github.com/danp/terraform@v0.9.5-0.20170426144147-39d740081351/builtin/providers/azurerm/resource_arm_loadbalancer_rule.go (about) 1 package azurerm 2 3 import ( 4 "fmt" 5 "log" 6 "regexp" 7 "time" 8 9 "github.com/Azure/azure-sdk-for-go/arm/network" 10 "github.com/hashicorp/errwrap" 11 "github.com/hashicorp/terraform/helper/resource" 12 "github.com/hashicorp/terraform/helper/schema" 13 "github.com/jen20/riviera/azure" 14 ) 15 16 func resourceArmLoadBalancerRule() *schema.Resource { 17 return &schema.Resource{ 18 Create: resourceArmLoadBalancerRuleCreate, 19 Read: resourceArmLoadBalancerRuleRead, 20 Update: resourceArmLoadBalancerRuleCreate, 21 Delete: resourceArmLoadBalancerRuleDelete, 22 Importer: &schema.ResourceImporter{ 23 State: loadBalancerSubResourceStateImporter, 24 }, 25 26 Schema: map[string]*schema.Schema{ 27 "name": { 28 Type: schema.TypeString, 29 Required: true, 30 ForceNew: true, 31 ValidateFunc: validateArmLoadBalancerRuleName, 32 }, 33 34 "location": { 35 Type: schema.TypeString, 36 ForceNew: true, 37 Optional: true, 38 StateFunc: azureRMNormalizeLocation, 39 DiffSuppressFunc: azureRMSuppressLocationDiff, 40 Deprecated: "location is no longer used", 41 }, 42 43 "resource_group_name": { 44 Type: schema.TypeString, 45 Required: true, 46 ForceNew: true, 47 }, 48 49 "loadbalancer_id": { 50 Type: schema.TypeString, 51 Required: true, 52 ForceNew: true, 53 }, 54 55 "frontend_ip_configuration_name": { 56 Type: schema.TypeString, 57 Required: true, 58 }, 59 60 "frontend_ip_configuration_id": { 61 Type: schema.TypeString, 62 Computed: true, 63 }, 64 65 "backend_address_pool_id": { 66 Type: schema.TypeString, 67 Optional: true, 68 Computed: true, 69 }, 70 71 "protocol": { 72 Type: schema.TypeString, 73 Required: true, 74 StateFunc: ignoreCaseStateFunc, 75 DiffSuppressFunc: ignoreCaseDiffSuppressFunc, 76 }, 77 78 "frontend_port": { 79 Type: schema.TypeInt, 80 Required: true, 81 }, 82 83 "backend_port": { 84 Type: schema.TypeInt, 85 Required: true, 86 }, 87 88 "probe_id": { 89 Type: schema.TypeString, 90 Optional: true, 91 Computed: true, 92 }, 93 94 "enable_floating_ip": { 95 Type: schema.TypeBool, 96 Optional: true, 97 Default: false, 98 }, 99 100 "idle_timeout_in_minutes": { 101 Type: schema.TypeInt, 102 Optional: true, 103 Computed: true, 104 }, 105 106 "load_distribution": { 107 Type: schema.TypeString, 108 Optional: true, 109 Computed: true, 110 }, 111 }, 112 } 113 } 114 115 func resourceArmLoadBalancerRuleCreate(d *schema.ResourceData, meta interface{}) error { 116 client := meta.(*ArmClient) 117 lbClient := client.loadBalancerClient 118 119 loadBalancerID := d.Get("loadbalancer_id").(string) 120 armMutexKV.Lock(loadBalancerID) 121 defer armMutexKV.Unlock(loadBalancerID) 122 123 loadBalancer, exists, err := retrieveLoadBalancerById(loadBalancerID, meta) 124 if err != nil { 125 return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err) 126 } 127 if !exists { 128 d.SetId("") 129 log.Printf("[INFO] LoadBalancer %q not found. Removing from state", d.Get("name").(string)) 130 return nil 131 } 132 133 newLbRule, err := expandAzureRmLoadBalancerRule(d, loadBalancer) 134 if err != nil { 135 return errwrap.Wrapf("Error Exanding LoadBalancer Rule {{err}}", err) 136 } 137 138 lbRules := append(*loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules, *newLbRule) 139 140 existingRule, existingRuleIndex, exists := findLoadBalancerRuleByName(loadBalancer, d.Get("name").(string)) 141 if exists { 142 if d.Get("name").(string) == *existingRule.Name { 143 // this rule is being updated/reapplied remove old copy from the slice 144 lbRules = append(lbRules[:existingRuleIndex], lbRules[existingRuleIndex+1:]...) 145 } 146 } 147 148 loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules = &lbRules 149 resGroup, loadBalancerName, err := resourceGroupAndLBNameFromId(d.Get("loadbalancer_id").(string)) 150 if err != nil { 151 return errwrap.Wrapf("Error Getting LoadBalancer Name and Group: {{err}}", err) 152 } 153 154 _, err = lbClient.CreateOrUpdate(resGroup, loadBalancerName, *loadBalancer, make(chan struct{})) 155 if err != nil { 156 return errwrap.Wrapf("Error Creating/Updating LoadBalancer {{err}}", err) 157 } 158 159 read, err := lbClient.Get(resGroup, loadBalancerName, "") 160 if err != nil { 161 return errwrap.Wrapf("Error Getting LoadBalancer {{err}}", err) 162 } 163 if read.ID == nil { 164 return fmt.Errorf("Cannot read LoadBalancer %s (resource group %s) ID", loadBalancerName, resGroup) 165 } 166 167 var rule_id string 168 for _, LoadBalancingRule := range *(*read.LoadBalancerPropertiesFormat).LoadBalancingRules { 169 if *LoadBalancingRule.Name == d.Get("name").(string) { 170 rule_id = *LoadBalancingRule.ID 171 } 172 } 173 174 if rule_id != "" { 175 d.SetId(rule_id) 176 } else { 177 return fmt.Errorf("Cannot find created LoadBalancer Rule ID %q", rule_id) 178 } 179 180 log.Printf("[DEBUG] Waiting for LoadBalancer (%s) to become available", loadBalancerName) 181 stateConf := &resource.StateChangeConf{ 182 Pending: []string{"Accepted", "Updating"}, 183 Target: []string{"Succeeded"}, 184 Refresh: loadbalancerStateRefreshFunc(client, resGroup, loadBalancerName), 185 Timeout: 10 * time.Minute, 186 } 187 if _, err := stateConf.WaitForState(); err != nil { 188 return fmt.Errorf("Error waiting for LoadBalancer (%s) to become available: %s", loadBalancerName, err) 189 } 190 191 return resourceArmLoadBalancerRuleRead(d, meta) 192 } 193 194 func resourceArmLoadBalancerRuleRead(d *schema.ResourceData, meta interface{}) error { 195 id, err := parseAzureResourceID(d.Id()) 196 if err != nil { 197 return err 198 } 199 name := id.Path["loadBalancingRules"] 200 201 loadBalancer, exists, err := retrieveLoadBalancerById(d.Get("loadbalancer_id").(string), meta) 202 if err != nil { 203 return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err) 204 } 205 if !exists { 206 d.SetId("") 207 log.Printf("[INFO] LoadBalancer %q not found. Removing from state", name) 208 return nil 209 } 210 211 config, _, exists := findLoadBalancerRuleByName(loadBalancer, name) 212 if !exists { 213 d.SetId("") 214 log.Printf("[INFO] LoadBalancer Rule %q not found. Removing from state", name) 215 return nil 216 } 217 218 d.Set("name", config.Name) 219 d.Set("resource_group_name", id.ResourceGroup) 220 221 d.Set("protocol", config.LoadBalancingRulePropertiesFormat.Protocol) 222 d.Set("frontend_port", config.LoadBalancingRulePropertiesFormat.FrontendPort) 223 d.Set("backend_port", config.LoadBalancingRulePropertiesFormat.BackendPort) 224 225 if config.LoadBalancingRulePropertiesFormat.EnableFloatingIP != nil { 226 d.Set("enable_floating_ip", config.LoadBalancingRulePropertiesFormat.EnableFloatingIP) 227 } 228 229 if config.LoadBalancingRulePropertiesFormat.IdleTimeoutInMinutes != nil { 230 d.Set("idle_timeout_in_minutes", config.LoadBalancingRulePropertiesFormat.IdleTimeoutInMinutes) 231 } 232 233 if config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration != nil { 234 fipID, err := parseAzureResourceID(*config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration.ID) 235 if err != nil { 236 return err 237 } 238 239 d.Set("frontend_ip_configuration_name", fipID.Path["frontendIPConfigurations"]) 240 d.Set("frontend_ip_configuration_id", config.LoadBalancingRulePropertiesFormat.FrontendIPConfiguration.ID) 241 } 242 243 if config.LoadBalancingRulePropertiesFormat.BackendAddressPool != nil { 244 d.Set("backend_address_pool_id", config.LoadBalancingRulePropertiesFormat.BackendAddressPool.ID) 245 } 246 247 if config.LoadBalancingRulePropertiesFormat.Probe != nil { 248 d.Set("probe_id", config.LoadBalancingRulePropertiesFormat.Probe.ID) 249 } 250 251 if config.LoadBalancingRulePropertiesFormat.LoadDistribution != "" { 252 d.Set("load_distribution", config.LoadBalancingRulePropertiesFormat.LoadDistribution) 253 } 254 255 return nil 256 } 257 258 func resourceArmLoadBalancerRuleDelete(d *schema.ResourceData, meta interface{}) error { 259 client := meta.(*ArmClient) 260 lbClient := client.loadBalancerClient 261 262 loadBalancerID := d.Get("loadbalancer_id").(string) 263 armMutexKV.Lock(loadBalancerID) 264 defer armMutexKV.Unlock(loadBalancerID) 265 266 loadBalancer, exists, err := retrieveLoadBalancerById(loadBalancerID, meta) 267 if err != nil { 268 return errwrap.Wrapf("Error Getting LoadBalancer By ID {{err}}", err) 269 } 270 if !exists { 271 d.SetId("") 272 return nil 273 } 274 275 _, index, exists := findLoadBalancerRuleByName(loadBalancer, d.Get("name").(string)) 276 if !exists { 277 return nil 278 } 279 280 oldLbRules := *loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules 281 newLbRules := append(oldLbRules[:index], oldLbRules[index+1:]...) 282 loadBalancer.LoadBalancerPropertiesFormat.LoadBalancingRules = &newLbRules 283 284 resGroup, loadBalancerName, err := resourceGroupAndLBNameFromId(d.Get("loadbalancer_id").(string)) 285 if err != nil { 286 return errwrap.Wrapf("Error Getting LoadBalancer Name and Group: {{err}}", err) 287 } 288 289 _, err = lbClient.CreateOrUpdate(resGroup, loadBalancerName, *loadBalancer, make(chan struct{})) 290 if err != nil { 291 return errwrap.Wrapf("Error Creating/Updating LoadBalancer {{err}}", err) 292 } 293 294 read, err := lbClient.Get(resGroup, loadBalancerName, "") 295 if err != nil { 296 return errwrap.Wrapf("Error Getting LoadBalancer {{err}}", err) 297 } 298 if read.ID == nil { 299 return fmt.Errorf("Cannot read LoadBalancer %s (resource group %s) ID", loadBalancerName, resGroup) 300 } 301 302 return nil 303 } 304 305 func expandAzureRmLoadBalancerRule(d *schema.ResourceData, lb *network.LoadBalancer) (*network.LoadBalancingRule, error) { 306 307 properties := network.LoadBalancingRulePropertiesFormat{ 308 Protocol: network.TransportProtocol(d.Get("protocol").(string)), 309 FrontendPort: azure.Int32(int32(d.Get("frontend_port").(int))), 310 BackendPort: azure.Int32(int32(d.Get("backend_port").(int))), 311 EnableFloatingIP: azure.Bool(d.Get("enable_floating_ip").(bool)), 312 } 313 314 if v, ok := d.GetOk("idle_timeout_in_minutes"); ok { 315 properties.IdleTimeoutInMinutes = azure.Int32(int32(v.(int))) 316 } 317 318 if v := d.Get("load_distribution").(string); v != "" { 319 properties.LoadDistribution = network.LoadDistribution(v) 320 } 321 322 if v := d.Get("frontend_ip_configuration_name").(string); v != "" { 323 rule, _, exists := findLoadBalancerFrontEndIpConfigurationByName(lb, v) 324 if !exists { 325 return nil, fmt.Errorf("[ERROR] Cannot find FrontEnd IP Configuration with the name %s", v) 326 } 327 328 feip := network.SubResource{ 329 ID: rule.ID, 330 } 331 332 properties.FrontendIPConfiguration = &feip 333 } 334 335 if v := d.Get("backend_address_pool_id").(string); v != "" { 336 beAP := network.SubResource{ 337 ID: &v, 338 } 339 340 properties.BackendAddressPool = &beAP 341 } 342 343 if v := d.Get("probe_id").(string); v != "" { 344 pid := network.SubResource{ 345 ID: &v, 346 } 347 348 properties.Probe = &pid 349 } 350 351 lbRule := network.LoadBalancingRule{ 352 Name: azure.String(d.Get("name").(string)), 353 LoadBalancingRulePropertiesFormat: &properties, 354 } 355 356 return &lbRule, nil 357 } 358 359 func validateArmLoadBalancerRuleName(v interface{}, k string) (ws []string, errors []error) { 360 value := v.(string) 361 if !regexp.MustCompile(`^[a-zA-Z_0-9.-]+$`).MatchString(value) { 362 errors = append(errors, fmt.Errorf( 363 "only word characters, numbers, underscores, periods, and hyphens allowed in %q: %q", 364 k, value)) 365 } 366 367 if len(value) > 80 { 368 errors = append(errors, fmt.Errorf( 369 "%q cannot be longer than 80 characters: %q", k, value)) 370 } 371 372 if len(value) == 0 { 373 errors = append(errors, fmt.Errorf( 374 "%q cannot be an empty string: %q", k, value)) 375 } 376 if !regexp.MustCompile(`[a-zA-Z0-9_]$`).MatchString(value) { 377 errors = append(errors, fmt.Errorf( 378 "%q must end with a word character, number, or underscore: %q", k, value)) 379 } 380 381 if !regexp.MustCompile(`^[a-zA-Z0-9]`).MatchString(value) { 382 errors = append(errors, fmt.Errorf( 383 "%q must start with a word character or number: %q", k, value)) 384 } 385 386 return 387 }