github.com/recobe182/terraform@v0.8.5-0.20170117231232-49ab22a935b7/builtin/providers/aws/resource_aws_vpc_endpoint.go (about)

     1  package aws
     2  
     3  import (
     4  	"fmt"
     5  	"log"
     6  
     7  	"github.com/aws/aws-sdk-go/aws"
     8  	"github.com/aws/aws-sdk-go/aws/awserr"
     9  	"github.com/aws/aws-sdk-go/service/ec2"
    10  	"github.com/hashicorp/errwrap"
    11  	"github.com/hashicorp/terraform/helper/schema"
    12  )
    13  
    14  func resourceAwsVpcEndpoint() *schema.Resource {
    15  	return &schema.Resource{
    16  		Create: resourceAwsVPCEndpointCreate,
    17  		Read:   resourceAwsVPCEndpointRead,
    18  		Update: resourceAwsVPCEndpointUpdate,
    19  		Delete: resourceAwsVPCEndpointDelete,
    20  		Importer: &schema.ResourceImporter{
    21  			State: schema.ImportStatePassthrough,
    22  		},
    23  
    24  		Schema: map[string]*schema.Schema{
    25  			"policy": &schema.Schema{
    26  				Type:         schema.TypeString,
    27  				Optional:     true,
    28  				Computed:     true,
    29  				ValidateFunc: validateJsonString,
    30  				StateFunc: func(v interface{}) string {
    31  					json, _ := normalizeJsonString(v)
    32  					return json
    33  				},
    34  			},
    35  			"vpc_id": &schema.Schema{
    36  				Type:     schema.TypeString,
    37  				Required: true,
    38  				ForceNew: true,
    39  			},
    40  			"service_name": &schema.Schema{
    41  				Type:     schema.TypeString,
    42  				Required: true,
    43  				ForceNew: true,
    44  			},
    45  			"route_table_ids": &schema.Schema{
    46  				Type:     schema.TypeSet,
    47  				Optional: true,
    48  				Computed: true,
    49  				Elem:     &schema.Schema{Type: schema.TypeString},
    50  				Set:      schema.HashString,
    51  			},
    52  			"prefix_list_id": &schema.Schema{
    53  				Type:     schema.TypeString,
    54  				Computed: true,
    55  			},
    56  			"cidr_blocks": &schema.Schema{
    57  				Type:     schema.TypeList,
    58  				Computed: true,
    59  				Elem:     &schema.Schema{Type: schema.TypeString},
    60  			},
    61  		},
    62  	}
    63  }
    64  
    65  func resourceAwsVPCEndpointCreate(d *schema.ResourceData, meta interface{}) error {
    66  	conn := meta.(*AWSClient).ec2conn
    67  	input := &ec2.CreateVpcEndpointInput{
    68  		VpcId:       aws.String(d.Get("vpc_id").(string)),
    69  		ServiceName: aws.String(d.Get("service_name").(string)),
    70  	}
    71  
    72  	if v, ok := d.GetOk("route_table_ids"); ok {
    73  		list := v.(*schema.Set).List()
    74  		if len(list) > 0 {
    75  			input.RouteTableIds = expandStringList(list)
    76  		}
    77  	}
    78  
    79  	if v, ok := d.GetOk("policy"); ok {
    80  		policy, err := normalizeJsonString(v)
    81  		if err != nil {
    82  			return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err)
    83  		}
    84  		input.PolicyDocument = aws.String(policy)
    85  	}
    86  
    87  	log.Printf("[DEBUG] Creating VPC Endpoint: %#v", input)
    88  	output, err := conn.CreateVpcEndpoint(input)
    89  	if err != nil {
    90  		return fmt.Errorf("Error creating VPC Endpoint: %s", err)
    91  	}
    92  	log.Printf("[DEBUG] VPC Endpoint %q created.", *output.VpcEndpoint.VpcEndpointId)
    93  
    94  	d.SetId(*output.VpcEndpoint.VpcEndpointId)
    95  
    96  	return resourceAwsVPCEndpointRead(d, meta)
    97  }
    98  
    99  func resourceAwsVPCEndpointRead(d *schema.ResourceData, meta interface{}) error {
   100  	conn := meta.(*AWSClient).ec2conn
   101  	input := &ec2.DescribeVpcEndpointsInput{
   102  		VpcEndpointIds: []*string{aws.String(d.Id())},
   103  	}
   104  
   105  	log.Printf("[DEBUG] Reading VPC Endpoint: %q", d.Id())
   106  	output, err := conn.DescribeVpcEndpoints(input)
   107  
   108  	if err != nil {
   109  		ec2err, ok := err.(awserr.Error)
   110  		if !ok {
   111  			return fmt.Errorf("Error reading VPC Endpoint: %s", err.Error())
   112  		}
   113  
   114  		if ec2err.Code() == "InvalidVpcEndpointId.NotFound" {
   115  			log.Printf("[WARN] VPC Endpoint (%s) not found, removing from state", d.Id())
   116  			d.SetId("")
   117  			return nil
   118  		}
   119  
   120  		return fmt.Errorf("Error reading VPC Endpoint: %s", err.Error())
   121  	}
   122  
   123  	if len(output.VpcEndpoints) != 1 {
   124  		return fmt.Errorf("There's no unique VPC Endpoint, but %d endpoints: %#v",
   125  			len(output.VpcEndpoints), output.VpcEndpoints)
   126  	}
   127  
   128  	vpce := output.VpcEndpoints[0]
   129  
   130  	// A VPC Endpoint is associated with exactly one prefix list name (also called Service Name).
   131  	// The prefix list ID can be used in security groups, so retrieve it to support that capability.
   132  	prefixListServiceName := *vpce.ServiceName
   133  	prefixListInput := &ec2.DescribePrefixListsInput{
   134  		Filters: []*ec2.Filter{
   135  			{Name: aws.String("prefix-list-name"), Values: []*string{aws.String(prefixListServiceName)}},
   136  		},
   137  	}
   138  
   139  	log.Printf("[DEBUG] Reading VPC Endpoint prefix list: %s", prefixListServiceName)
   140  	prefixListsOutput, err := conn.DescribePrefixLists(prefixListInput)
   141  
   142  	if err != nil {
   143  		_, ok := err.(awserr.Error)
   144  		if !ok {
   145  			return fmt.Errorf("Error reading VPC Endpoint prefix list: %s", err.Error())
   146  		}
   147  	}
   148  
   149  	if len(prefixListsOutput.PrefixLists) != 1 {
   150  		return fmt.Errorf("There are multiple prefix lists associated with the service name '%s'. Unexpected", prefixListServiceName)
   151  	}
   152  
   153  	policy, err := normalizeJsonString(*vpce.PolicyDocument)
   154  	if err != nil {
   155  		return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err)
   156  	}
   157  
   158  	d.Set("vpc_id", vpce.VpcId)
   159  	d.Set("policy", policy)
   160  	d.Set("service_name", vpce.ServiceName)
   161  	if err := d.Set("route_table_ids", aws.StringValueSlice(vpce.RouteTableIds)); err != nil {
   162  		return err
   163  	}
   164  	pl := prefixListsOutput.PrefixLists[0]
   165  	d.Set("prefix_list_id", pl.PrefixListId)
   166  	d.Set("cidr_blocks", aws.StringValueSlice(pl.Cidrs))
   167  
   168  	return nil
   169  }
   170  
   171  func resourceAwsVPCEndpointUpdate(d *schema.ResourceData, meta interface{}) error {
   172  	conn := meta.(*AWSClient).ec2conn
   173  	input := &ec2.ModifyVpcEndpointInput{
   174  		VpcEndpointId: aws.String(d.Id()),
   175  	}
   176  
   177  	if d.HasChange("route_table_ids") {
   178  		o, n := d.GetChange("route_table_ids")
   179  		os := o.(*schema.Set)
   180  		ns := n.(*schema.Set)
   181  
   182  		add := expandStringList(ns.Difference(os).List())
   183  		if len(add) > 0 {
   184  			input.AddRouteTableIds = add
   185  		}
   186  
   187  		remove := expandStringList(os.Difference(ns).List())
   188  		if len(remove) > 0 {
   189  			input.RemoveRouteTableIds = remove
   190  		}
   191  	}
   192  
   193  	if d.HasChange("policy") {
   194  		policy, err := normalizeJsonString(d.Get("policy"))
   195  		if err != nil {
   196  			return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err)
   197  		}
   198  		input.PolicyDocument = aws.String(policy)
   199  	}
   200  
   201  	log.Printf("[DEBUG] Updating VPC Endpoint: %#v", input)
   202  	_, err := conn.ModifyVpcEndpoint(input)
   203  	if err != nil {
   204  		return fmt.Errorf("Error updating VPC Endpoint: %s", err)
   205  	}
   206  	log.Printf("[DEBUG] VPC Endpoint %q updated", input.VpcEndpointId)
   207  
   208  	return resourceAwsVPCEndpointRead(d, meta)
   209  }
   210  
   211  func resourceAwsVPCEndpointDelete(d *schema.ResourceData, meta interface{}) error {
   212  	conn := meta.(*AWSClient).ec2conn
   213  	input := &ec2.DeleteVpcEndpointsInput{
   214  		VpcEndpointIds: []*string{aws.String(d.Id())},
   215  	}
   216  
   217  	log.Printf("[DEBUG] Deleting VPC Endpoint: %#v", input)
   218  	_, err := conn.DeleteVpcEndpoints(input)
   219  
   220  	if err != nil {
   221  		ec2err, ok := err.(awserr.Error)
   222  		if !ok {
   223  			return fmt.Errorf("Error deleting VPC Endpoint: %s", err.Error())
   224  		}
   225  
   226  		if ec2err.Code() == "InvalidVpcEndpointId.NotFound" {
   227  			log.Printf("[DEBUG] VPC Endpoint %q is already gone", d.Id())
   228  		} else {
   229  			return fmt.Errorf("Error deleting VPC Endpoint: %s", err.Error())
   230  		}
   231  	}
   232  
   233  	log.Printf("[DEBUG] VPC Endpoint %q deleted", d.Id())
   234  	d.SetId("")
   235  
   236  	return nil
   237  }