2018-06-29 23:27:01 +00:00
|
|
|
// ----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// *** AUTO GENERATED CODE *** AUTO GENERATED CODE ***
|
|
|
|
//
|
|
|
|
// ----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// This file is automatically generated by Magic Modules and manual
|
|
|
|
// changes will be clobbered when the file is regenerated.
|
|
|
|
//
|
|
|
|
// Please read more about how to change this file in
|
|
|
|
// .github/CONTRIBUTING.md.
|
|
|
|
//
|
|
|
|
// ----------------------------------------------------------------------------
|
|
|
|
|
2015-09-04 20:54:18 +00:00
|
|
|
package google
|
|
|
|
|
|
|
|
import (
|
2016-03-08 05:35:08 +00:00
|
|
|
"bytes"
|
2015-09-04 20:54:18 +00:00
|
|
|
"fmt"
|
2018-06-29 23:27:01 +00:00
|
|
|
"log"
|
2016-03-08 05:35:08 +00:00
|
|
|
"net"
|
2018-06-29 23:27:01 +00:00
|
|
|
"reflect"
|
|
|
|
"strconv"
|
2017-01-27 14:32:42 +00:00
|
|
|
"strings"
|
2018-06-29 23:27:01 +00:00
|
|
|
"time"
|
2015-09-04 20:54:18 +00:00
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2018-06-29 23:27:01 +00:00
|
|
|
compute "google.golang.org/api/compute/v1"
|
2015-09-04 20:54:18 +00:00
|
|
|
)
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
// validatePeerAddr returns false if a tunnel's peer_ip property
|
|
|
|
// is invalid. Currently, only addresses that collide with RFC
|
|
|
|
// 5735 (https://tools.ietf.org/html/rfc5735) fail validation.
|
|
|
|
func validatePeerAddr(i interface{}, val string) ([]string, []error) {
|
|
|
|
ip := net.ParseIP(i.(string))
|
|
|
|
if ip == nil {
|
|
|
|
return nil, []error{fmt.Errorf("could not parse %q to IP address", val)}
|
|
|
|
}
|
|
|
|
for _, test := range invalidPeerAddrs {
|
|
|
|
if bytes.Compare(ip, test.from) >= 0 && bytes.Compare(ip, test.to) <= 0 {
|
|
|
|
return nil, []error{fmt.Errorf("address is invalid (is between %q and %q, conflicting with RFC5735)", test.from, test.to)}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// invalidPeerAddrs is a collection of IP addres ranges that represent
|
|
|
|
// a conflict with RFC 5735 (https://tools.ietf.org/html/rfc5735#page-3).
|
|
|
|
// CIDR range notations in the RFC were converted to a (from, to) pair
|
|
|
|
// for easy checking with bytes.Compare.
|
|
|
|
var invalidPeerAddrs = []struct {
|
|
|
|
from net.IP
|
|
|
|
to net.IP
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
from: net.ParseIP("0.0.0.0"),
|
|
|
|
to: net.ParseIP("0.255.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("10.0.0.0"),
|
|
|
|
to: net.ParseIP("10.255.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("127.0.0.0"),
|
|
|
|
to: net.ParseIP("127.255.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("169.254.0.0"),
|
|
|
|
to: net.ParseIP("169.254.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("172.16.0.0"),
|
|
|
|
to: net.ParseIP("172.31.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("192.0.0.0"),
|
|
|
|
to: net.ParseIP("192.0.0.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("192.0.2.0"),
|
|
|
|
to: net.ParseIP("192.0.2.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("192.88.99.0"),
|
|
|
|
to: net.ParseIP("192.88.99.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("192.168.0.0"),
|
|
|
|
to: net.ParseIP("192.168.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("198.18.0.0"),
|
|
|
|
to: net.ParseIP("198.19.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("198.51.100.0"),
|
|
|
|
to: net.ParseIP("198.51.100.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("203.0.113.0"),
|
|
|
|
to: net.ParseIP("203.0.113.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("224.0.0.0"),
|
|
|
|
to: net.ParseIP("239.255.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("240.0.0.0"),
|
|
|
|
to: net.ParseIP("255.255.255.255"),
|
|
|
|
},
|
|
|
|
{
|
|
|
|
from: net.ParseIP("255.255.255.255"),
|
|
|
|
to: net.ParseIP("255.255.255.255"),
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
func getVpnTunnelLink(config *Config, project string, region string, tunnel string) (string, error) {
|
|
|
|
if !strings.HasPrefix(tunnel, "https://www.googleapis.com/compute/") {
|
|
|
|
// Tunnel value provided is just the name, lookup the tunnel SelfLink
|
|
|
|
tunnelData, err := config.clientCompute.VpnTunnels.Get(
|
|
|
|
project, region, tunnel).Do()
|
|
|
|
if err != nil {
|
|
|
|
return "", fmt.Errorf("Error reading tunnel: %s", err)
|
|
|
|
}
|
|
|
|
tunnel = tunnelData.SelfLink
|
|
|
|
}
|
|
|
|
|
|
|
|
return tunnel, nil
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-09-04 20:54:18 +00:00
|
|
|
func resourceComputeVpnTunnel() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceComputeVpnTunnelCreate,
|
|
|
|
Read: resourceComputeVpnTunnelRead,
|
2018-06-29 23:27:01 +00:00
|
|
|
Update: resourceComputeVpnTunnelUpdate,
|
2015-09-04 20:54:18 +00:00
|
|
|
Delete: resourceComputeVpnTunnelDelete,
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
Importer: &schema.ResourceImporter{
|
|
|
|
State: resourceComputeVpnTunnelImport,
|
|
|
|
},
|
|
|
|
|
|
|
|
Timeouts: &schema.ResourceTimeout{
|
|
|
|
Create: schema.DefaultTimeout(240 * time.Second),
|
|
|
|
Update: schema.DefaultTimeout(240 * time.Second),
|
|
|
|
Delete: schema.DefaultTimeout(240 * time.Second),
|
|
|
|
},
|
|
|
|
|
2015-09-04 20:54:18 +00:00
|
|
|
Schema: map[string]*schema.Schema{
|
2018-06-29 23:27:01 +00:00
|
|
|
"name": {
|
2015-09-04 20:54:18 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"peer_ip": {
|
2016-03-08 05:35:08 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
ValidateFunc: validatePeerAddr,
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"shared_secret": {
|
2017-10-10 11:54:47 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
2018-06-29 23:27:01 +00:00
|
|
|
Sensitive: true,
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"target_vpn_gateway": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
DiffSuppressFunc: compareSelfLinkOrResourceName,
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"description": {
|
2016-04-10 21:34:15 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"ike_version": {
|
2015-09-04 20:54:18 +00:00
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2018-06-29 23:27:01 +00:00
|
|
|
Default: 2,
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
2018-09-20 20:22:36 +00:00
|
|
|
"labels": {
|
|
|
|
Type: schema.TypeMap,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"local_traffic_selector": {
|
2016-02-15 03:17:55 +00:00
|
|
|
Type: schema.TypeSet,
|
2018-06-29 23:27:01 +00:00
|
|
|
Computed: true,
|
2016-02-15 03:17:55 +00:00
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2018-06-29 23:27:01 +00:00
|
|
|
Elem: &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
},
|
|
|
|
Set: schema.HashString,
|
2016-02-15 03:17:55 +00:00
|
|
|
},
|
2018-09-20 20:22:36 +00:00
|
|
|
"region": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
DiffSuppressFunc: compareSelfLinkOrResourceName,
|
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"remote_traffic_selector": {
|
2017-01-04 09:35:44 +00:00
|
|
|
Type: schema.TypeSet,
|
2018-06-29 23:27:01 +00:00
|
|
|
Computed: true,
|
2017-01-04 09:35:44 +00:00
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2018-06-29 23:27:01 +00:00
|
|
|
Elem: &schema.Schema{
|
|
|
|
Type: schema.TypeString,
|
|
|
|
},
|
|
|
|
Set: schema.HashString,
|
|
|
|
},
|
2018-09-20 20:22:36 +00:00
|
|
|
"router": {
|
2018-06-29 23:27:01 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
|
|
|
DiffSuppressFunc: compareSelfLinkOrResourceName,
|
|
|
|
},
|
|
|
|
"creation_timestamp": {
|
2015-09-04 20:54:18 +00:00
|
|
|
Type: schema.TypeString,
|
2017-11-28 00:32:20 +00:00
|
|
|
Computed: true,
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"detailed_status": {
|
2016-04-10 16:59:57 +00:00
|
|
|
Type: schema.TypeString,
|
2017-11-28 00:32:20 +00:00
|
|
|
Computed: true,
|
2016-04-10 16:59:57 +00:00
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"label_fingerprint": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"shared_secret_hash": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
"project": {
|
2017-01-27 14:32:42 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2018-06-29 23:27:01 +00:00
|
|
|
Computed: true,
|
2017-01-27 14:32:42 +00:00
|
|
|
ForceNew: true,
|
|
|
|
},
|
2018-06-29 23:27:01 +00:00
|
|
|
"self_link": {
|
2016-04-10 16:59:57 +00:00
|
|
|
Type: schema.TypeString,
|
2016-04-10 21:34:15 +00:00
|
|
|
Computed: true,
|
2016-04-10 16:59:57 +00:00
|
|
|
},
|
2015-09-04 20:54:18 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeVpnTunnelCreate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
obj := make(map[string]interface{})
|
|
|
|
nameProp, err := expandComputeVpnTunnelName(d.Get("name"), d, config)
|
2016-04-10 16:59:57 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2018-06-29 23:27:01 +00:00
|
|
|
} else if v, ok := d.GetOkExists("name"); !isEmptyValue(reflect.ValueOf(nameProp)) && (ok || !reflect.DeepEqual(v, nameProp)) {
|
|
|
|
obj["name"] = nameProp
|
2016-04-10 16:59:57 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
descriptionProp, err := expandComputeVpnTunnelDescription(d.Get("description"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("description"); !isEmptyValue(reflect.ValueOf(descriptionProp)) && (ok || !reflect.DeepEqual(v, descriptionProp)) {
|
|
|
|
obj["description"] = descriptionProp
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
targetVpnGatewayProp, err := expandComputeVpnTunnelTargetVpnGateway(d.Get("target_vpn_gateway"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("target_vpn_gateway"); !isEmptyValue(reflect.ValueOf(targetVpnGatewayProp)) && (ok || !reflect.DeepEqual(v, targetVpnGatewayProp)) {
|
|
|
|
obj["targetVpnGateway"] = targetVpnGatewayProp
|
2016-02-15 03:17:55 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
routerProp, err := expandComputeVpnTunnelRouter(d.Get("router"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("router"); !isEmptyValue(reflect.ValueOf(routerProp)) && (ok || !reflect.DeepEqual(v, routerProp)) {
|
|
|
|
obj["router"] = routerProp
|
2017-01-04 09:35:44 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
peerIpProp, err := expandComputeVpnTunnelPeerIp(d.Get("peer_ip"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("peer_ip"); !isEmptyValue(reflect.ValueOf(peerIpProp)) && (ok || !reflect.DeepEqual(v, peerIpProp)) {
|
|
|
|
obj["peerIp"] = peerIpProp
|
|
|
|
}
|
|
|
|
sharedSecretProp, err := expandComputeVpnTunnelSharedSecret(d.Get("shared_secret"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("shared_secret"); !isEmptyValue(reflect.ValueOf(sharedSecretProp)) && (ok || !reflect.DeepEqual(v, sharedSecretProp)) {
|
|
|
|
obj["sharedSecret"] = sharedSecretProp
|
|
|
|
}
|
|
|
|
ikeVersionProp, err := expandComputeVpnTunnelIkeVersion(d.Get("ike_version"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("ike_version"); !isEmptyValue(reflect.ValueOf(ikeVersionProp)) && (ok || !reflect.DeepEqual(v, ikeVersionProp)) {
|
|
|
|
obj["ikeVersion"] = ikeVersionProp
|
|
|
|
}
|
|
|
|
localTrafficSelectorProp, err := expandComputeVpnTunnelLocalTrafficSelector(d.Get("local_traffic_selector"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("local_traffic_selector"); !isEmptyValue(reflect.ValueOf(localTrafficSelectorProp)) && (ok || !reflect.DeepEqual(v, localTrafficSelectorProp)) {
|
|
|
|
obj["localTrafficSelector"] = localTrafficSelectorProp
|
|
|
|
}
|
|
|
|
remoteTrafficSelectorProp, err := expandComputeVpnTunnelRemoteTrafficSelector(d.Get("remote_traffic_selector"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("remote_traffic_selector"); !isEmptyValue(reflect.ValueOf(remoteTrafficSelectorProp)) && (ok || !reflect.DeepEqual(v, remoteTrafficSelectorProp)) {
|
|
|
|
obj["remoteTrafficSelector"] = remoteTrafficSelectorProp
|
|
|
|
}
|
|
|
|
labelsProp, err := expandComputeVpnTunnelLabels(d.Get("labels"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("labels"); !isEmptyValue(reflect.ValueOf(labelsProp)) && (ok || !reflect.DeepEqual(v, labelsProp)) {
|
|
|
|
obj["labels"] = labelsProp
|
|
|
|
}
|
2018-10-15 19:44:35 +00:00
|
|
|
labelFingerprintProp, err := expandComputeVpnTunnelLabelFingerprint(d.Get("label_fingerprint"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("label_fingerprint"); !isEmptyValue(reflect.ValueOf(labelFingerprintProp)) && (ok || !reflect.DeepEqual(v, labelFingerprintProp)) {
|
|
|
|
obj["labelFingerprint"] = labelFingerprintProp
|
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
regionProp, err := expandComputeVpnTunnelRegion(d.Get("region"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("region"); !isEmptyValue(reflect.ValueOf(regionProp)) && (ok || !reflect.DeepEqual(v, regionProp)) {
|
|
|
|
obj["region"] = regionProp
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-10-12 16:55:14 +00:00
|
|
|
url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/regions/{{region}}/vpnTunnels")
|
2018-06-29 23:27:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
log.Printf("[DEBUG] Creating new VpnTunnel: %#v", obj)
|
2018-08-08 22:29:10 +00:00
|
|
|
res, err := sendRequest(config, "POST", url, obj)
|
2018-06-29 23:27:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating VpnTunnel: %s", err)
|
2017-01-27 14:32:42 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
// Store the ID now
|
|
|
|
id, err := replaceVars(d, config, "{{name}}")
|
2015-09-04 20:54:18 +00:00
|
|
|
if err != nil {
|
2018-06-29 23:27:01 +00:00
|
|
|
return fmt.Errorf("Error constructing id: %s", err)
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
d.SetId(id)
|
2015-09-04 20:54:18 +00:00
|
|
|
|
2018-08-16 19:16:14 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
op := &compute.Operation{}
|
|
|
|
err = Convert(res, op)
|
2015-09-04 20:54:18 +00:00
|
|
|
if err != nil {
|
2018-06-29 23:27:01 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
waitErr := computeOperationWaitTime(
|
|
|
|
config.clientCompute, op, project, "Creating VpnTunnel",
|
|
|
|
int(d.Timeout(schema.TimeoutCreate).Minutes()))
|
|
|
|
|
|
|
|
if waitErr != nil {
|
|
|
|
// The resource didn't actually create
|
|
|
|
d.SetId("")
|
|
|
|
return fmt.Errorf("Error waiting to create VpnTunnel: %s", waitErr)
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
log.Printf("[DEBUG] Finished creating VpnTunnel %q: %#v", d.Id(), res)
|
|
|
|
|
2015-09-04 20:54:18 +00:00
|
|
|
return resourceComputeVpnTunnelRead(d, meta)
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeVpnTunnelRead(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2018-10-12 16:55:14 +00:00
|
|
|
url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/regions/{{region}}/vpnTunnels/{{name}}")
|
2016-04-10 16:59:57 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-08-08 22:29:10 +00:00
|
|
|
res, err := sendRequest(config, "GET", url, nil)
|
2015-09-04 20:54:18 +00:00
|
|
|
if err != nil {
|
2018-06-29 23:27:01 +00:00
|
|
|
return handleNotFoundError(err, d, fmt.Sprintf("ComputeVpnTunnel %q", d.Id()))
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
if err := d.Set("creation_timestamp", flattenComputeVpnTunnelCreationTimestamp(res["creationTimestamp"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("name", flattenComputeVpnTunnelName(res["name"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("description", flattenComputeVpnTunnelDescription(res["description"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("target_vpn_gateway", flattenComputeVpnTunnelTargetVpnGateway(res["targetVpnGateway"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
2017-01-27 23:43:45 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
if err := d.Set("router", flattenComputeVpnTunnelRouter(res["router"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("peer_ip", flattenComputeVpnTunnelPeerIp(res["peerIp"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("shared_secret_hash", flattenComputeVpnTunnelSharedSecretHash(res["sharedSecretHash"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("ike_version", flattenComputeVpnTunnelIkeVersion(res["ikeVersion"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("local_traffic_selector", flattenComputeVpnTunnelLocalTrafficSelector(res["localTrafficSelector"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("remote_traffic_selector", flattenComputeVpnTunnelRemoteTrafficSelector(res["remoteTrafficSelector"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("labels", flattenComputeVpnTunnelLabels(res["labels"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("label_fingerprint", flattenComputeVpnTunnelLabelFingerprint(res["labelFingerprint"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("detailed_status", flattenComputeVpnTunnelDetailedStatus(res["detailedStatus"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("region", flattenComputeVpnTunnelRegion(res["region"])); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
if err := d.Set("self_link", ConvertSelfLinkToV1(res["selfLink"].(string))); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
2018-08-16 19:16:14 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
if err := d.Set("project", project); err != nil {
|
|
|
|
return fmt.Errorf("Error reading VpnTunnel: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeVpnTunnelUpdate(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
2017-01-27 23:43:45 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
d.Partial(true)
|
2015-09-04 20:54:18 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
if d.HasChange("labels") || d.HasChange("label_fingerprint") {
|
|
|
|
obj := make(map[string]interface{})
|
|
|
|
labelsProp, err := expandComputeVpnTunnelLabels(d.Get("labels"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("labels"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, labelsProp)) {
|
|
|
|
obj["labels"] = labelsProp
|
|
|
|
}
|
2018-10-15 19:44:35 +00:00
|
|
|
labelFingerprintProp, err := expandComputeVpnTunnelLabelFingerprint(d.Get("label_fingerprint"), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
} else if v, ok := d.GetOkExists("label_fingerprint"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, labelFingerprintProp)) {
|
|
|
|
obj["labelFingerprint"] = labelFingerprintProp
|
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
|
2018-10-12 16:55:14 +00:00
|
|
|
url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/regions/{{region}}/vpnTunnels/{{name}}/setLabels")
|
2018-06-29 23:27:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-08-16 19:16:14 +00:00
|
|
|
res, err := sendRequest(config, "POST", url, obj)
|
2018-06-29 23:27:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error updating VpnTunnel %q: %s", d.Id(), err)
|
|
|
|
}
|
|
|
|
|
2018-08-16 19:16:14 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
op := &compute.Operation{}
|
2018-06-29 23:27:01 +00:00
|
|
|
err = Convert(res, op)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = computeOperationWaitTime(
|
|
|
|
config.clientCompute, op, project, "Updating VpnTunnel",
|
|
|
|
int(d.Timeout(schema.TimeoutUpdate).Minutes()))
|
|
|
|
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
d.SetPartial("labels")
|
|
|
|
d.SetPartial("label_fingerprint")
|
|
|
|
}
|
|
|
|
|
|
|
|
d.Partial(false)
|
|
|
|
|
|
|
|
return resourceComputeVpnTunnelRead(d, meta)
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeVpnTunnelDelete(d *schema.ResourceData, meta interface{}) error {
|
|
|
|
config := meta.(*Config)
|
|
|
|
|
2018-10-12 16:55:14 +00:00
|
|
|
url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/regions/{{region}}/vpnTunnels/{{name}}")
|
2016-04-10 16:59:57 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2018-08-16 19:16:14 +00:00
|
|
|
var obj map[string]interface{}
|
2018-06-29 23:27:01 +00:00
|
|
|
log.Printf("[DEBUG] Deleting VpnTunnel %q", d.Id())
|
2018-08-16 19:16:14 +00:00
|
|
|
res, err := sendRequest(config, "DELETE", url, obj)
|
2018-06-29 23:27:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return handleNotFoundError(err, d, "VpnTunnel")
|
|
|
|
}
|
2015-09-04 20:54:18 +00:00
|
|
|
|
2018-08-16 19:16:14 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
op := &compute.Operation{}
|
|
|
|
err = Convert(res, op)
|
2015-09-04 20:54:18 +00:00
|
|
|
if err != nil {
|
2018-06-29 23:27:01 +00:00
|
|
|
return err
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
err = computeOperationWaitTime(
|
|
|
|
config.clientCompute, op, project, "Deleting VpnTunnel",
|
|
|
|
int(d.Timeout(schema.TimeoutDelete).Minutes()))
|
|
|
|
|
2015-09-04 20:54:18 +00:00
|
|
|
if err != nil {
|
2018-06-29 23:27:01 +00:00
|
|
|
return err
|
2015-09-04 20:54:18 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
log.Printf("[DEBUG] Finished deleting VpnTunnel %q: %#v", d.Id(), res)
|
2015-09-04 20:54:18 +00:00
|
|
|
return nil
|
|
|
|
}
|
2016-03-08 05:35:08 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func resourceComputeVpnTunnelImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
|
|
|
|
config := meta.(*Config)
|
|
|
|
parseImportId([]string{"projects/(?P<project>[^/]+)/regions/(?P<region>[^/]+)/vpnTunnels/(?P<name>[^/]+)", "(?P<project>[^/]+)/(?P<region>[^/]+)/(?P<name>[^/]+)", "(?P<name>[^/]+)"}, d, config)
|
|
|
|
|
|
|
|
// Replace import id for the resource id
|
|
|
|
id, err := replaceVars(d, config, "{{name}}")
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error constructing id: %s", err)
|
2016-03-08 05:35:08 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
d.SetId(id)
|
|
|
|
|
|
|
|
return []*schema.ResourceData{d}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelCreationTimestamp(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelName(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelDescription(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelTargetVpnGateway(v interface{}) interface{} {
|
2018-08-08 00:55:45 +00:00
|
|
|
if v == nil {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
return ConvertSelfLinkToV1(v.(string))
|
2018-06-29 23:27:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelRouter(v interface{}) interface{} {
|
|
|
|
if v == nil {
|
|
|
|
return v
|
2016-03-08 05:35:08 +00:00
|
|
|
}
|
2018-09-07 22:36:34 +00:00
|
|
|
return ConvertSelfLinkToV1(v.(string))
|
2016-03-08 05:35:08 +00:00
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func flattenComputeVpnTunnelPeerIp(v interface{}) interface{} {
|
|
|
|
return v
|
2016-03-08 05:35:08 +00:00
|
|
|
}
|
2017-01-27 14:32:42 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func flattenComputeVpnTunnelSharedSecretHash(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelIkeVersion(v interface{}) interface{} {
|
|
|
|
// Handles the string fixed64 format
|
|
|
|
if strVal, ok := v.(string); ok {
|
|
|
|
if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil {
|
|
|
|
return intVal
|
|
|
|
} // let terraform core handle it if we can't convert the string to an int.
|
2017-01-27 14:32:42 +00:00
|
|
|
}
|
2018-06-29 23:27:01 +00:00
|
|
|
return v
|
|
|
|
}
|
2017-01-27 14:32:42 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func flattenComputeVpnTunnelLocalTrafficSelector(v interface{}) interface{} {
|
2018-08-15 20:46:55 +00:00
|
|
|
if v == nil {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
return schema.NewSet(schema.HashString, v.([]interface{}))
|
2018-06-29 23:27:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelRemoteTrafficSelector(v interface{}) interface{} {
|
2018-08-15 20:46:55 +00:00
|
|
|
if v == nil {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
return schema.NewSet(schema.HashString, v.([]interface{}))
|
2018-06-29 23:27:01 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelLabels(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelLabelFingerprint(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelDetailedStatus(v interface{}) interface{} {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
|
|
|
|
func flattenComputeVpnTunnelRegion(v interface{}) interface{} {
|
|
|
|
if v == nil {
|
|
|
|
return v
|
|
|
|
}
|
|
|
|
return NameFromSelfLinkStateFunc(v)
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelName(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelDescription(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
2017-01-27 14:32:42 +00:00
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func expandComputeVpnTunnelTargetVpnGateway(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
f, err := parseRegionalFieldValue("targetVpnGateways", v.(string), "project", "region", "zone", d, config, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Invalid value for target_vpn_gateway: %s", err)
|
|
|
|
}
|
|
|
|
return f.RelativeLink(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelRouter(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
if v == nil || v.(string) == "" {
|
|
|
|
return "", nil
|
|
|
|
}
|
|
|
|
f, err := parseRegionalFieldValue("routers", v.(string), "project", "region", "zone", d, config, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Invalid value for router: %s", err)
|
|
|
|
}
|
|
|
|
return "https://www.googleapis.com/compute/v1/" + f.RelativeLink(), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelPeerIp(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelSharedSecret(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelIkeVersion(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelLocalTrafficSelector(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
v = v.(*schema.Set).List()
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelRemoteTrafficSelector(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
v = v.(*schema.Set).List()
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func expandComputeVpnTunnelLabels(v interface{}, d *schema.ResourceData, config *Config) (map[string]string, error) {
|
|
|
|
if v == nil {
|
|
|
|
return map[string]string{}, nil
|
|
|
|
}
|
|
|
|
m := make(map[string]string)
|
|
|
|
for k, val := range v.(map[string]interface{}) {
|
|
|
|
m[k] = val.(string)
|
|
|
|
}
|
|
|
|
return m, nil
|
|
|
|
}
|
|
|
|
|
2018-10-15 19:44:35 +00:00
|
|
|
func expandComputeVpnTunnelLabelFingerprint(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
return v, nil
|
|
|
|
}
|
|
|
|
|
2018-06-29 23:27:01 +00:00
|
|
|
func expandComputeVpnTunnelRegion(v interface{}, d *schema.ResourceData, config *Config) (interface{}, error) {
|
|
|
|
f, err := parseGlobalFieldValue("regions", v.(string), "project", d, config, true)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Invalid value for region: %s", err)
|
|
|
|
}
|
|
|
|
return f.RelativeLink(), nil
|
2017-01-27 14:32:42 +00:00
|
|
|
}
|