2017-03-06 22:59:46 +00:00
|
|
|
package google
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2018-04-10 17:42:07 +00:00
|
|
|
"time"
|
2017-03-06 22:59:46 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
|
|
|
"google.golang.org/api/compute/v1"
|
|
|
|
"google.golang.org/api/googleapi"
|
|
|
|
)
|
|
|
|
|
|
|
|
func resourceComputeSnapshot() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceComputeSnapshotCreate,
|
|
|
|
Read: resourceComputeSnapshotRead,
|
|
|
|
Delete: resourceComputeSnapshotDelete,
|
2017-10-13 22:36:03 +00:00
|
|
|
Update: resourceComputeSnapshotUpdate,
|
2017-03-06 22:59:46 +00:00
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"zone": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2017-12-06 22:30:04 +00:00
|
|
|
Optional: true,
|
2018-01-03 21:18:40 +00:00
|
|
|
Computed: true,
|
2017-03-06 22:59:46 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"snapshot_encryption_key_raw": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
Sensitive: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"snapshot_encryption_key_sha256": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2017-03-22 11:09:25 +00:00
|
|
|
"source_disk_encryption_key_raw": &schema.Schema{
|
2017-03-06 22:59:46 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
Sensitive: true,
|
|
|
|
},
|
|
|
|
|
2017-03-22 11:09:25 +00:00
|
|
|
"source_disk_encryption_key_sha256": &schema.Schema{
|
2017-03-06 22:59:46 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2017-03-22 11:09:25 +00:00
|
|
|
"source_disk": &schema.Schema{
|
2017-03-06 22:59:46 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2017-04-20 10:12:43 +00:00
|
|
|
"source_disk_link": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
"project": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-11-28 00:32:20 +00:00
|
|
|
Computed: true,
|
2017-03-06 22:59:46 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"self_link": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2017-10-13 22:36:03 +00:00
|
|
|
|
|
|
|
"labels": &schema.Schema{
|
|
|
|
Type: schema.TypeMap,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
Set: schema.HashString,
|
|
|
|
},
|
|
|
|
|
|
|
|
"label_fingerprint": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
2017-03-06 22:59:46 +00:00
|
|
|
},
|
2018-04-10 17:42:07 +00:00
|
|
|
Timeouts: &schema.ResourceTimeout{
|
|
|
|
Create: schema.DefaultTimeout(4 * time.Minute),
|
|
|
|
Update: schema.DefaultTimeout(4 * time.Minute),
|
|
|
|
Delete: schema.DefaultTimeout(4 * time.Minute),
|
|
|
|
},
|
2017-03-06 22:59:46 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeSnapshotCreate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build the snapshot parameter
|
|
|
|
snapshot := &compute.Snapshot{
|
|
|
|
Name: d.Get("name").(string),
|
|
|
|
}
|
|
|
|
|
2017-03-27 08:36:39 +00:00
|
|
|
source_disk := d.Get("source_disk").(string)
|
2017-03-06 22:59:46 +00:00
|
|
|
|
|
|
|
if v, ok := d.GetOk("snapshot_encryption_key_raw"); ok {
|
|
|
|
snapshot.SnapshotEncryptionKey = &compute.CustomerEncryptionKey{}
|
|
|
|
snapshot.SnapshotEncryptionKey.RawKey = v.(string)
|
|
|
|
}
|
|
|
|
|
2017-03-22 11:09:25 +00:00
|
|
|
if v, ok := d.GetOk("source_disk_encryption_key_raw"); ok {
|
2017-03-13 11:25:11 +00:00
|
|
|
snapshot.SourceDiskEncryptionKey = &compute.CustomerEncryptionKey{}
|
|
|
|
snapshot.SourceDiskEncryptionKey.RawKey = v.(string)
|
|
|
|
}
|
|
|
|
|
2017-12-06 22:30:04 +00:00
|
|
|
zone, err := getZone(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
op, err := config.clientCompute.Disks.CreateSnapshot(
|
2017-12-06 22:30:04 +00:00
|
|
|
project, zone, source_disk, snapshot).Do()
|
2017-03-06 22:59:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating snapshot: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// It probably maybe worked, so store the ID now
|
|
|
|
d.SetId(snapshot.Name)
|
|
|
|
|
2018-04-10 17:42:07 +00:00
|
|
|
timeout := int(d.Timeout(schema.TimeoutCreate).Minutes())
|
|
|
|
err = computeOperationWaitTime(config.clientCompute, op, project, "Creating Snapshot", timeout)
|
2017-03-06 22:59:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2017-10-13 22:36:03 +00:00
|
|
|
|
|
|
|
// Now if labels are set, go ahead and apply them
|
|
|
|
if labels := expandLabels(d); len(labels) > 0 {
|
|
|
|
// First, read the remote resource in order to find the fingerprint
|
|
|
|
apiSnapshot, err := config.clientCompute.Snapshots.Get(project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Eror when reading snapshot for label update: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-04-10 17:42:07 +00:00
|
|
|
err = updateLabels(config.clientCompute, project, d.Id(), labels, apiSnapshot.LabelFingerprint, timeout)
|
2017-10-13 22:36:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
2017-03-06 22:59:46 +00:00
|
|
|
return resourceComputeSnapshotRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeSnapshotRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-01-03 21:18:40 +00:00
|
|
|
zone, err := getZone(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
snapshot, err := config.clientCompute.Snapshots.Get(
|
|
|
|
project, d.Id()).Do()
|
|
|
|
if err != nil {
|
2017-05-09 23:00:47 +00:00
|
|
|
return handleNotFoundError(err, d, fmt.Sprintf("Snapshot %q", d.Get("name").(string)))
|
2017-03-06 22:59:46 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
d.Set("self_link", snapshot.SelfLink)
|
2017-04-20 10:12:43 +00:00
|
|
|
d.Set("source_disk_link", snapshot.SourceDisk)
|
|
|
|
d.Set("name", snapshot.Name)
|
2017-03-23 09:38:57 +00:00
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
if snapshot.SnapshotEncryptionKey != nil && snapshot.SnapshotEncryptionKey.Sha256 != "" {
|
|
|
|
d.Set("snapshot_encryption_key_sha256", snapshot.SnapshotEncryptionKey.Sha256)
|
|
|
|
}
|
|
|
|
|
2017-03-23 09:38:57 +00:00
|
|
|
if snapshot.SourceDiskEncryptionKey != nil && snapshot.SourceDiskEncryptionKey.Sha256 != "" {
|
|
|
|
d.Set("source_disk_encryption_key_sha256", snapshot.SourceDiskEncryptionKey.Sha256)
|
|
|
|
}
|
|
|
|
|
2017-10-13 22:36:03 +00:00
|
|
|
d.Set("labels", snapshot.Labels)
|
|
|
|
d.Set("label_fingerprint", snapshot.LabelFingerprint)
|
2017-11-28 00:32:20 +00:00
|
|
|
d.Set("project", project)
|
2018-01-03 21:18:40 +00:00
|
|
|
d.Set("zone", zone)
|
2017-10-13 22:36:03 +00:00
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-10-13 22:36:03 +00:00
|
|
|
func resourceComputeSnapshotUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Partial(true)
|
|
|
|
|
|
|
|
if d.HasChange("labels") {
|
2018-04-10 17:42:07 +00:00
|
|
|
err = updateLabels(config.clientCompute, project, d.Id(), expandLabels(d), d.Get("label_fingerprint").(string), int(d.Timeout(schema.TimeoutDelete).Minutes()))
|
2017-10-13 22:36:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetPartial("labels")
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Partial(false)
|
|
|
|
|
|
|
|
return resourceComputeSnapshotRead(d, meta)
|
|
|
|
}
|
|
|
|
|
2017-03-06 22:59:46 +00:00
|
|
|
func resourceComputeSnapshotDelete(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete the snapshot
|
|
|
|
op, err := config.clientCompute.Snapshots.Delete(
|
|
|
|
project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
if gerr, ok := err.(*googleapi.Error); ok && gerr.Code == 404 {
|
|
|
|
log.Printf("[WARN] Removing Snapshot %q because it's gone", d.Get("name").(string))
|
|
|
|
// The resource doesn't exist anymore
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return fmt.Errorf("Error deleting snapshot: %s", err)
|
|
|
|
}
|
|
|
|
|
2018-04-10 17:42:07 +00:00
|
|
|
err = computeOperationWaitTime(config.clientCompute, op, project, "Deleting Snapshot", int(d.Timeout(schema.TimeoutDelete).Minutes()))
|
2017-03-06 22:59:46 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
2017-03-22 14:01:45 +00:00
|
|
|
|
2018-04-10 17:42:07 +00:00
|
|
|
func updateLabels(client *compute.Service, project string, resourceId string, labels map[string]string, labelFingerprint string, timeout int) error {
|
2017-10-13 22:36:03 +00:00
|
|
|
setLabelsReq := compute.GlobalSetLabelsRequest{
|
|
|
|
Labels: labels,
|
|
|
|
LabelFingerprint: labelFingerprint,
|
|
|
|
}
|
|
|
|
op, err := client.Snapshots.SetLabels(project, resourceId, &setLabelsReq).Do()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-04-10 17:42:07 +00:00
|
|
|
return computeOperationWaitTime(client, op, project, "Setting labels on snapshot", timeout)
|
2017-10-13 22:36:03 +00:00
|
|
|
}
|