0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-07-04 21:14:05 +00:00
terraform-provider-proxmox/proxmoxtf/resource/firewall/alias.go
Pavel Boldyrev 98e1cff7fe
feat: Add firewall resources (#246)
* refactoring existing cluster / firewall API for better composition

* add basic security groups API
fix linter errors

* add rules API

* fix after renaming resourceVirtualEnvironmentClusterIPSet

* fix linter errors

* make linter happy

* even more refactoring

* tidy up datasources

* in refactoring spree

* update examples

* fix firewall resource/datasource & client error handling

* add ipset(s) datasource

* update docs

* add security group resource with rules

* docs

* fix security group update, TODO: rule update

* fix after rebase

* add rule update, extract common rule schema, refactor group

* fix linter  errors

* bump linter for ci

* make alias and ipset reusable

* make security group reusable

* refactor datasources

* add security group datasources

* fix linter errors

* update docs

TODO: documentation for group datasources

* add sg docs, update doc index

* minor cleanup

* fix examples & tests

* stub for firewall-level options and rules

* extract firewall interface

* add firewall options and rules on the cluster level

TODO: issues with rule list management

* refactor all resources format AGAIN, now more flat, without complex subresources

* sort out hierarchy of APIs and remove duplication in API wrappers

* bring back security group

* finally, working rules

* restore cluster firewall option

* add containers support

* add options

* move rules back under security group, update docs

* fix vm_id / container_id attrs

* add examples

* cleanup

* more cleanup


Release-As: 0.17.0-rc1
2023-04-02 18:01:10 -04:00

142 lines
3.1 KiB
Go

/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package firewall
import (
"context"
"strings"
"github.com/hashicorp/terraform-plugin-sdk/v2/diag"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
"github.com/bpg/terraform-provider-proxmox/proxmox/firewall"
"github.com/bpg/terraform-provider-proxmox/proxmoxtf/structure"
)
const (
mkAliasName = "name"
mkAliasCIDR = "cidr"
mkAliasComment = "comment"
)
func Alias() *schema.Resource {
s := map[string]*schema.Schema{
mkAliasName: {
Type: schema.TypeString,
Description: "Alias name",
Required: true,
},
mkAliasCIDR: {
Type: schema.TypeString,
Description: "IP/CIDR block",
Required: true,
},
mkAliasComment: {
Type: schema.TypeString,
Description: "Alias comment",
Optional: true,
Default: "",
},
}
structure.MergeSchema(s, selectorSchema())
return &schema.Resource{
Schema: s,
CreateContext: selectFirewallAPI(aliasCreate),
ReadContext: selectFirewallAPI(aliasRead),
UpdateContext: selectFirewallAPI(aliasUpdate),
DeleteContext: selectFirewallAPI(aliasDelete),
}
}
func aliasCreate(ctx context.Context, api firewall.API, d *schema.ResourceData) diag.Diagnostics {
comment := d.Get(mkAliasComment).(string)
name := d.Get(mkAliasName).(string)
cidr := d.Get(mkAliasCIDR).(string)
body := &firewall.AliasCreateRequestBody{
Comment: &comment,
Name: name,
CIDR: cidr,
}
err := api.CreateAlias(ctx, body)
if err != nil {
return diag.FromErr(err)
}
d.SetId(name)
return aliasRead(ctx, api, d)
}
func aliasRead(ctx context.Context, api firewall.API, d *schema.ResourceData) diag.Diagnostics {
name := d.Id()
alias, err := api.GetAlias(ctx, name)
if err != nil {
if strings.Contains(err.Error(), "no such alias") {
d.SetId("")
return nil
}
return diag.FromErr(err)
}
aliasMap := map[string]interface{}{
mkAliasComment: alias.Comment,
mkAliasName: alias.Name,
mkAliasCIDR: alias.CIDR,
}
for key, val := range aliasMap {
err = d.Set(key, val)
if err != nil {
return diag.FromErr(err)
}
}
return nil
}
func aliasUpdate(ctx context.Context, api firewall.API, d *schema.ResourceData) diag.Diagnostics {
comment := d.Get(mkAliasComment).(string)
cidr := d.Get(mkAliasCIDR).(string)
newName := d.Get(mkAliasName).(string)
previousName := d.Id()
body := &firewall.AliasUpdateRequestBody{
ReName: newName,
CIDR: cidr,
Comment: &comment,
}
err := api.UpdateAlias(ctx, previousName, body)
if err != nil {
return diag.FromErr(err)
}
d.SetId(newName)
return aliasRead(ctx, api, d)
}
func aliasDelete(ctx context.Context, api firewall.API, d *schema.ResourceData) diag.Diagnostics {
name := d.Id()
err := api.DeleteAlias(ctx, name)
if err != nil {
if strings.Contains(err.Error(), "no such alias") {
d.SetId("")
return nil
}
return diag.FromErr(err)
}
d.SetId("")
return nil
}