github.com/inge4pres/terraform@v0.7.5-0.20160930053151-bd083f84f376/builtin/providers/aws/resource_aws_vpc_endpoint.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "log" 6 7 "github.com/aws/aws-sdk-go/aws" 8 "github.com/aws/aws-sdk-go/aws/awserr" 9 "github.com/aws/aws-sdk-go/service/ec2" 10 "github.com/hashicorp/errwrap" 11 "github.com/hashicorp/terraform/helper/schema" 12 ) 13 14 func resourceAwsVpcEndpoint() *schema.Resource { 15 return &schema.Resource{ 16 Create: resourceAwsVPCEndpointCreate, 17 Read: resourceAwsVPCEndpointRead, 18 Update: resourceAwsVPCEndpointUpdate, 19 Delete: resourceAwsVPCEndpointDelete, 20 Importer: &schema.ResourceImporter{ 21 State: schema.ImportStatePassthrough, 22 }, 23 24 Schema: map[string]*schema.Schema{ 25 "policy": &schema.Schema{ 26 Type: schema.TypeString, 27 Optional: true, 28 Computed: true, 29 ValidateFunc: validateJsonString, 30 StateFunc: func(v interface{}) string { 31 json, _ := normalizeJsonString(v) 32 return json 33 }, 34 }, 35 "vpc_id": &schema.Schema{ 36 Type: schema.TypeString, 37 Required: true, 38 ForceNew: true, 39 }, 40 "service_name": &schema.Schema{ 41 Type: schema.TypeString, 42 Required: true, 43 ForceNew: true, 44 }, 45 "route_table_ids": &schema.Schema{ 46 Type: schema.TypeSet, 47 Optional: true, 48 Elem: &schema.Schema{Type: schema.TypeString}, 49 Set: schema.HashString, 50 }, 51 "prefix_list_id": &schema.Schema{ 52 Type: schema.TypeString, 53 Computed: true, 54 }, 55 }, 56 } 57 } 58 59 func resourceAwsVPCEndpointCreate(d *schema.ResourceData, meta interface{}) error { 60 conn := meta.(*AWSClient).ec2conn 61 input := &ec2.CreateVpcEndpointInput{ 62 VpcId: aws.String(d.Get("vpc_id").(string)), 63 RouteTableIds: expandStringList(d.Get("route_table_ids").(*schema.Set).List()), 64 ServiceName: aws.String(d.Get("service_name").(string)), 65 } 66 67 if v, ok := d.GetOk("policy"); ok { 68 policy, err := normalizeJsonString(v) 69 if err != nil { 70 return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err) 71 } 72 input.PolicyDocument = aws.String(policy) 73 } 74 75 log.Printf("[DEBUG] Creating VPC Endpoint: %#v", input) 76 output, err := conn.CreateVpcEndpoint(input) 77 if err != nil { 78 return fmt.Errorf("Error creating VPC Endpoint: %s", err) 79 } 80 log.Printf("[DEBUG] VPC Endpoint %q created.", *output.VpcEndpoint.VpcEndpointId) 81 82 d.SetId(*output.VpcEndpoint.VpcEndpointId) 83 84 return resourceAwsVPCEndpointRead(d, meta) 85 } 86 87 func resourceAwsVPCEndpointRead(d *schema.ResourceData, meta interface{}) error { 88 conn := meta.(*AWSClient).ec2conn 89 input := &ec2.DescribeVpcEndpointsInput{ 90 VpcEndpointIds: []*string{aws.String(d.Id())}, 91 } 92 93 log.Printf("[DEBUG] Reading VPC Endpoint: %q", d.Id()) 94 output, err := conn.DescribeVpcEndpoints(input) 95 96 if err != nil { 97 ec2err, ok := err.(awserr.Error) 98 if !ok { 99 return fmt.Errorf("Error reading VPC Endpoint: %s", err.Error()) 100 } 101 102 if ec2err.Code() == "InvalidVpcEndpointId.NotFound" { 103 return nil 104 } 105 106 return fmt.Errorf("Error reading VPC Endpoint: %s", err.Error()) 107 } 108 109 if len(output.VpcEndpoints) != 1 { 110 return fmt.Errorf("There's no unique VPC Endpoint, but %d endpoints: %#v", 111 len(output.VpcEndpoints), output.VpcEndpoints) 112 } 113 114 vpce := output.VpcEndpoints[0] 115 116 // A VPC Endpoint is associated with exactly one prefix list name (also called Service Name). 117 // The prefix list ID can be used in security groups, so retrieve it to support that capability. 118 prefixListServiceName := *vpce.ServiceName 119 prefixListInput := &ec2.DescribePrefixListsInput{ 120 Filters: []*ec2.Filter{ 121 {Name: aws.String("prefix-list-name"), Values: []*string{aws.String(prefixListServiceName)}}, 122 }, 123 } 124 125 log.Printf("[DEBUG] Reading VPC Endpoint prefix list: %s", prefixListServiceName) 126 prefixListsOutput, err := conn.DescribePrefixLists(prefixListInput) 127 128 if err != nil { 129 _, ok := err.(awserr.Error) 130 if !ok { 131 return fmt.Errorf("Error reading VPC Endpoint prefix list: %s", err.Error()) 132 } 133 } 134 135 if len(prefixListsOutput.PrefixLists) != 1 { 136 return fmt.Errorf("There are multiple prefix lists associated with the service name '%s'. Unexpected", prefixListServiceName) 137 } 138 139 policy, err := normalizeJsonString(*vpce.PolicyDocument) 140 if err != nil { 141 return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err) 142 } 143 144 d.Set("vpc_id", vpce.VpcId) 145 d.Set("policy", policy) 146 d.Set("service_name", vpce.ServiceName) 147 if err := d.Set("route_table_ids", aws.StringValueSlice(vpce.RouteTableIds)); err != nil { 148 return err 149 } 150 d.Set("prefix_list_id", prefixListsOutput.PrefixLists[0].PrefixListId) 151 152 return nil 153 } 154 155 func resourceAwsVPCEndpointUpdate(d *schema.ResourceData, meta interface{}) error { 156 conn := meta.(*AWSClient).ec2conn 157 input := &ec2.ModifyVpcEndpointInput{ 158 VpcEndpointId: aws.String(d.Id()), 159 } 160 161 if d.HasChange("route_table_ids") { 162 o, n := d.GetChange("route_table_ids") 163 os := o.(*schema.Set) 164 ns := n.(*schema.Set) 165 166 add := expandStringList(ns.Difference(os).List()) 167 if len(add) > 0 { 168 input.AddRouteTableIds = add 169 } 170 171 remove := expandStringList(os.Difference(ns).List()) 172 if len(remove) > 0 { 173 input.RemoveRouteTableIds = remove 174 } 175 } 176 177 if d.HasChange("policy") { 178 policy, err := normalizeJsonString(d.Get("policy")) 179 if err != nil { 180 return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err) 181 } 182 input.PolicyDocument = aws.String(policy) 183 } 184 185 log.Printf("[DEBUG] Updating VPC Endpoint: %#v", input) 186 _, err := conn.ModifyVpcEndpoint(input) 187 if err != nil { 188 return fmt.Errorf("Error updating VPC Endpoint: %s", err) 189 } 190 log.Printf("[DEBUG] VPC Endpoint %q updated", input.VpcEndpointId) 191 192 return resourceAwsVPCEndpointRead(d, meta) 193 } 194 195 func resourceAwsVPCEndpointDelete(d *schema.ResourceData, meta interface{}) error { 196 conn := meta.(*AWSClient).ec2conn 197 input := &ec2.DeleteVpcEndpointsInput{ 198 VpcEndpointIds: []*string{aws.String(d.Id())}, 199 } 200 201 log.Printf("[DEBUG] Deleting VPC Endpoint: %#v", input) 202 _, err := conn.DeleteVpcEndpoints(input) 203 204 if err != nil { 205 ec2err, ok := err.(awserr.Error) 206 if !ok { 207 return fmt.Errorf("Error deleting VPC Endpoint: %s", err.Error()) 208 } 209 210 if ec2err.Code() == "InvalidVpcEndpointId.NotFound" { 211 log.Printf("[DEBUG] VPC Endpoint %q is already gone", d.Id()) 212 } else { 213 return fmt.Errorf("Error deleting VPC Endpoint: %s", err.Error()) 214 } 215 } 216 217 log.Printf("[DEBUG] VPC Endpoint %q deleted", d.Id()) 218 d.SetId("") 219 220 return nil 221 }