github.com/mohanarpit/terraform@v0.6.16-0.20160909104007-291f29853544/builtin/providers/postgresql/resource_postgresql_role.go (about) 1 package postgresql 2 3 import ( 4 "database/sql" 5 "fmt" 6 7 "github.com/hashicorp/errwrap" 8 "github.com/hashicorp/terraform/helper/schema" 9 "github.com/lib/pq" 10 ) 11 12 func resourcePostgreSQLRole() *schema.Resource { 13 return &schema.Resource{ 14 Create: resourcePostgreSQLRoleCreate, 15 Read: resourcePostgreSQLRoleRead, 16 Update: resourcePostgreSQLRoleUpdate, 17 Delete: resourcePostgreSQLRoleDelete, 18 19 Schema: map[string]*schema.Schema{ 20 "name": { 21 Type: schema.TypeString, 22 Required: true, 23 ForceNew: true, 24 }, 25 "login": { 26 Type: schema.TypeBool, 27 Optional: true, 28 ForceNew: false, 29 Default: false, 30 }, 31 "password": { 32 Type: schema.TypeString, 33 Optional: true, 34 ForceNew: false, 35 }, 36 "encrypted": { 37 Type: schema.TypeBool, 38 Optional: true, 39 ForceNew: false, 40 Default: false, 41 }, 42 }, 43 } 44 } 45 46 func resourcePostgreSQLRoleCreate(d *schema.ResourceData, meta interface{}) error { 47 client := meta.(*Client) 48 conn, err := client.Connect() 49 if err != nil { 50 return err 51 } 52 defer conn.Close() 53 54 roleName := d.Get("name").(string) 55 loginAttr := getLoginStr(d.Get("login").(bool)) 56 password := d.Get("password").(string) 57 58 encryptedCfg := getEncryptedStr(d.Get("encrypted").(bool)) 59 60 query := fmt.Sprintf("CREATE ROLE %s %s %s PASSWORD '%s'", pq.QuoteIdentifier(roleName), loginAttr, encryptedCfg, password) 61 _, err = conn.Query(query) 62 if err != nil { 63 return errwrap.Wrapf("Error creating role: {{err}}", err) 64 } 65 66 d.SetId(roleName) 67 68 return resourcePostgreSQLRoleRead(d, meta) 69 } 70 71 func resourcePostgreSQLRoleDelete(d *schema.ResourceData, meta interface{}) error { 72 client := meta.(*Client) 73 conn, err := client.Connect() 74 if err != nil { 75 return err 76 } 77 defer conn.Close() 78 79 roleName := d.Get("name").(string) 80 81 query := fmt.Sprintf("DROP ROLE %s", pq.QuoteIdentifier(roleName)) 82 _, err = conn.Query(query) 83 if err != nil { 84 return errwrap.Wrapf("Error deleting role: {{err}}", err) 85 } 86 87 d.SetId("") 88 89 return nil 90 } 91 92 func resourcePostgreSQLRoleRead(d *schema.ResourceData, meta interface{}) error { 93 client := meta.(*Client) 94 conn, err := client.Connect() 95 if err != nil { 96 return err 97 } 98 defer conn.Close() 99 100 roleName := d.Get("name").(string) 101 102 var canLogin bool 103 err = conn.QueryRow("SELECT rolcanlogin FROM pg_roles WHERE rolname=$1", roleName).Scan(&canLogin) 104 switch { 105 case err == sql.ErrNoRows: 106 d.SetId("") 107 return nil 108 case err != nil: 109 return errwrap.Wrapf("Error reading role: {{err}}", err) 110 default: 111 d.Set("login", canLogin) 112 return nil 113 } 114 } 115 116 func resourcePostgreSQLRoleUpdate(d *schema.ResourceData, meta interface{}) error { 117 client := meta.(*Client) 118 conn, err := client.Connect() 119 if err != nil { 120 return err 121 } 122 defer conn.Close() 123 124 d.Partial(true) 125 126 roleName := d.Get("name").(string) 127 128 if d.HasChange("login") { 129 loginAttr := getLoginStr(d.Get("login").(bool)) 130 query := fmt.Sprintf("ALTER ROLE %s %s", pq.QuoteIdentifier(roleName), pq.QuoteIdentifier(loginAttr)) 131 _, err := conn.Query(query) 132 if err != nil { 133 return errwrap.Wrapf("Error updating login attribute for role: {{err}}", err) 134 } 135 136 d.SetPartial("login") 137 } 138 139 password := d.Get("password").(string) 140 if d.HasChange("password") { 141 encryptedCfg := getEncryptedStr(d.Get("encrypted").(bool)) 142 143 query := fmt.Sprintf("ALTER ROLE %s %s PASSWORD '%s'", pq.QuoteIdentifier(roleName), encryptedCfg, password) 144 _, err := conn.Query(query) 145 if err != nil { 146 return errwrap.Wrapf("Error updating password attribute for role: {{err}}", err) 147 } 148 149 d.SetPartial("password") 150 } 151 152 if d.HasChange("encrypted") { 153 encryptedCfg := getEncryptedStr(d.Get("encrypted").(bool)) 154 155 query := fmt.Sprintf("ALTER ROLE %s %s PASSWORD '%s'", pq.QuoteIdentifier(roleName), encryptedCfg, password) 156 _, err := conn.Query(query) 157 if err != nil { 158 return errwrap.Wrapf("Error updating encrypted attribute for role: {{err}}", err) 159 } 160 161 d.SetPartial("encrypted") 162 } 163 164 d.Partial(false) 165 return resourcePostgreSQLRoleRead(d, meta) 166 } 167 168 func getLoginStr(canLogin bool) string { 169 if canLogin { 170 return "login" 171 } 172 return "nologin" 173 } 174 175 func getEncryptedStr(isEncrypted bool) string { 176 if isEncrypted { 177 return "encrypted" 178 } 179 return "unencrypted" 180 }