0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-04 12:32:59 +00:00
terraform-provider-proxmox/proxmoxtf/resource/dns.go
Pavel Boldyrev 98e1cff7fe
feat: Add firewall resources (#246)
* refactoring existing cluster / firewall API for better composition

* add basic security groups API
fix linter errors

* add rules API

* fix after renaming resourceVirtualEnvironmentClusterIPSet

* fix linter errors

* make linter happy

* even more refactoring

* tidy up datasources

* in refactoring spree

* update examples

* fix firewall resource/datasource & client error handling

* add ipset(s) datasource

* update docs

* add security group resource with rules

* docs

* fix security group update, TODO: rule update

* fix after rebase

* add rule update, extract common rule schema, refactor group

* fix linter  errors

* bump linter for ci

* make alias and ipset reusable

* make security group reusable

* refactor datasources

* add security group datasources

* fix linter errors

* update docs

TODO: documentation for group datasources

* add sg docs, update doc index

* minor cleanup

* fix examples & tests

* stub for firewall-level options and rules

* extract firewall interface

* add firewall options and rules on the cluster level

TODO: issues with rule list management

* refactor all resources format AGAIN, now more flat, without complex subresources

* sort out hierarchy of APIs and remove duplication in API wrappers

* bring back security group

* finally, working rules

* restore cluster firewall option

* add containers support

* add options

* move rules back under security group, update docs

* fix vm_id / container_id attrs

* add examples

* cleanup

* more cleanup


Release-As: 0.17.0-rc1
2023-04-02 18:01:10 -04:00

162 lines
3.8 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package resource
import (
"context"
"fmt"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/bpg/terraform-provider-proxmox/proxmox"
"github.com/bpg/terraform-provider-proxmox/proxmoxtf"
)
const (
mkResourceVirtualEnvironmentDNSDomain = "domain"
mkResourceVirtualEnvironmentDNSNodeName = "node_name"
mkResourceVirtualEnvironmentDNSServers = "servers"
)
func DNS() *schema.Resource {
return &schema.Resource{
Schema: map[string]*schema.Schema{
mkResourceVirtualEnvironmentDNSDomain: {
Type: schema.TypeString,
Description: "The DNS search domain",
Required: true,
},
mkResourceVirtualEnvironmentDNSNodeName: {
Type: schema.TypeString,
Description: "The node name",
Required: true,
ForceNew: true,
},
mkResourceVirtualEnvironmentDNSServers: {
Type: schema.TypeList,
Description: "The DNS servers",
Optional: true,
DefaultFunc: func() (interface{}, error) {
return []interface{}{}, nil
},
Elem: &schema.Schema{Type: schema.TypeString},
MinItems: 0,
MaxItems: 3,
},
},
CreateContext: dnsCreate,
ReadContext: dnsRead,
UpdateContext: dnsUpdate,
DeleteContext: dnsDelete,
}
}
func dnsCreate(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
diags := dnsUpdate(ctx, d, m)
if diags.HasError() {
return diags
}
nodeName := d.Get(mkResourceVirtualEnvironmentDNSNodeName).(string)
d.SetId(fmt.Sprintf("%s_dns", nodeName))
return nil
}
func dnsGetUpdateBody(d *schema.ResourceData) *proxmox.VirtualEnvironmentDNSUpdateRequestBody {
domain := d.Get(mkResourceVirtualEnvironmentDNSDomain).(string)
servers := d.Get(mkResourceVirtualEnvironmentDNSServers).([]interface{})
body := &proxmox.VirtualEnvironmentDNSUpdateRequestBody{
SearchDomain: &domain,
}
for i, server := range servers {
s := server.(string)
switch i {
case 0:
body.Server1 = &s
case 1:
body.Server2 = &s
case 2:
body.Server3 = &s
}
}
return body
}
func dnsRead(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
var diags diag.Diagnostics
config := m.(proxmoxtf.ProviderConfiguration)
veClient, err := config.GetVEClient()
if err != nil {
return diag.FromErr(err)
}
nodeName := d.Get(mkResourceVirtualEnvironmentDNSNodeName).(string)
dns, err := veClient.GetDNS(ctx, nodeName)
if err != nil {
return diag.FromErr(err)
}
if dns.SearchDomain != nil {
err = d.Set(mkResourceVirtualEnvironmentDNSDomain, *dns.SearchDomain)
} else {
err = d.Set(mkResourceVirtualEnvironmentDNSDomain, "")
}
diags = append(diags, diag.FromErr(err)...)
var servers []interface{}
if dns.Server1 != nil {
servers = append(servers, *dns.Server1)
}
if dns.Server2 != nil {
servers = append(servers, *dns.Server2)
}
if dns.Server3 != nil {
servers = append(servers, *dns.Server3)
}
err = d.Set(mkResourceVirtualEnvironmentDNSServers, servers)
diags = append(diags, diag.FromErr(err)...)
return diags
}
func dnsUpdate(ctx context.Context, d *schema.ResourceData, m interface{}) diag.Diagnostics {
config := m.(proxmoxtf.ProviderConfiguration)
veClient, err := config.GetVEClient()
if err != nil {
return diag.FromErr(err)
}
nodeName := d.Get(mkResourceVirtualEnvironmentDNSNodeName).(string)
body := dnsGetUpdateBody(d)
err = veClient.UpdateDNS(ctx, nodeName, body)
if err != nil {
return diag.FromErr(err)
}
return dnsRead(ctx, d, m)
}
func dnsDelete(_ context.Context, d *schema.ResourceData, _ interface{}) diag.Diagnostics {
d.SetId("")
return nil
}