github.com/nevins-b/terraform@v0.3.8-0.20170215184714-bbae22007d5a/builtin/providers/aws/data_source_aws_security_group.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "log" 6 7 "github.com/aws/aws-sdk-go/aws" 8 "github.com/aws/aws-sdk-go/service/ec2" 9 "github.com/hashicorp/terraform/helper/schema" 10 ) 11 12 func dataSourceAwsSecurityGroup() *schema.Resource { 13 return &schema.Resource{ 14 Read: dataSourceAwsSecurityGroupRead, 15 16 Schema: map[string]*schema.Schema{ 17 "vpc_id": &schema.Schema{ 18 Type: schema.TypeString, 19 Optional: true, 20 Computed: true, 21 }, 22 "name": &schema.Schema{ 23 Type: schema.TypeString, 24 Optional: true, 25 Computed: true, 26 }, 27 "filter": ec2CustomFiltersSchema(), 28 29 "id": &schema.Schema{ 30 Type: schema.TypeString, 31 Optional: true, 32 Computed: true, 33 }, 34 "tags": tagsSchemaComputed(), 35 }, 36 } 37 } 38 39 func dataSourceAwsSecurityGroupRead(d *schema.ResourceData, meta interface{}) error { 40 conn := meta.(*AWSClient).ec2conn 41 req := &ec2.DescribeSecurityGroupsInput{} 42 43 if id, idExists := d.GetOk("id"); idExists { 44 req.GroupIds = []*string{aws.String(id.(string))} 45 } 46 47 req.Filters = buildEC2AttributeFilterList( 48 map[string]string{ 49 "group-name": d.Get("name").(string), 50 "vpc-id": d.Get("vpc_id").(string), 51 }, 52 ) 53 req.Filters = append(req.Filters, buildEC2TagFilterList( 54 tagsFromMap(d.Get("tags").(map[string]interface{})), 55 )...) 56 req.Filters = append(req.Filters, buildEC2CustomFilterList( 57 d.Get("filter").(*schema.Set), 58 )...) 59 if len(req.Filters) == 0 { 60 // Don't send an empty filters list; the EC2 API won't accept it. 61 req.Filters = nil 62 } 63 64 log.Printf("[DEBUG] Describe Security Groups %v\n", req) 65 resp, err := conn.DescribeSecurityGroups(req) 66 if err != nil { 67 return err 68 } 69 if resp == nil || len(resp.SecurityGroups) == 0 { 70 return fmt.Errorf("no matching SecurityGroup found") 71 } 72 if len(resp.SecurityGroups) > 1 { 73 return fmt.Errorf("multiple Security Groups matched; use additional constraints to reduce matches to a single Security Group") 74 } 75 76 sg := resp.SecurityGroups[0] 77 78 d.SetId(*sg.GroupId) 79 d.Set("id", sg.VpcId) 80 d.Set("name", sg.GroupName) 81 d.Set("description", sg.Description) 82 d.Set("vpc_id", sg.VpcId) 83 d.Set("tags", tagsToMap(sg.Tags)) 84 85 return nil 86 }