2015-10-23 14:10:41 +00:00
|
|
|
package google
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-05-18 20:09:01 +00:00
|
|
|
"log"
|
|
|
|
"regexp"
|
2017-01-27 21:06:46 +00:00
|
|
|
"strings"
|
2018-04-03 21:44:18 +00:00
|
|
|
"time"
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2018-06-20 22:02:25 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/customdiff"
|
2016-01-08 16:54:55 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
2015-10-23 14:10:41 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2017-07-07 19:48:29 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/validation"
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2015-11-13 20:36:03 +00:00
|
|
|
"google.golang.org/api/googleapi"
|
2018-01-24 17:23:48 +00:00
|
|
|
sqladmin "google.golang.org/api/sqladmin/v1beta4"
|
2015-10-23 14:10:41 +00:00
|
|
|
)
|
|
|
|
|
2017-11-13 20:51:15 +00:00
|
|
|
var sqlDatabaseAuthorizedNetWorkSchemaElem *schema.Resource = &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"expiration_time": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"value": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
func resourceSqlDatabaseInstance() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceSqlDatabaseInstanceCreate,
|
|
|
|
Read: resourceSqlDatabaseInstanceRead,
|
|
|
|
Update: resourceSqlDatabaseInstanceUpdate,
|
|
|
|
Delete: resourceSqlDatabaseInstanceDelete,
|
2017-06-22 17:25:26 +00:00
|
|
|
Importer: &schema.ResourceImporter{
|
|
|
|
State: schema.ImportStatePassthrough,
|
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2018-04-03 21:44:18 +00:00
|
|
|
Timeouts: &schema.ResourceTimeout{
|
|
|
|
Create: schema.DefaultTimeout(10 * time.Minute),
|
|
|
|
Update: schema.DefaultTimeout(10 * time.Minute),
|
|
|
|
Delete: schema.DefaultTimeout(10 * time.Minute),
|
|
|
|
},
|
|
|
|
|
2018-06-20 22:02:25 +00:00
|
|
|
CustomizeDiff: customdiff.All(
|
|
|
|
customdiff.ForceNewIfChange("settings.0.disk_size", isDiskShrinkage)),
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"region": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
2018-05-09 21:16:49 +00:00
|
|
|
Optional: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
2016-04-10 21:34:15 +00:00
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
"settings": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Required: true,
|
2017-05-18 20:09:01 +00:00
|
|
|
MaxItems: 1,
|
2015-10-23 14:10:41 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"version": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"tier": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
"activation_policy": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
// Defaults differ between first and second gen instances
|
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"authorized_gae_applications": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
},
|
2018-01-24 17:23:48 +00:00
|
|
|
"availability_type": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
DiffSuppressFunc: suppressFirstGen,
|
|
|
|
// Set computed instead of default because this property is for second-gen
|
|
|
|
// only. The default when not provided is ZONAL, which means no explicit HA
|
|
|
|
// configuration.
|
|
|
|
Computed: true,
|
|
|
|
ValidateFunc: validation.StringInSlice([]string{"REGIONAL", "ZONAL"}, false),
|
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
"backup_configuration": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
Computed: true,
|
|
|
|
MaxItems: 1,
|
2015-10-23 14:10:41 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"binary_log_enabled": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"enabled": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"start_time": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
// start_time is randomly assigned if not set
|
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"crash_safe_replication": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
2017-01-27 21:06:46 +00:00
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"database_flags": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"value": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2017-02-01 16:20:31 +00:00
|
|
|
"disk_autoresize": &schema.Schema{
|
2017-05-18 20:09:01 +00:00
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
2017-11-29 23:51:00 +00:00
|
|
|
Default: true,
|
2017-05-18 20:09:01 +00:00
|
|
|
DiffSuppressFunc: suppressFirstGen,
|
2017-02-01 16:20:31 +00:00
|
|
|
},
|
|
|
|
"disk_size": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
// Defaults differ between first and second gen instances
|
|
|
|
Computed: true,
|
2017-02-01 16:20:31 +00:00
|
|
|
},
|
|
|
|
"disk_type": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
// Set computed instead of default because this property is for second-gen only.
|
|
|
|
Computed: true,
|
2017-02-01 16:20:31 +00:00
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
"ip_configuration": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
Computed: true,
|
|
|
|
MaxItems: 1,
|
2015-10-23 14:10:41 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"authorized_networks": &schema.Schema{
|
2017-11-13 20:51:15 +00:00
|
|
|
Type: schema.TypeSet,
|
2015-10-23 14:10:41 +00:00
|
|
|
Optional: true,
|
2017-11-13 20:51:15 +00:00
|
|
|
Set: schema.HashResource(sqlDatabaseAuthorizedNetWorkSchemaElem),
|
|
|
|
Elem: sqlDatabaseAuthorizedNetWorkSchemaElem,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"ipv4_enabled": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
// Defaults differ between first and second gen instances
|
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"require_ssl": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"location_preference": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
MaxItems: 1,
|
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"follow_gae_application": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
"zone": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2017-02-17 23:33:47 +00:00
|
|
|
"maintenance_window": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
MaxItems: 1,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"day": &schema.Schema{
|
2017-07-07 19:48:29 +00:00
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ValidateFunc: validation.IntBetween(1, 7),
|
2017-02-17 23:33:47 +00:00
|
|
|
},
|
|
|
|
"hour": &schema.Schema{
|
2017-07-07 19:48:29 +00:00
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ValidateFunc: validation.IntBetween(0, 23),
|
2017-02-17 23:33:47 +00:00
|
|
|
},
|
|
|
|
"update_track": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
"pricing_plan": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
Default: "PER_USE",
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"replication_type": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-08-01 20:13:09 +00:00
|
|
|
Default: "SYNCHRONOUS",
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
2018-05-30 22:32:11 +00:00
|
|
|
"user_labels": &schema.Schema{
|
|
|
|
Type: schema.TypeMap,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
Set: schema.HashString,
|
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2016-04-10 21:34:15 +00:00
|
|
|
|
2017-09-12 15:04:13 +00:00
|
|
|
"connection_name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2016-04-10 21:34:15 +00:00
|
|
|
"database_version": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2016-10-27 23:11:08 +00:00
|
|
|
Default: "MYSQL_5_6",
|
2016-04-10 21:34:15 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2016-02-22 15:34:51 +00:00
|
|
|
"ip_address": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Computed: true,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"ip_address": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"time_to_retire": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2016-04-10 21:34:15 +00:00
|
|
|
|
2018-03-02 01:12:33 +00:00
|
|
|
"first_ip_address": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2016-04-10 21:34:15 +00:00
|
|
|
"name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"master_instance_name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-06-22 17:25:26 +00:00
|
|
|
Computed: true,
|
2016-04-10 21:34:15 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"project": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-11-28 00:32:20 +00:00
|
|
|
Computed: true,
|
2016-04-10 21:34:15 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
"replica_configuration": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
2017-05-22 21:04:28 +00:00
|
|
|
MaxItems: 1,
|
2017-08-01 20:13:09 +00:00
|
|
|
// Returned from API on all replicas
|
|
|
|
Computed: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"ca_certificate": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"client_certificate": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"client_key": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"connect_retry_interval": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"dump_file_path": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
2017-05-22 20:44:25 +00:00
|
|
|
"failover_target": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
"master_heartbeat_period": &schema.Schema{
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"password": &schema.Schema{
|
2018-05-10 22:31:07 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
Sensitive: true,
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
"ssl_cipher": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"username": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
"verify_server_certificate": &schema.Schema{
|
|
|
|
Type: schema.TypeBool,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2018-01-29 21:53:54 +00:00
|
|
|
"server_ca_cert": &schema.Schema{
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Computed: true,
|
|
|
|
MaxItems: 1,
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"cert": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"common_name": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"create_time": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"expiration_time": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"sha1_fingerprint": &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2016-04-10 21:34:15 +00:00
|
|
|
"self_link": &schema.Schema{
|
2016-04-10 16:59:57 +00:00
|
|
|
Type: schema.TypeString,
|
2016-04-10 21:34:15 +00:00
|
|
|
Computed: true,
|
2016-04-10 16:59:57 +00:00
|
|
|
},
|
2015-10-23 14:10:41 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
// Suppress diff with any attribute value that is not supported on 1st Generation
|
|
|
|
// Instances
|
2017-05-18 20:09:01 +00:00
|
|
|
func suppressFirstGen(k, old, new string, d *schema.ResourceData) bool {
|
2018-01-24 17:23:48 +00:00
|
|
|
if isFirstGen(d) {
|
|
|
|
log.Printf("[DEBUG] suppressing diff on %s due to 1st gen instance type", k)
|
2017-05-18 20:09:01 +00:00
|
|
|
return true
|
|
|
|
}
|
2018-01-24 17:23:48 +00:00
|
|
|
|
2017-05-18 20:09:01 +00:00
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
// Detects whether a database is 1st Generation by inspecting the tier name
|
|
|
|
func isFirstGen(d *schema.ResourceData) bool {
|
|
|
|
settingsList := d.Get("settings").([]interface{})
|
|
|
|
settings := settingsList[0].(map[string]interface{})
|
|
|
|
tier := settings["tier"].(string)
|
|
|
|
|
|
|
|
// 1st Generation databases have tiers like 'D0', as opposed to 2nd Generation which are
|
|
|
|
// prefixed with 'db'
|
|
|
|
return !regexp.MustCompile("db*").Match([]byte(tier))
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
func resourceSqlDatabaseInstanceCreate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-05-09 21:16:49 +00:00
|
|
|
region, err := getRegion(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2015-10-23 14:10:41 +00:00
|
|
|
databaseVersion := d.Get("database_version").(string)
|
|
|
|
|
|
|
|
_settingsList := d.Get("settings").([]interface{})
|
|
|
|
|
|
|
|
_settings := _settingsList[0].(map[string]interface{})
|
|
|
|
settings := &sqladmin.Settings{
|
2017-05-18 20:09:01 +00:00
|
|
|
Tier: _settings["tier"].(string),
|
|
|
|
ForceSendFields: []string{"StorageAutoResize"},
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["activation_policy"]; ok {
|
|
|
|
settings.ActivationPolicy = v.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["authorized_gae_applications"]; ok {
|
|
|
|
settings.AuthorizedGaeApplications = make([]string, 0)
|
|
|
|
for _, app := range v.([]interface{}) {
|
|
|
|
settings.AuthorizedGaeApplications = append(settings.AuthorizedGaeApplications,
|
|
|
|
app.(string))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
if v, ok := _settings["availability_type"]; ok {
|
|
|
|
settings.AvailabilityType = v.(string)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := _settings["backup_configuration"]; ok {
|
|
|
|
_backupConfigurationList := v.([]interface{})
|
|
|
|
|
|
|
|
if len(_backupConfigurationList) == 1 && _backupConfigurationList[0] != nil {
|
|
|
|
settings.BackupConfiguration = &sqladmin.BackupConfiguration{}
|
|
|
|
_backupConfiguration := _backupConfigurationList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["binary_log_enabled"]; okp {
|
|
|
|
settings.BackupConfiguration.BinaryLogEnabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["enabled"]; okp {
|
|
|
|
settings.BackupConfiguration.Enabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["start_time"]; okp {
|
|
|
|
settings.BackupConfiguration.StartTime = vp.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["crash_safe_replication"]; ok {
|
|
|
|
settings.CrashSafeReplicationEnabled = v.(bool)
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
// 1st Generation instances don't support the disk_autoresize parameter
|
|
|
|
if !isFirstGen(d) {
|
|
|
|
autoResize := _settings["disk_autoresize"].(bool)
|
|
|
|
settings.StorageAutoResize = &autoResize
|
|
|
|
}
|
2017-02-01 16:20:31 +00:00
|
|
|
|
|
|
|
if v, ok := _settings["disk_size"]; ok && v.(int) > 0 {
|
|
|
|
settings.DataDiskSizeGb = int64(v.(int))
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["disk_type"]; ok && len(v.(string)) > 0 {
|
|
|
|
settings.DataDiskType = v.(string)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := _settings["database_flags"]; ok {
|
|
|
|
settings.DatabaseFlags = make([]*sqladmin.DatabaseFlags, 0)
|
|
|
|
_databaseFlagsList := v.([]interface{})
|
|
|
|
for _, _flag := range _databaseFlagsList {
|
|
|
|
_entry := _flag.(map[string]interface{})
|
|
|
|
flag := &sqladmin.DatabaseFlags{}
|
|
|
|
if vp, okp := _entry["name"]; okp {
|
|
|
|
flag.Name = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _entry["value"]; okp {
|
|
|
|
flag.Value = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
settings.DatabaseFlags = append(settings.DatabaseFlags, flag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["ip_configuration"]; ok {
|
|
|
|
_ipConfigurationList := v.([]interface{})
|
|
|
|
|
|
|
|
if len(_ipConfigurationList) == 1 && _ipConfigurationList[0] != nil {
|
|
|
|
settings.IpConfiguration = &sqladmin.IpConfiguration{}
|
|
|
|
_ipConfiguration := _ipConfigurationList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["ipv4_enabled"]; okp {
|
|
|
|
settings.IpConfiguration.Ipv4Enabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["require_ssl"]; okp {
|
|
|
|
settings.IpConfiguration.RequireSsl = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["authorized_networks"]; okp {
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks = make([]*sqladmin.AclEntry, 0)
|
2017-11-13 20:51:15 +00:00
|
|
|
_authorizedNetworksList := vp.(*schema.Set).List()
|
2015-10-23 14:10:41 +00:00
|
|
|
for _, _acl := range _authorizedNetworksList {
|
|
|
|
_entry := _acl.(map[string]interface{})
|
|
|
|
entry := &sqladmin.AclEntry{}
|
|
|
|
|
|
|
|
if vpp, okpp := _entry["expiration_time"]; okpp {
|
|
|
|
entry.ExpirationTime = vpp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vpp, okpp := _entry["name"]; okpp {
|
|
|
|
entry.Name = vpp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vpp, okpp := _entry["value"]; okpp {
|
|
|
|
entry.Value = vpp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks = append(
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks, entry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["location_preference"]; ok {
|
|
|
|
_locationPreferenceList := v.([]interface{})
|
|
|
|
|
|
|
|
if len(_locationPreferenceList) == 1 && _locationPreferenceList[0] != nil {
|
|
|
|
settings.LocationPreference = &sqladmin.LocationPreference{}
|
|
|
|
_locationPreference := _locationPreferenceList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _locationPreference["follow_gae_application"]; okp {
|
|
|
|
settings.LocationPreference.FollowGaeApplication = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _locationPreference["zone"]; okp {
|
|
|
|
settings.LocationPreference.Zone = vp.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-05-22 20:31:39 +00:00
|
|
|
if v, ok := _settings["maintenance_window"]; ok {
|
|
|
|
windows := v.([]interface{})
|
|
|
|
if len(windows) > 0 && windows[0] != nil {
|
|
|
|
settings.MaintenanceWindow = &sqladmin.MaintenanceWindow{}
|
|
|
|
window := windows[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := window["day"]; okp {
|
|
|
|
settings.MaintenanceWindow.Day = int64(vp.(int))
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2018-05-22 20:31:39 +00:00
|
|
|
if vp, okp := window["hour"]; okp {
|
|
|
|
settings.MaintenanceWindow.Hour = int64(vp.(int))
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2018-05-22 20:31:39 +00:00
|
|
|
if vp, ok := window["update_track"]; ok {
|
|
|
|
if len(vp.(string)) > 0 {
|
|
|
|
settings.MaintenanceWindow.UpdateTrack = vp.(string)
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := _settings["pricing_plan"]; ok {
|
|
|
|
settings.PricingPlan = v.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["replication_type"]; ok {
|
|
|
|
settings.ReplicationType = v.(string)
|
|
|
|
}
|
|
|
|
|
2018-05-30 22:32:11 +00:00
|
|
|
if v, ok := _settings["user_labels"]; ok {
|
|
|
|
settings.UserLabels = convertStringMap(v.(map[string]interface{}))
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
instance := &sqladmin.DatabaseInstance{
|
|
|
|
Region: region,
|
|
|
|
Settings: settings,
|
|
|
|
DatabaseVersion: databaseVersion,
|
|
|
|
}
|
|
|
|
|
2016-01-08 16:54:55 +00:00
|
|
|
if v, ok := d.GetOk("name"); ok {
|
|
|
|
instance.Name = v.(string)
|
|
|
|
} else {
|
|
|
|
instance.Name = resource.UniqueId()
|
|
|
|
d.Set("name", instance.Name)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := d.GetOk("replica_configuration"); ok {
|
|
|
|
_replicaConfigurationList := v.([]interface{})
|
|
|
|
|
|
|
|
if len(_replicaConfigurationList) == 1 && _replicaConfigurationList[0] != nil {
|
|
|
|
replicaConfiguration := &sqladmin.ReplicaConfiguration{}
|
|
|
|
mySqlReplicaConfiguration := &sqladmin.MySqlReplicaConfiguration{}
|
|
|
|
_replicaConfiguration := _replicaConfigurationList[0].(map[string]interface{})
|
|
|
|
|
2017-05-22 20:44:25 +00:00
|
|
|
if vp, okp := _replicaConfiguration["failover_target"]; okp {
|
|
|
|
replicaConfiguration.FailoverTarget = vp.(bool)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if vp, okp := _replicaConfiguration["ca_certificate"]; okp {
|
|
|
|
mySqlReplicaConfiguration.CaCertificate = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["client_certificate"]; okp {
|
|
|
|
mySqlReplicaConfiguration.ClientCertificate = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["client_key"]; okp {
|
|
|
|
mySqlReplicaConfiguration.ClientKey = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["connect_retry_interval"]; okp {
|
|
|
|
mySqlReplicaConfiguration.ConnectRetryInterval = int64(vp.(int))
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["dump_file_path"]; okp {
|
|
|
|
mySqlReplicaConfiguration.DumpFilePath = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["master_heartbeat_period"]; okp {
|
|
|
|
mySqlReplicaConfiguration.MasterHeartbeatPeriod = int64(vp.(int))
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["password"]; okp {
|
|
|
|
mySqlReplicaConfiguration.Password = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["ssl_cipher"]; okp {
|
|
|
|
mySqlReplicaConfiguration.SslCipher = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["username"]; okp {
|
|
|
|
mySqlReplicaConfiguration.Username = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _replicaConfiguration["verify_server_certificate"]; okp {
|
|
|
|
mySqlReplicaConfiguration.VerifyServerCertificate = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
replicaConfiguration.MysqlReplicaConfiguration = mySqlReplicaConfiguration
|
|
|
|
instance.ReplicaConfiguration = replicaConfiguration
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := d.GetOk("master_instance_name"); ok {
|
|
|
|
instance.MasterInstanceName = v.(string)
|
|
|
|
}
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
op, err := config.clientSqlAdmin.Instances.Insert(project, instance).Do()
|
2015-10-23 14:10:41 +00:00
|
|
|
if err != nil {
|
2016-01-08 16:54:55 +00:00
|
|
|
if gerr, ok := err.(*googleapi.Error); ok && gerr.Code == 409 {
|
|
|
|
return fmt.Errorf("Error, the name %s is unavailable because it was used recently", instance.Name)
|
|
|
|
} else {
|
|
|
|
return fmt.Errorf("Error, failed to create instance %s: %s", instance.Name, err)
|
|
|
|
}
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
d.SetId(instance.Name)
|
|
|
|
|
2018-04-03 21:44:18 +00:00
|
|
|
err = sqladminOperationWaitTime(config, op, project, "Create Instance", int(d.Timeout(schema.TimeoutCreate).Minutes()))
|
2015-10-23 14:10:41 +00:00
|
|
|
if err != nil {
|
2017-08-01 20:13:09 +00:00
|
|
|
d.SetId("")
|
2015-10-23 14:10:41 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-02-01 06:21:11 +00:00
|
|
|
err = resourceSqlDatabaseInstanceRead(d, meta)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-09-07 19:44:17 +00:00
|
|
|
// If a default root user was created with a wildcard ('%') hostname, delete it. Note that if the resource is a
|
|
|
|
// replica, then any users are inherited from the master instance and should be left alone.
|
|
|
|
if !sqlResourceIsReplica(d) {
|
2017-10-03 19:41:04 +00:00
|
|
|
var users *sqladmin.UsersListResponse
|
2018-03-23 18:19:39 +00:00
|
|
|
err = retryTime(func() error {
|
2017-10-03 19:41:04 +00:00
|
|
|
users, err = config.clientSqlAdmin.Users.List(project, instance.Name).Do()
|
|
|
|
return err
|
2018-04-25 19:24:52 +00:00
|
|
|
}, 5)
|
2017-09-07 19:44:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error, attempting to list users associated with instance %s: %s", instance.Name, err)
|
|
|
|
}
|
|
|
|
for _, u := range users.Items {
|
|
|
|
if u.Name == "root" && u.Host == "%" {
|
2017-10-03 19:41:04 +00:00
|
|
|
err = retry(func() error {
|
|
|
|
op, err = config.clientSqlAdmin.Users.Delete(project, instance.Name, u.Host, u.Name).Do()
|
|
|
|
if err == nil {
|
2018-04-03 21:44:18 +00:00
|
|
|
err = sqladminOperationWaitTime(config, op, project, "Delete default root User", int(d.Timeout(schema.TimeoutCreate).Minutes()))
|
2017-10-03 19:41:04 +00:00
|
|
|
}
|
|
|
|
return err
|
|
|
|
})
|
2017-09-07 19:44:17 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error, failed to delete default 'root'@'*' user, but the database was created successfully: %s", err)
|
|
|
|
}
|
2017-02-01 06:21:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func resourceSqlDatabaseInstanceRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
instance, err := config.clientSqlAdmin.Instances.Get(project,
|
2017-06-22 17:25:26 +00:00
|
|
|
d.Id()).Do()
|
2015-10-23 14:10:41 +00:00
|
|
|
|
|
|
|
if err != nil {
|
2017-05-09 23:00:47 +00:00
|
|
|
return handleNotFoundError(err, d, fmt.Sprintf("SQL Database Instance %q", d.Get("name").(string)))
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
|
2017-06-22 17:25:26 +00:00
|
|
|
d.Set("name", instance.Name)
|
|
|
|
d.Set("region", instance.Region)
|
|
|
|
d.Set("database_version", instance.DatabaseVersion)
|
2017-09-12 15:04:13 +00:00
|
|
|
d.Set("connection_name", instance.ConnectionName)
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if err := d.Set("settings", flattenSettings(instance.Settings)); err != nil {
|
|
|
|
log.Printf("[WARN] Failed to set SQL Database Instance Settings")
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
2018-03-02 01:12:33 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if err := d.Set("replica_configuration", flattenReplicaConfiguration(instance.ReplicaConfiguration)); err != nil {
|
|
|
|
log.Printf("[WARN] Failed to set SQL Database Instance Replica Configuration")
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
2018-03-02 01:12:33 +00:00
|
|
|
|
|
|
|
ipAddresses := flattenIpAddresses(instance.IpAddresses)
|
|
|
|
if err := d.Set("ip_address", ipAddresses); err != nil {
|
2017-08-01 20:13:09 +00:00
|
|
|
log.Printf("[WARN] Failed to set SQL Database Instance IP Addresses")
|
2017-02-01 16:20:31 +00:00
|
|
|
}
|
|
|
|
|
2018-03-02 01:12:33 +00:00
|
|
|
if len(ipAddresses) > 0 {
|
|
|
|
firstIpAddress := ipAddresses[0]["ip_address"]
|
|
|
|
if err := d.Set("first_ip_address", firstIpAddress); err != nil {
|
|
|
|
log.Printf("[WARN] Failed to set SQL Database Instance First IP Address")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-29 21:53:54 +00:00
|
|
|
if err := d.Set("server_ca_cert", flattenServerCaCert(instance.ServerCaCert)); err != nil {
|
|
|
|
log.Printf("[WARN] Failed to set SQL Database CA Certificate")
|
|
|
|
}
|
|
|
|
|
2017-06-22 17:25:26 +00:00
|
|
|
d.Set("master_instance_name", strings.TrimPrefix(instance.MasterInstanceName, project+":"))
|
2017-11-28 00:32:20 +00:00
|
|
|
d.Set("project", project)
|
2015-10-23 14:10:41 +00:00
|
|
|
d.Set("self_link", instance.SelfLink)
|
|
|
|
d.SetId(instance.Name)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceSqlDatabaseInstanceUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
2016-04-10 16:59:57 +00:00
|
|
|
|
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
d.Partial(true)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
instance, err := config.clientSqlAdmin.Instances.Get(project,
|
2015-10-23 14:10:41 +00:00
|
|
|
d.Get("name").(string)).Do()
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error retrieving instance %s: %s",
|
|
|
|
d.Get("name").(string), err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if d.HasChange("settings") {
|
|
|
|
_oListCast, _settingsListCast := d.GetChange("settings")
|
|
|
|
_oList := _oListCast.([]interface{})
|
|
|
|
_o := _oList[0].(map[string]interface{})
|
|
|
|
_settingsList := _settingsListCast.([]interface{})
|
|
|
|
|
|
|
|
_settings := _settingsList[0].(map[string]interface{})
|
2018-01-24 17:23:48 +00:00
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
settings := &sqladmin.Settings{
|
2018-01-24 17:23:48 +00:00
|
|
|
Tier: _settings["tier"].(string),
|
|
|
|
SettingsVersion: instance.Settings.SettingsVersion,
|
|
|
|
ForceSendFields: []string{"StorageAutoResize"},
|
|
|
|
}
|
|
|
|
|
|
|
|
if !isFirstGen(d) {
|
|
|
|
autoResize := _settings["disk_autoresize"].(bool)
|
|
|
|
settings.StorageAutoResize = &autoResize
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["activation_policy"]; ok {
|
|
|
|
settings.ActivationPolicy = v.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["authorized_gae_applications"]; ok {
|
|
|
|
settings.AuthorizedGaeApplications = make([]string, 0)
|
|
|
|
for _, app := range v.([]interface{}) {
|
|
|
|
settings.AuthorizedGaeApplications = append(settings.AuthorizedGaeApplications,
|
|
|
|
app.(string))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
if v, ok := _settings["availability_type"]; ok {
|
|
|
|
settings.AvailabilityType = v.(string)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := _settings["backup_configuration"]; ok {
|
|
|
|
_backupConfigurationList := v.([]interface{})
|
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
settings.BackupConfiguration = &sqladmin.BackupConfiguration{}
|
2015-10-23 14:10:41 +00:00
|
|
|
if len(_backupConfigurationList) == 1 && _backupConfigurationList[0] != nil {
|
|
|
|
_backupConfiguration := _backupConfigurationList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["binary_log_enabled"]; okp {
|
|
|
|
settings.BackupConfiguration.BinaryLogEnabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["enabled"]; okp {
|
|
|
|
settings.BackupConfiguration.Enabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _backupConfiguration["start_time"]; okp {
|
|
|
|
settings.BackupConfiguration.StartTime = vp.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["crash_safe_replication"]; ok {
|
|
|
|
settings.CrashSafeReplicationEnabled = v.(bool)
|
|
|
|
}
|
|
|
|
|
2017-02-01 16:20:31 +00:00
|
|
|
if v, ok := _settings["disk_size"]; ok {
|
|
|
|
if v.(int) > 0 && int64(v.(int)) > instance.Settings.DataDiskSizeGb {
|
|
|
|
settings.DataDiskSizeGb = int64(v.(int))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["disk_type"]; ok && len(v.(string)) > 0 {
|
|
|
|
settings.DataDiskType = v.(string)
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
_oldDatabaseFlags := make([]interface{}, 0)
|
|
|
|
if ov, ook := _o["database_flags"]; ook {
|
|
|
|
_oldDatabaseFlags = ov.([]interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["database_flags"]; ok || len(_oldDatabaseFlags) > 0 {
|
|
|
|
oldDatabaseFlags := settings.DatabaseFlags
|
|
|
|
settings.DatabaseFlags = make([]*sqladmin.DatabaseFlags, 0)
|
|
|
|
_databaseFlagsList := make([]interface{}, 0)
|
|
|
|
if v != nil {
|
|
|
|
_databaseFlagsList = v.([]interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
_odbf_map := make(map[string]interface{})
|
|
|
|
for _, _dbf := range _oldDatabaseFlags {
|
|
|
|
_entry := _dbf.(map[string]interface{})
|
|
|
|
_odbf_map[_entry["name"].(string)] = true
|
|
|
|
}
|
|
|
|
|
|
|
|
// First read the flags from the server, and reinsert those that
|
|
|
|
// were not previously defined
|
|
|
|
for _, entry := range oldDatabaseFlags {
|
|
|
|
_, ok_old := _odbf_map[entry.Name]
|
|
|
|
if !ok_old {
|
|
|
|
settings.DatabaseFlags = append(
|
|
|
|
settings.DatabaseFlags, entry)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// finally, insert only those that were previously defined
|
|
|
|
// and are still defined.
|
|
|
|
for _, _flag := range _databaseFlagsList {
|
|
|
|
_entry := _flag.(map[string]interface{})
|
|
|
|
flag := &sqladmin.DatabaseFlags{}
|
|
|
|
if vp, okp := _entry["name"]; okp {
|
|
|
|
flag.Name = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _entry["value"]; okp {
|
|
|
|
flag.Value = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
settings.DatabaseFlags = append(settings.DatabaseFlags, flag)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["ip_configuration"]; ok {
|
|
|
|
_ipConfigurationList := v.([]interface{})
|
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
settings.IpConfiguration = &sqladmin.IpConfiguration{}
|
2015-10-23 14:10:41 +00:00
|
|
|
if len(_ipConfigurationList) == 1 && _ipConfigurationList[0] != nil {
|
|
|
|
_ipConfiguration := _ipConfigurationList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["ipv4_enabled"]; okp {
|
|
|
|
settings.IpConfiguration.Ipv4Enabled = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["require_ssl"]; okp {
|
|
|
|
settings.IpConfiguration.RequireSsl = vp.(bool)
|
|
|
|
}
|
|
|
|
|
|
|
|
_oldAuthorizedNetworkList := make([]interface{}, 0)
|
|
|
|
if ov, ook := _o["ip_configuration"]; ook {
|
|
|
|
_oldIpConfList := ov.([]interface{})
|
|
|
|
if len(_oldIpConfList) > 0 {
|
|
|
|
_oldIpConf := _oldIpConfList[0].(map[string]interface{})
|
|
|
|
if ovp, ookp := _oldIpConf["authorized_networks"]; ookp {
|
2017-11-13 20:51:15 +00:00
|
|
|
_oldAuthorizedNetworkList = ovp.(*schema.Set).List()
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _ipConfiguration["authorized_networks"]; okp || len(_oldAuthorizedNetworkList) > 0 {
|
2016-08-18 16:01:38 +00:00
|
|
|
oldAuthorizedNetworks := instance.Settings.IpConfiguration.AuthorizedNetworks
|
2015-10-23 14:10:41 +00:00
|
|
|
settings.IpConfiguration.AuthorizedNetworks = make([]*sqladmin.AclEntry, 0)
|
|
|
|
|
|
|
|
_authorizedNetworksList := make([]interface{}, 0)
|
|
|
|
if vp != nil {
|
2017-11-13 20:51:15 +00:00
|
|
|
_authorizedNetworksList = vp.(*schema.Set).List()
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
_oipc_map := make(map[string]interface{})
|
|
|
|
for _, _ipc := range _oldAuthorizedNetworkList {
|
|
|
|
_entry := _ipc.(map[string]interface{})
|
|
|
|
_oipc_map[_entry["value"].(string)] = true
|
|
|
|
}
|
|
|
|
// Next read the network tuples from the server, and reinsert those that
|
|
|
|
// were not previously defined
|
|
|
|
for _, entry := range oldAuthorizedNetworks {
|
|
|
|
_, ok_old := _oipc_map[entry.Value]
|
|
|
|
if !ok_old {
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks = append(
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks, entry)
|
|
|
|
}
|
|
|
|
}
|
2016-08-18 16:01:38 +00:00
|
|
|
// finally, update old entries and insert new ones
|
2015-10-23 14:10:41 +00:00
|
|
|
// and are still defined.
|
|
|
|
for _, _ipc := range _authorizedNetworksList {
|
|
|
|
_entry := _ipc.(map[string]interface{})
|
2016-08-18 16:01:38 +00:00
|
|
|
entry := &sqladmin.AclEntry{}
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2016-08-18 16:01:38 +00:00
|
|
|
if vpp, okpp := _entry["expiration_time"]; okpp {
|
|
|
|
entry.ExpirationTime = vpp.(string)
|
|
|
|
}
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2016-08-18 16:01:38 +00:00
|
|
|
if vpp, okpp := _entry["name"]; okpp {
|
|
|
|
entry.Name = vpp.(string)
|
|
|
|
}
|
2015-10-23 14:10:41 +00:00
|
|
|
|
2016-08-18 16:01:38 +00:00
|
|
|
if vpp, okpp := _entry["value"]; okpp {
|
|
|
|
entry.Value = vpp.(string)
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
2016-08-18 16:01:38 +00:00
|
|
|
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks = append(
|
|
|
|
settings.IpConfiguration.AuthorizedNetworks, entry)
|
2015-10-23 14:10:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["location_preference"]; ok {
|
|
|
|
_locationPreferenceList := v.([]interface{})
|
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
settings.LocationPreference = &sqladmin.LocationPreference{}
|
2015-10-23 14:10:41 +00:00
|
|
|
if len(_locationPreferenceList) == 1 && _locationPreferenceList[0] != nil {
|
|
|
|
_locationPreference := _locationPreferenceList[0].(map[string]interface{})
|
|
|
|
|
|
|
|
if vp, okp := _locationPreference["follow_gae_application"]; okp {
|
|
|
|
settings.LocationPreference.FollowGaeApplication = vp.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if vp, okp := _locationPreference["zone"]; okp {
|
|
|
|
settings.LocationPreference.Zone = vp.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-02-17 23:33:47 +00:00
|
|
|
if v, ok := _settings["maintenance_window"]; ok && len(v.([]interface{})) > 0 {
|
2017-08-01 20:13:09 +00:00
|
|
|
_maintenanceWindowList := v.([]interface{})
|
|
|
|
|
2017-02-17 23:33:47 +00:00
|
|
|
settings.MaintenanceWindow = &sqladmin.MaintenanceWindow{}
|
2017-08-01 20:13:09 +00:00
|
|
|
if len(_maintenanceWindowList) == 1 && _maintenanceWindowList[0] != nil {
|
|
|
|
_maintenanceWindow := _maintenanceWindowList[0].(map[string]interface{})
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if vp, okp := _maintenanceWindow["day"]; okp {
|
|
|
|
settings.MaintenanceWindow.Day = int64(vp.(int))
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if vp, okp := _maintenanceWindow["hour"]; okp {
|
|
|
|
settings.MaintenanceWindow.Hour = int64(vp.(int))
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if vp, ok := _maintenanceWindow["update_track"]; ok {
|
|
|
|
if len(vp.(string)) > 0 {
|
|
|
|
settings.MaintenanceWindow.UpdateTrack = vp.(string)
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
if v, ok := _settings["pricing_plan"]; ok {
|
|
|
|
settings.PricingPlan = v.(string)
|
|
|
|
}
|
|
|
|
|
|
|
|
if v, ok := _settings["replication_type"]; ok {
|
|
|
|
settings.ReplicationType = v.(string)
|
|
|
|
}
|
|
|
|
|
2018-05-30 22:32:11 +00:00
|
|
|
if v, ok := _settings["user_labels"]; ok {
|
|
|
|
settings.UserLabels = convertStringMap(v.(map[string]interface{}))
|
|
|
|
}
|
|
|
|
|
2015-10-23 14:10:41 +00:00
|
|
|
instance.Settings = settings
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Partial(false)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
op, err := config.clientSqlAdmin.Instances.Update(project, instance.Name, instance).Do()
|
2015-10-23 14:10:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error, failed to update instance %s: %s", instance.Name, err)
|
|
|
|
}
|
|
|
|
|
2018-04-03 21:44:18 +00:00
|
|
|
err = sqladminOperationWaitTime(config, op, project, "Update Instance", int(d.Timeout(schema.TimeoutUpdate).Minutes()))
|
2015-10-23 14:10:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return resourceSqlDatabaseInstanceRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceSqlDatabaseInstanceDelete(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
op, err := config.clientSqlAdmin.Instances.Delete(project, d.Get("name").(string)).Do()
|
2015-10-23 14:10:41 +00:00
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error, failed to delete instance %s: %s", d.Get("name").(string), err)
|
|
|
|
}
|
|
|
|
|
2018-04-03 21:44:18 +00:00
|
|
|
err = sqladminOperationWaitTime(config, op, project, "Delete Instance", int(d.Timeout(schema.TimeoutDelete).Minutes()))
|
2015-10-23 14:10:41 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
2017-02-17 23:33:47 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
func flattenSettings(settings *sqladmin.Settings) []map[string]interface{} {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"version": settings.SettingsVersion,
|
|
|
|
"tier": settings.Tier,
|
|
|
|
"activation_policy": settings.ActivationPolicy,
|
|
|
|
"authorized_gae_applications": settings.AuthorizedGaeApplications,
|
2018-01-24 17:23:48 +00:00
|
|
|
"availability_type": settings.AvailabilityType,
|
2017-08-01 20:13:09 +00:00
|
|
|
"crash_safe_replication": settings.CrashSafeReplicationEnabled,
|
|
|
|
"disk_type": settings.DataDiskType,
|
|
|
|
"disk_size": settings.DataDiskSizeGb,
|
|
|
|
"pricing_plan": settings.PricingPlan,
|
|
|
|
"replication_type": settings.ReplicationType,
|
2018-05-30 22:32:11 +00:00
|
|
|
"user_labels": settings.UserLabels,
|
2017-08-01 20:13:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if settings.BackupConfiguration != nil {
|
|
|
|
data["backup_configuration"] = flattenBackupConfiguration(settings.BackupConfiguration)
|
|
|
|
}
|
|
|
|
|
|
|
|
if settings.DatabaseFlags != nil {
|
|
|
|
data["database_flags"] = flattenDatabaseFlags(settings.DatabaseFlags)
|
|
|
|
}
|
|
|
|
|
|
|
|
if settings.IpConfiguration != nil {
|
|
|
|
data["ip_configuration"] = flattenIpConfiguration(settings.IpConfiguration)
|
|
|
|
}
|
|
|
|
|
|
|
|
if settings.LocationPreference != nil {
|
|
|
|
data["location_preference"] = flattenLocationPreference(settings.LocationPreference)
|
|
|
|
}
|
2018-01-24 17:23:48 +00:00
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
if settings.MaintenanceWindow != nil {
|
|
|
|
data["maintenance_window"] = flattenMaintenanceWindow(settings.MaintenanceWindow)
|
|
|
|
}
|
|
|
|
|
2018-01-24 17:23:48 +00:00
|
|
|
if settings.StorageAutoResize != nil {
|
|
|
|
data["disk_autoresize"] = *settings.StorageAutoResize
|
|
|
|
}
|
|
|
|
|
2018-05-30 22:32:11 +00:00
|
|
|
if settings.UserLabels != nil {
|
|
|
|
data["user_labels"] = settings.UserLabels
|
|
|
|
}
|
|
|
|
|
2017-08-01 20:13:09 +00:00
|
|
|
return []map[string]interface{}{data}
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenBackupConfiguration(backupConfiguration *sqladmin.BackupConfiguration) []map[string]interface{} {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"binary_log_enabled": backupConfiguration.BinaryLogEnabled,
|
|
|
|
"enabled": backupConfiguration.Enabled,
|
|
|
|
"start_time": backupConfiguration.StartTime,
|
|
|
|
}
|
|
|
|
|
|
|
|
return []map[string]interface{}{data}
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenDatabaseFlags(databaseFlags []*sqladmin.DatabaseFlags) []map[string]interface{} {
|
|
|
|
flags := make([]map[string]interface{}, 0, len(databaseFlags))
|
|
|
|
|
|
|
|
for _, flag := range databaseFlags {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"name": flag.Name,
|
|
|
|
"value": flag.Value,
|
|
|
|
}
|
|
|
|
|
|
|
|
flags = append(flags, data)
|
|
|
|
}
|
|
|
|
|
|
|
|
return flags
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenIpConfiguration(ipConfiguration *sqladmin.IpConfiguration) interface{} {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"ipv4_enabled": ipConfiguration.Ipv4Enabled,
|
|
|
|
"require_ssl": ipConfiguration.RequireSsl,
|
|
|
|
}
|
|
|
|
|
|
|
|
if ipConfiguration.AuthorizedNetworks != nil {
|
|
|
|
data["authorized_networks"] = flattenAuthorizedNetworks(ipConfiguration.AuthorizedNetworks)
|
|
|
|
}
|
|
|
|
|
|
|
|
return []map[string]interface{}{data}
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenAuthorizedNetworks(entries []*sqladmin.AclEntry) interface{} {
|
2017-11-13 20:51:15 +00:00
|
|
|
networks := schema.NewSet(schema.HashResource(sqlDatabaseAuthorizedNetWorkSchemaElem), []interface{}{})
|
2017-08-01 20:13:09 +00:00
|
|
|
|
|
|
|
for _, entry := range entries {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"expiration_time": entry.ExpirationTime,
|
|
|
|
"name": entry.Name,
|
|
|
|
"value": entry.Value,
|
|
|
|
}
|
|
|
|
|
2017-11-13 20:51:15 +00:00
|
|
|
networks.Add(data)
|
2017-08-01 20:13:09 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return networks
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenLocationPreference(locationPreference *sqladmin.LocationPreference) interface{} {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"follow_gae_application": locationPreference.FollowGaeApplication,
|
|
|
|
"zone": locationPreference.Zone,
|
|
|
|
}
|
|
|
|
|
|
|
|
return []map[string]interface{}{data}
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenMaintenanceWindow(maintenanceWindow *sqladmin.MaintenanceWindow) interface{} {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"day": maintenanceWindow.Day,
|
|
|
|
"hour": maintenanceWindow.Hour,
|
|
|
|
"update_track": maintenanceWindow.UpdateTrack,
|
|
|
|
}
|
|
|
|
|
|
|
|
return []map[string]interface{}{data}
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenReplicaConfiguration(replicaConfiguration *sqladmin.ReplicaConfiguration) []map[string]interface{} {
|
|
|
|
rc := []map[string]interface{}{}
|
|
|
|
|
|
|
|
if replicaConfiguration != nil {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"failover_target": replicaConfiguration.FailoverTarget,
|
|
|
|
|
|
|
|
// Don't attempt to assign anything from replicaConfiguration.MysqlReplicaConfiguration,
|
|
|
|
// since those fields are set on create and then not stored. See description at
|
|
|
|
// https://cloud.google.com/sql/docs/mysql/admin-api/v1beta4/instances
|
|
|
|
}
|
|
|
|
rc = append(rc, data)
|
|
|
|
}
|
|
|
|
|
|
|
|
return rc
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenIpAddresses(ipAddresses []*sqladmin.IpMapping) []map[string]interface{} {
|
2017-08-25 16:13:37 +00:00
|
|
|
var ips []map[string]interface{}
|
2017-08-01 20:13:09 +00:00
|
|
|
|
|
|
|
for _, ip := range ipAddresses {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"ip_address": ip.IpAddress,
|
|
|
|
"time_to_retire": ip.TimeToRetire,
|
|
|
|
}
|
|
|
|
|
|
|
|
ips = append(ips, data)
|
|
|
|
}
|
|
|
|
|
|
|
|
return ips
|
|
|
|
}
|
|
|
|
|
2018-01-29 21:53:54 +00:00
|
|
|
func flattenServerCaCert(caCert *sqladmin.SslCert) []map[string]interface{} {
|
|
|
|
var cert []map[string]interface{}
|
|
|
|
|
|
|
|
if caCert != nil {
|
|
|
|
data := map[string]interface{}{
|
|
|
|
"cert": caCert.Cert,
|
|
|
|
"common_name": caCert.CommonName,
|
|
|
|
"create_time": caCert.CreateTime,
|
|
|
|
"expiration_time": caCert.ExpirationTime,
|
|
|
|
"sha1_fingerprint": caCert.Sha1Fingerprint,
|
|
|
|
}
|
|
|
|
|
|
|
|
cert = append(cert, data)
|
|
|
|
}
|
|
|
|
|
|
|
|
return cert
|
|
|
|
}
|
|
|
|
|
2017-05-31 19:19:27 +00:00
|
|
|
func instanceMutexKey(project, instance_name string) string {
|
|
|
|
return fmt.Sprintf("google-sql-database-instance-%s-%s", project, instance_name)
|
|
|
|
}
|
2017-09-07 19:44:17 +00:00
|
|
|
|
|
|
|
// sqlResourceIsReplica returns true if the provided schema.ResourceData represents a replica SQL instance, and false
|
|
|
|
// otherwise.
|
|
|
|
func sqlResourceIsReplica(d *schema.ResourceData) bool {
|
|
|
|
_, ok := d.GetOk("master_instance_name")
|
|
|
|
return ok
|
|
|
|
}
|