-
Notifications
You must be signed in to change notification settings - Fork 4.5k
/
resource_arm_postgresql_firewall_rule.go
134 lines (108 loc) · 3.42 KB
/
resource_arm_postgresql_firewall_rule.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
package azurerm
import (
"fmt"
"log"
"github.com/Azure/azure-sdk-for-go/arm/postgresql"
"github.com/hashicorp/terraform/helper/schema"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/utils"
)
func resourceArmPostgreSQLFirewallRule() *schema.Resource {
return &schema.Resource{
Create: resourceArmPostgreSQLFirewallRuleCreate,
Read: resourceArmPostgreSQLFirewallRuleRead,
Delete: resourceArmPostgreSQLFirewallRuleDelete,
Importer: &schema.ResourceImporter{
State: schema.ImportStatePassthrough,
},
Schema: map[string]*schema.Schema{
"name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"resource_group_name": resourceGroupNameSchema(),
"server_name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"start_ip_address": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"end_ip_address": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
},
}
}
func resourceArmPostgreSQLFirewallRuleCreate(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient).postgresqlFirewallRulesClient
log.Printf("[INFO] preparing arguments for AzureRM PostgreSQL Firewall Rule creation.")
name := d.Get("name").(string)
resGroup := d.Get("resource_group_name").(string)
serverName := d.Get("server_name").(string)
startIPAddress := d.Get("start_ip_address").(string)
endIPAddress := d.Get("end_ip_address").(string)
properties := postgresql.FirewallRule{
FirewallRuleProperties: &postgresql.FirewallRuleProperties{
StartIPAddress: utils.String(startIPAddress),
EndIPAddress: utils.String(endIPAddress),
},
}
_, error := client.CreateOrUpdate(resGroup, serverName, name, properties, make(chan struct{}))
err := <-error
if err != nil {
return err
}
read, err := client.Get(resGroup, serverName, name)
if err != nil {
return err
}
if read.ID == nil {
return fmt.Errorf("Cannot read PostgreSQL Firewall Rule %s (resource group %s) ID", name, resGroup)
}
d.SetId(*read.ID)
return resourceArmPostgreSQLFirewallRuleRead(d, meta)
}
func resourceArmPostgreSQLFirewallRuleRead(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient).postgresqlFirewallRulesClient
id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}
resGroup := id.ResourceGroup
serverName := id.Path["servers"]
name := id.Path["firewallRules"]
resp, err := client.Get(resGroup, serverName, name)
if err != nil {
if utils.ResponseWasNotFound(resp.Response) {
log.Printf("[WARN] PostgreSQL Firewall Rule '%s' was not found (resource group '%s')", name, resGroup)
d.SetId("")
return nil
}
return fmt.Errorf("Error making Read request on Azure PostgreSQL Firewall Rule %s: %+v", name, err)
}
d.Set("name", resp.Name)
d.Set("resource_group_name", resGroup)
d.Set("server_name", serverName)
d.Set("start_ip_address", resp.StartIPAddress)
d.Set("end_ip_address", resp.EndIPAddress)
return nil
}
func resourceArmPostgreSQLFirewallRuleDelete(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient).postgresqlFirewallRulesClient
id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}
resGroup := id.ResourceGroup
serverName := id.Path["servers"]
name := id.Path["firewallRules"]
_, error := client.Delete(resGroup, serverName, name, make(chan struct{}))
err = <-error
return err
}