    48  		Type:             aws.String("ipsec.1"),
    49  	}
    50  
    51  	// Create the VPN gateway
    52  	log.Printf("[DEBUG] Creating VPN gateway")
    53  	resp, err := conn.CreateVpnGateway(createOpts)
    54  	if err != nil {
    55  		return fmt.Errorf("Error creating VPN gateway: %s", err)
    56  	}
    57  
    58  	// Get the ID and store it
    59  	vpnGateway := resp.VpnGateway
    60  	d.SetId(*vpnGateway.VpnGatewayId)
    61  	log.Printf("[INFO] VPN Gateway ID: %s", *vpnGateway.VpnGatewayId)
    62  
    63  	// Attach the VPN gateway to the correct VPC
    64  	return resourceAwsVpnGatewayUpdate(d, meta)
    65  }
    66  
    67  func resourceAwsVpnGatewayRead(d *schema.ResourceData, meta interface{}) error {
    68  	conn := meta.(*AWSClient).ec2conn
    69  
    70  	resp, err := conn.DescribeVpnGateways(&ec2.DescribeVpnGatewaysInput{
    71  		VpnGatewayIds: []*string{aws.String(d.Id())},
    72  	})
    73  	if err != nil {
    74  		if ec2err, ok := err.(awserr.Error); ok && ec2err.Code() == "InvalidVpnGatewayID.NotFound" {
    75  			d.SetId("")
    76  			return nil
    77  		} else {
    78  			log.Printf("[ERROR] Error finding VpnGateway: %s", err)
    79  			return err
    80  		}
    81  	}
    82  
    83  	vpnGateway := resp.VpnGateways[0]
    84  	if vpnGateway == nil || *vpnGateway.State == "deleted" {
    85  		// Seems we have lost our VPN gateway
    86  		d.SetId("")
    87  		return nil
    88  	}
    89  
    90  	vpnAttachment := vpnGatewayGetAttachment(vpnGateway)
    91  	if len(vpnGateway.VpcAttachments) == 0 || *vpnAttachment.State == "detached" {
    92  		// Gateway exists but not attached to the VPC
    93  		d.Set("vpc_id", "")
    94  	} else {
    95  		d.Set("vpc_id", *vpnAttachment.VpcId)
    96  	}
    97  
    98  	if vpnGateway.AvailabilityZone != nil && *vpnGateway.AvailabilityZone != "" {
    99  		d.Set("availability_zone", vpnGateway.AvailabilityZone)
   100  	}
   101  	d.Set("tags", tagsToMap(vpnGateway.Tags))
   102  
   103  	return nil
   104  }
   105  
   106  func resourceAwsVpnGatewayUpdate(d *schema.ResourceData, meta interface{}) error {
   107  	if d.HasChange("vpc_id") {
   108  		// If we're already attached, detach it first
   109  		if err := resourceAwsVpnGatewayDetach(d, meta); err != nil {
   110  			return err
   111  		}
   112  
   113  		// Attach the VPN gateway to the new vpc
   114  		if err := resourceAwsVpnGatewayAttach(d, meta); err != nil {
   115  			return err
   116  		}
   117  	}
   118  
   119  	conn := meta.(*AWSClient).ec2conn
   120  
   121  	if err := setTags(conn, d); err != nil {
   122  		return err
   123  	}
   124  
   125  	d.SetPartial("tags")
   126  
   127  	return resourceAwsVpnGatewayRead(d, meta)
   128  }
   129  
   130  func resourceAwsVpnGatewayDelete(d *schema.ResourceData, meta interface{}) error {
   131  	conn := meta.(*AWSClient).ec2conn
   132  
   133  	// Detach if it is attached
   134  	if err := resourceAwsVpnGatewayDetach(d, meta); err != nil {
   135  		return err
   136  	}
   137  
   138  	log.Printf("[INFO] Deleting VPN gateway: %s", d.Id())
   139  
   140  	return resource.Retry(5*time.Minute, func() *resource.RetryError {
   141  		_, err := conn.DeleteVpnGateway(&ec2.DeleteVpnGatewayInput{
   142  			VpnGatewayId: aws.String(d.Id()),
   143  		})
   144  		if err == nil {
   145  			return nil
   146  		}
   147  
   148  		ec2err, ok := err.(awserr.Error)
   149  		if !ok {
   150  			return resource.RetryableError(err)
   151  		}
   152  
   153  		switch ec2err.Code() {
   154  		case "InvalidVpnGatewayID.NotFound":
   155  			return nil
   156  		case "IncorrectState":
   157  			return resource.RetryableError(err)
   158  		}
   159  
   160  		return resource.NonRetryableError(err)
   161  	})
   162  }
   163  
   164  func resourceAwsVpnGatewayAttach(d *schema.ResourceData, meta interface{}) error {
   165  	conn := meta.(*AWSClient).ec2conn
   166  
   167  	if d.Get("vpc_id").(string) == "" {
   168  		log.Printf(
   169  			"[DEBUG] Not attaching VPN Gateway '%s' as no VPC ID is set",
   170  			d.Id())
   171  		return nil
   172  	}
   173  
   174  	log.Printf(
   175  		"[INFO] Attaching VPN Gateway '%s' to VPC '%s'",
   176  		d.Id(),
   177  		d.Get("vpc_id").(string))
   178  
   179  	req := &ec2.AttachVpnGatewayInput{
   180  		VpnGatewayId: aws.String(d.Id()),
   181  		VpcId:        aws.String(d.Get("vpc_id").(string)),
   182  	}
   183  
   184  	err := resource.Retry(30*time.Second, func() *resource.RetryError {
   185  		_, err := conn.AttachVpnGateway(req)
   186  		if err != nil {
   187  			if ec2err, ok := err.(awserr.Error); ok {
   188  				if "InvalidVpnGatewayID.NotFound" == ec2err.Code() {
   189  					return resource.RetryableError(
   190  						fmt.Errorf("Gateway not found, retry for eventual consistancy"))
   191  				}
   192  			}
   193  			return resource.NonRetryableError(err)
   194  		}
   195  		return nil
   196  	})
   197  
   198  	if err != nil {
   199  		return err
   200  	}
   201  
   202  	// Wait for it to be fully attached before continuing
   203  	log.Printf("[DEBUG] Waiting for VPN gateway (%s) to attach", d.Id())
   204  	stateConf := &resource.StateChangeConf{
   205  		Pending: []string{"detached", "attaching"},
   206  		Target:  []string{"attached"},
   207  		Refresh: vpnGatewayAttachStateRefreshFunc(conn, d.Id(), "available"),
   208  		Timeout: 5 * time.Minute,
   209  	}
   210  	if _, err := stateConf.WaitForState(); err != nil {
   211  		return fmt.Errorf(
   212  			"Error waiting for VPN gateway (%s) to attach: %s",
   213  			d.Id(), err)
   214  	}
   215  
   216  	return nil
   217  }
   218  
   219  func resourceAwsVpnGatewayDetach(d *schema.ResourceData, meta interface{}) error {
   220  	conn := meta.(*AWSClient).ec2conn
   221  
   222  	// Get the old VPC ID to detach from
   223  	vpcID, _ := d.GetChange("vpc_id")
   224  
   225  	if vpcID.(string) == "" {
   226  		log.Printf(
   227  			"[DEBUG] Not detaching VPN Gateway '%s' as no VPC ID is set",
   228  			d.Id())
   229  		return nil
   230  	}
   231  
   232  	log.Printf(
   233  		"[INFO] Detaching VPN Gateway '%s' from VPC '%s'",
   234  		d.Id(),
   235  		vpcID.(string))
   236  
   237  	wait := true
   238  	_, err := conn.DetachVpnGateway(&ec2.DetachVpnGatewayInput{
   239  		VpnGatewayId: aws.String(d.Id()),
   240  		VpcId:        aws.String(vpcID.(string)),
   241  	})
   242  	if err != nil {
   243  		ec2err, ok := err.(awserr.Error)
   244  		if ok {
   245  			if ec2err.Code() == "InvalidVpnGatewayID.NotFound" {
   246  				err = nil
   247  				wait = false
   248  			} else if ec2err.Code() == "InvalidVpnGatewayAttachment.NotFound" {
   249  				err = nil
   250  				wait = false
   251  			}
   252  		}
   253  
   254  		if err != nil {
   255  			return err
   256  		}
   257  	}
   258  
   259  	if !wait {
   260  		return nil
   261  	}
   262  
   263  	// Wait for it to be fully detached before continuing
   264  	log.Printf("[DEBUG] Waiting for VPN gateway (%s) to detach", d.Id())
   265  	stateConf := &resource.StateChangeConf{
   266  		Pending: []string{"attached", "detaching", "available"},
   267  		Target:  []string{"detached"},
   268  		Refresh: vpnGatewayAttachStateRefreshFunc(conn, d.Id(), "detached"),
   269  		Timeout: 5 * time.Minute,
   270  	}
   271  	if _, err := stateConf.WaitForState(); err != nil {
   272  		return fmt.Errorf(
   273  			"Error waiting for vpn gateway (%s) to detach: %s",
   274  			d.Id(), err)
   275  	}
   276  
   277  	return nil
   278  }
   279  
   280  // vpnGatewayAttachStateRefreshFunc returns a resource.StateRefreshFunc that is used to watch
   281  // the state of a VPN gateway's attachment
   282  func vpnGatewayAttachStateRefreshFunc(conn *ec2.EC2, id string, expected string) resource.StateRefreshFunc {
   283  	var start time.Time
   284  	return func() (interface{}, string, error) {
   285  		if start.IsZero() {
   286  			start = time.Now()
   287  		}
   288  
   289  		resp, err := conn.DescribeVpnGateways(&ec2.DescribeVpnGatewaysInput{
   290  			VpnGatewayIds: []*string{aws.String(id)},
   291  		})
   292  
   293  		if err != nil {
   294  			if ec2err, ok := err.(awserr.Error); ok && ec2err.Code() == "InvalidVpnGatewayID.NotFound" {
   295  				resp = nil
   296  			} else {
   297  				log.Printf("[ERROR] Error on VpnGatewayStateRefresh: %s", err)
   298  				return nil, "", err
   299  			}
   300  		}
   301  
   302  		if resp == nil {
   303  			// Sometimes AWS just has consistency issues and doesn't see
   304  			// our instance yet. Return an empty state.
   305  			return nil, "", nil
   306  		}
   307  
   308  		vpnGateway := resp.VpnGateways[0]
   309  		if len(vpnGateway.VpcAttachments) == 0 {
   310  			// No attachments, we're detached
   311  			return vpnGateway, "detached", nil
   312  		}
   313  
   314  		vpnAttachment := vpnGatewayGetAttachment(vpnGateway)
   315  		return vpnGateway, *vpnAttachment.State, nil
   316  	}
   317  }
   318  
   319  func vpnGatewayGetAttachment(vgw *ec2.VpnGateway) *ec2.VpcAttachment {
   320  	for _, v := range vgw.VpcAttachments {
   321  		if *v.State == "attached" {
   322  			return v
   323  		}
   324  	}
   325  	return &ec2.VpcAttachment{State: aws.String("detached")}
   326  }