0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-04 12:32:59 +00:00
terraform-provider-proxmox/proxmoxtf/datasource/firewall/ipset.go
Pavel Boldyrev 98e1cff7fe
feat: Add firewall resources (#246)
* refactoring existing cluster / firewall API for better composition

* add basic security groups API
fix linter errors

* add rules API

* fix after renaming resourceVirtualEnvironmentClusterIPSet

* fix linter errors

* make linter happy

* even more refactoring

* tidy up datasources

* in refactoring spree

* update examples

* fix firewall resource/datasource & client error handling

* add ipset(s) datasource

* update docs

* add security group resource with rules

* docs

* fix security group update, TODO: rule update

* fix after rebase

* add rule update, extract common rule schema, refactor group

* fix linter  errors

* bump linter for ci

* make alias and ipset reusable

* make security group reusable

* refactor datasources

* add security group datasources

* fix linter errors

* update docs

TODO: documentation for group datasources

* add sg docs, update doc index

* minor cleanup

* fix examples & tests

* stub for firewall-level options and rules

* extract firewall interface

* add firewall options and rules on the cluster level

TODO: issues with rule list management

* refactor all resources format AGAIN, now more flat, without complex subresources

* sort out hierarchy of APIs and remove duplication in API wrappers

* bring back security group

* finally, working rules

* restore cluster firewall option

* add containers support

* add options

* move rules back under security group, update docs

* fix vm_id / container_id attrs

* add examples

* cleanup

* more cleanup


Release-As: 0.17.0-rc1
2023-04-02 18:01:10 -04:00

123 lines
2.8 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package firewall
import (
"context"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/bpg/terraform-provider-proxmox/proxmox/firewall"
)
const (
dvIPSetCIDRComment = ""
dvIPSetCIDRNoMatch = false
mkIPSetName = "name"
mkIPSetCIDR = "cidr"
mkIPSetCIDRName = "name"
mkIPSetCIDRComment = "comment"
mkIPSetCIDRNoMatch = "nomatch"
)
func IPSetSchema() map[string]*schema.Schema {
return map[string]*schema.Schema{
mkIPSetName: {
Type: schema.TypeString,
Description: "IPSet name",
Required: true,
},
mkIPSetCIDRComment: {
Type: schema.TypeString,
Description: "IPSet comment",
Computed: true,
},
mkIPSetCIDR: {
Type: schema.TypeList,
Description: "List of IP or Networks",
Computed: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
mkIPSetCIDRName: {
Type: schema.TypeString,
Description: "Network/IP specification in CIDR format",
Computed: true,
},
mkIPSetCIDRNoMatch: {
Type: schema.TypeBool,
Description: "No match this IP/CIDR",
Computed: true,
},
mkIPSetCIDRComment: {
Type: schema.TypeString,
Description: "IP/CIDR comment",
Computed: true,
},
},
},
},
}
}
func IPSetRead(ctx context.Context, fw firewall.API, d *schema.ResourceData) diag.Diagnostics {
var diags diag.Diagnostics
ipSetName := d.Get(mkIPSetName).(string)
d.SetId(ipSetName)
ipSetList, err := fw.ListIPSets(ctx)
if err != nil {
return diag.FromErr(err)
}
for _, ipSet := range ipSetList {
if ipSet.Name == ipSetName {
if ipSet.Comment != nil {
err = d.Set(mkIPSetCIDRComment, ipSet.Comment)
} else {
err = d.Set(mkIPSetCIDRComment, dvIPSetCIDRComment)
}
diags = append(diags, diag.FromErr(err)...)
break
}
}
content, err := fw.GetIPSetContent(ctx, ipSetName)
if err != nil {
return diag.FromErr(err)
}
//nolint:prealloc
var cidrs []interface{}
for _, v := range content {
cirdEntry := map[string]interface{}{}
cirdEntry[mkIPSetCIDRName] = v.CIDR
if v.NoMatch != nil {
cirdEntry[mkIPSetCIDRNoMatch] = bool(*v.NoMatch)
} else {
cirdEntry[mkIPSetCIDRNoMatch] = dvIPSetCIDRNoMatch
}
if v.Comment != nil {
cirdEntry[mkIPSetCIDRComment] = v.Comment
} else {
cirdEntry[mkIPSetCIDRComment] = dvIPSetCIDRComment
}
cidrs = append(cidrs, cirdEntry)
}
err = d.Set(mkIPSetCIDR, cidrs)
diags = append(diags, diag.FromErr(err)...)
return diags
}