2014-08-26 05:09:38 +00:00
|
|
|
package google
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"sort"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/hashcode"
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2017-08-08 20:28:49 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/validation"
|
2017-08-07 20:14:35 +00:00
|
|
|
|
|
|
|
computeBeta "google.golang.org/api/compute/v0.beta"
|
2015-03-18 17:10:39 +00:00
|
|
|
"google.golang.org/api/compute/v1"
|
2014-08-26 05:09:38 +00:00
|
|
|
)
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
var FirewallBaseApiVersion = v1
|
2017-11-20 23:38:47 +00:00
|
|
|
var FirewallVersionedFeatures = []Feature{}
|
2017-08-07 20:14:35 +00:00
|
|
|
|
2014-08-26 05:09:38 +00:00
|
|
|
func resourceComputeFirewall() *schema.Resource {
|
|
|
|
return &schema.Resource{
|
|
|
|
Create: resourceComputeFirewallCreate,
|
|
|
|
Read: resourceComputeFirewallRead,
|
2014-08-26 19:50:08 +00:00
|
|
|
Update: resourceComputeFirewallUpdate,
|
2014-08-26 05:09:38 +00:00
|
|
|
Delete: resourceComputeFirewallDelete,
|
2016-08-04 20:51:29 +00:00
|
|
|
Importer: &schema.ResourceImporter{
|
|
|
|
State: schema.ImportStatePassthrough,
|
|
|
|
},
|
|
|
|
SchemaVersion: 1,
|
2016-08-22 17:24:29 +00:00
|
|
|
MigrateState: resourceComputeFirewallMigrateState,
|
2014-08-26 05:09:38 +00:00
|
|
|
|
|
|
|
Schema: map[string]*schema.Schema{
|
2016-08-22 17:27:36 +00:00
|
|
|
"name": {
|
2014-08-26 05:09:38 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"network": {
|
2017-09-28 19:02:39 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
DiffSuppressFunc: compareSelfLinkOrResourceName,
|
2014-08-26 05:09:38 +00:00
|
|
|
},
|
|
|
|
|
2017-08-30 19:19:50 +00:00
|
|
|
"priority": {
|
|
|
|
Type: schema.TypeInt,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2017-11-20 23:38:47 +00:00
|
|
|
Default: 1000,
|
2017-08-30 19:19:50 +00:00
|
|
|
ValidateFunc: validation.IntBetween(0, 65535),
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"allow": {
|
2017-08-07 20:14:35 +00:00
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
ConflictsWith: []string{"deny"},
|
2014-08-26 05:09:38 +00:00
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
2016-08-22 17:27:36 +00:00
|
|
|
"protocol": {
|
2014-08-26 05:09:38 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"ports": {
|
2016-08-04 20:51:29 +00:00
|
|
|
Type: schema.TypeList,
|
2014-08-26 05:09:38 +00:00
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
2017-08-07 20:14:35 +00:00
|
|
|
Set: resourceComputeFirewallRuleHash,
|
|
|
|
},
|
|
|
|
|
|
|
|
"deny": {
|
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
ConflictsWith: []string{"allow"},
|
|
|
|
Elem: &schema.Resource{
|
|
|
|
Schema: map[string]*schema.Schema{
|
|
|
|
"protocol": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Required: true,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
|
|
|
"ports": {
|
|
|
|
Type: schema.TypeList,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
Set: resourceComputeFirewallRuleHash,
|
|
|
|
|
|
|
|
// Unlike allow, deny can't be updated upstream
|
|
|
|
ForceNew: true,
|
2014-08-26 05:09:38 +00:00
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"description": {
|
2016-04-10 21:34:15 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
},
|
|
|
|
|
2017-08-08 20:28:49 +00:00
|
|
|
"direction": {
|
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
2017-12-20 21:14:33 +00:00
|
|
|
Computed: true,
|
2017-08-08 20:28:49 +00:00
|
|
|
ValidateFunc: validation.StringInSlice([]string{"INGRESS", "EGRESS"}, false),
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"project": {
|
2016-04-10 21:34:15 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
ForceNew: true,
|
2016-08-04 20:51:29 +00:00
|
|
|
Computed: true,
|
2016-04-10 21:34:15 +00:00
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"self_link": {
|
2016-04-10 21:34:15 +00:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Computed: true,
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"source_ranges": {
|
2014-08-26 05:09:38 +00:00
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
2017-06-21 08:51:25 +00:00
|
|
|
Computed: true,
|
2014-08-26 05:09:38 +00:00
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
2016-02-07 23:51:26 +00:00
|
|
|
Set: schema.HashString,
|
2014-08-26 05:09:38 +00:00
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"source_tags": {
|
2014-08-26 05:09:38 +00:00
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
2016-02-07 23:51:26 +00:00
|
|
|
Set: schema.HashString,
|
2014-08-26 05:09:38 +00:00
|
|
|
},
|
2014-09-26 05:15:31 +00:00
|
|
|
|
2017-08-08 20:28:49 +00:00
|
|
|
"destination_ranges": {
|
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
ConflictsWith: []string{"source_ranges", "source_tags"},
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
Set: schema.HashString,
|
|
|
|
ForceNew: true,
|
|
|
|
},
|
|
|
|
|
2016-08-22 17:27:36 +00:00
|
|
|
"target_tags": {
|
2014-09-26 05:15:31 +00:00
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
2014-09-28 18:51:49 +00:00
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
2016-02-07 23:51:26 +00:00
|
|
|
Set: schema.HashString,
|
2014-09-26 05:15:31 +00:00
|
|
|
},
|
2017-11-06 17:34:48 +00:00
|
|
|
|
|
|
|
"source_service_accounts": {
|
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
ForceNew: true,
|
|
|
|
ConflictsWith: []string{"source_tags", "target_tags"},
|
|
|
|
},
|
|
|
|
|
|
|
|
"target_service_accounts": {
|
|
|
|
Type: schema.TypeSet,
|
|
|
|
Optional: true,
|
|
|
|
Elem: &schema.Schema{Type: schema.TypeString},
|
|
|
|
ForceNew: true,
|
|
|
|
ConflictsWith: []string{"source_tags", "target_tags"},
|
|
|
|
},
|
2014-08-26 05:09:38 +00:00
|
|
|
},
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
func resourceComputeFirewallRuleHash(v interface{}) int {
|
2014-08-26 05:09:38 +00:00
|
|
|
var buf bytes.Buffer
|
|
|
|
m := v.(map[string]interface{})
|
|
|
|
buf.WriteString(fmt.Sprintf("%s-", m["protocol"].(string)))
|
|
|
|
|
|
|
|
// We need to make sure to sort the strings below so that we always
|
|
|
|
// generate the same hash code no matter what is in the set.
|
|
|
|
if v, ok := m["ports"]; ok {
|
2016-08-04 20:51:29 +00:00
|
|
|
s := convertStringArr(v.([]interface{}))
|
2014-08-26 05:09:38 +00:00
|
|
|
sort.Strings(s)
|
|
|
|
|
|
|
|
for _, v := range s {
|
|
|
|
buf.WriteString(fmt.Sprintf("%s-", v))
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return hashcode.String(buf.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
func resourceComputeFirewallCreate(d *schema.ResourceData, meta interface{}) error {
|
2017-08-07 20:14:35 +00:00
|
|
|
computeApiVersion := getComputeApiVersion(d, FirewallBaseApiVersion, FirewallVersionedFeatures)
|
2014-08-26 05:09:38 +00:00
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-11-06 17:34:48 +00:00
|
|
|
firewall, err := resourceFirewall(d, meta)
|
2014-08-26 05:09:38 +00:00
|
|
|
if err != nil {
|
2014-08-26 19:50:08 +00:00
|
|
|
return err
|
2014-08-26 05:09:38 +00:00
|
|
|
}
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
var op interface{}
|
|
|
|
switch computeApiVersion {
|
|
|
|
case v1:
|
|
|
|
firewallV1 := &compute.Firewall{}
|
2017-08-10 17:29:18 +00:00
|
|
|
err = Convert(firewall, firewallV1)
|
2017-08-07 20:14:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
op, err = config.clientCompute.Firewalls.Insert(project, firewallV1).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating firewall: %s", err)
|
|
|
|
}
|
|
|
|
case v0beta:
|
|
|
|
firewallV0Beta := &computeBeta.Firewall{}
|
2017-08-10 17:29:18 +00:00
|
|
|
err = Convert(firewall, firewallV0Beta)
|
2017-08-07 20:14:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
op, err = config.clientComputeBeta.Firewalls.Insert(project, firewallV0Beta).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error creating firewall: %s", err)
|
|
|
|
}
|
2014-08-26 05:09:38 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// It probably maybe worked, so store the ID now
|
|
|
|
d.SetId(firewall.Name)
|
|
|
|
|
2017-10-13 22:36:03 +00:00
|
|
|
err = computeSharedOperationWait(config.clientCompute, op, project, "Creating Firewall")
|
2014-08-26 05:44:27 +00:00
|
|
|
if err != nil {
|
2015-09-24 20:30:12 +00:00
|
|
|
return err
|
2014-08-26 05:44:27 +00:00
|
|
|
}
|
2014-08-26 05:09:38 +00:00
|
|
|
|
|
|
|
return resourceComputeFirewallRead(d, meta)
|
|
|
|
}
|
|
|
|
|
2017-11-20 23:38:47 +00:00
|
|
|
func flattenFirewallAllowed(allowed []*computeBeta.FirewallAllowed) []map[string]interface{} {
|
2016-08-04 20:51:29 +00:00
|
|
|
result := make([]map[string]interface{}, 0, len(allowed))
|
|
|
|
for _, allow := range allowed {
|
|
|
|
allowMap := make(map[string]interface{})
|
|
|
|
allowMap["protocol"] = allow.IPProtocol
|
|
|
|
allowMap["ports"] = allow.Ports
|
|
|
|
|
|
|
|
result = append(result, allowMap)
|
|
|
|
}
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2017-11-20 23:38:47 +00:00
|
|
|
func flattenFirewallDenied(denied []*computeBeta.FirewallDenied) []map[string]interface{} {
|
2017-08-07 20:14:35 +00:00
|
|
|
result := make([]map[string]interface{}, 0, len(denied))
|
|
|
|
for _, deny := range denied {
|
|
|
|
denyMap := make(map[string]interface{})
|
|
|
|
denyMap["protocol"] = deny.IPProtocol
|
|
|
|
denyMap["ports"] = deny.Ports
|
|
|
|
|
|
|
|
result = append(result, denyMap)
|
|
|
|
}
|
|
|
|
return result
|
|
|
|
}
|
|
|
|
|
2014-08-26 05:09:38 +00:00
|
|
|
func resourceComputeFirewallRead(d *schema.ResourceData, meta interface{}) error {
|
2017-08-07 20:14:35 +00:00
|
|
|
computeApiVersion := getComputeApiVersion(d, FirewallBaseApiVersion, FirewallVersionedFeatures)
|
2014-08-26 05:09:38 +00:00
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
firewall := &computeBeta.Firewall{}
|
|
|
|
switch computeApiVersion {
|
|
|
|
case v1:
|
|
|
|
firewallV1, err := config.clientCompute.Firewalls.Get(project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
return handleNotFoundError(err, d, fmt.Sprintf("Firewall %q", d.Get("name").(string)))
|
|
|
|
}
|
|
|
|
|
|
|
|
err = Convert(firewallV1, firewall)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
case v0beta:
|
|
|
|
firewallV0Beta, err := config.clientComputeBeta.Firewalls.Get(project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
return handleNotFoundError(err, d, fmt.Sprintf("Firewall %q", d.Get("name").(string)))
|
|
|
|
}
|
|
|
|
|
|
|
|
err = Convert(firewallV0Beta, firewall)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2014-08-26 05:09:38 +00:00
|
|
|
}
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
d.Set("self_link", ConvertSelfLinkToV1(firewall.SelfLink))
|
2016-08-04 20:51:29 +00:00
|
|
|
d.Set("name", firewall.Name)
|
2017-09-28 19:02:39 +00:00
|
|
|
d.Set("network", ConvertSelfLinkToV1(firewall.Network))
|
2017-12-20 21:14:33 +00:00
|
|
|
d.Set("direction", firewall.Direction)
|
2016-08-04 20:51:29 +00:00
|
|
|
d.Set("description", firewall.Description)
|
|
|
|
d.Set("project", project)
|
|
|
|
d.Set("source_ranges", firewall.SourceRanges)
|
|
|
|
d.Set("source_tags", firewall.SourceTags)
|
2017-08-08 20:28:49 +00:00
|
|
|
d.Set("destination_ranges", firewall.DestinationRanges)
|
2016-08-04 20:51:29 +00:00
|
|
|
d.Set("target_tags", firewall.TargetTags)
|
2017-11-20 23:38:47 +00:00
|
|
|
d.Set("allow", flattenFirewallAllowed(firewall.Allowed))
|
|
|
|
d.Set("deny", flattenFirewallDenied(firewall.Denied))
|
2017-08-30 19:19:50 +00:00
|
|
|
d.Set("priority", int(firewall.Priority))
|
2017-11-06 17:34:48 +00:00
|
|
|
d.Set("source_service_accounts", firewall.SourceServiceAccounts)
|
|
|
|
d.Set("target_service_accounts", firewall.TargetServiceAccounts)
|
2014-08-26 05:09:38 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-08-26 19:50:08 +00:00
|
|
|
func resourceComputeFirewallUpdate(d *schema.ResourceData, meta interface{}) error {
|
2017-08-07 20:14:35 +00:00
|
|
|
computeApiVersion := getComputeApiVersionUpdate(d, FirewallBaseApiVersion, FirewallVersionedFeatures, []Feature{})
|
2014-08-26 19:50:08 +00:00
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2014-08-27 03:33:53 +00:00
|
|
|
d.Partial(true)
|
|
|
|
|
2017-11-06 17:34:48 +00:00
|
|
|
firewall, err := resourceFirewall(d, meta)
|
2014-08-26 19:50:08 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
var op interface{}
|
|
|
|
switch computeApiVersion {
|
|
|
|
case v1:
|
|
|
|
firewallV1 := &compute.Firewall{}
|
2017-08-10 17:29:18 +00:00
|
|
|
err = Convert(firewall, firewallV1)
|
2017-08-07 20:14:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
op, err = config.clientCompute.Firewalls.Update(project, d.Id(), firewallV1).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error updating firewall: %s", err)
|
|
|
|
}
|
|
|
|
case v0beta:
|
|
|
|
firewallV0Beta := &computeBeta.Firewall{}
|
2017-08-10 17:29:18 +00:00
|
|
|
err = Convert(firewall, firewallV0Beta)
|
2017-08-07 20:14:35 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
op, err = config.clientComputeBeta.Firewalls.Update(project, d.Id(), firewallV0Beta).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error updating firewall: %s", err)
|
|
|
|
}
|
2014-08-26 19:50:08 +00:00
|
|
|
}
|
|
|
|
|
2017-10-13 22:36:03 +00:00
|
|
|
err = computeSharedOperationWait(config.clientCompute, op, project, "Updating Firewall")
|
2014-08-26 19:50:08 +00:00
|
|
|
if err != nil {
|
2015-09-24 20:30:12 +00:00
|
|
|
return err
|
2014-08-26 19:50:08 +00:00
|
|
|
}
|
|
|
|
|
2014-08-27 03:33:53 +00:00
|
|
|
d.Partial(false)
|
|
|
|
|
2014-08-26 19:50:08 +00:00
|
|
|
return resourceComputeFirewallRead(d, meta)
|
|
|
|
}
|
|
|
|
|
2014-08-26 05:09:38 +00:00
|
|
|
func resourceComputeFirewallDelete(d *schema.ResourceData, meta interface{}) error {
|
2017-08-07 20:14:35 +00:00
|
|
|
computeApiVersion := getComputeApiVersion(d, FirewallBaseApiVersion, FirewallVersionedFeatures)
|
2014-08-26 05:09:38 +00:00
|
|
|
config := meta.(*Config)
|
|
|
|
|
2016-04-10 16:59:57 +00:00
|
|
|
project, err := getProject(d, config)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2014-08-26 05:09:38 +00:00
|
|
|
// Delete the firewall
|
2017-08-07 20:14:35 +00:00
|
|
|
var op interface{}
|
|
|
|
switch computeApiVersion {
|
|
|
|
case v1:
|
|
|
|
op, err = config.clientCompute.Firewalls.Delete(project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error deleting firewall: %s", err)
|
|
|
|
}
|
|
|
|
case v0beta:
|
|
|
|
op, err = config.clientComputeBeta.Firewalls.Delete(project, d.Id()).Do()
|
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("Error deleting firewall: %s", err)
|
|
|
|
}
|
2014-08-26 05:09:38 +00:00
|
|
|
}
|
|
|
|
|
2017-10-13 22:36:03 +00:00
|
|
|
err = computeSharedOperationWait(config.clientCompute, op, project, "Deleting Firewall")
|
2014-08-26 05:44:27 +00:00
|
|
|
if err != nil {
|
2015-09-24 20:30:12 +00:00
|
|
|
return err
|
2014-08-26 05:44:27 +00:00
|
|
|
}
|
2014-08-26 05:09:38 +00:00
|
|
|
|
|
|
|
d.SetId("")
|
|
|
|
return nil
|
|
|
|
}
|
2014-08-26 19:50:08 +00:00
|
|
|
|
2017-11-06 17:34:48 +00:00
|
|
|
func resourceFirewall(d *schema.ResourceData, meta interface{}) (*computeBeta.Firewall, error) {
|
2014-08-26 19:50:08 +00:00
|
|
|
config := meta.(*Config)
|
|
|
|
|
2017-10-10 16:53:57 +00:00
|
|
|
network, err := ParseNetworkFieldValue(d.Get("network").(string), d, config)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2014-08-26 19:50:08 +00:00
|
|
|
// Build up the list of allowed entries
|
2017-08-07 20:14:35 +00:00
|
|
|
var allowed []*computeBeta.FirewallAllowed
|
2014-08-26 19:50:08 +00:00
|
|
|
if v := d.Get("allow").(*schema.Set); v.Len() > 0 {
|
2017-08-07 20:14:35 +00:00
|
|
|
allowed = make([]*computeBeta.FirewallAllowed, 0, v.Len())
|
|
|
|
for _, v := range v.List() {
|
|
|
|
m := v.(map[string]interface{})
|
|
|
|
|
|
|
|
allowed = append(allowed, &computeBeta.FirewallAllowed{
|
|
|
|
IPProtocol: m["protocol"].(string),
|
2017-10-27 22:08:22 +00:00
|
|
|
Ports: convertStringArr(m["ports"].([]interface{})),
|
2017-08-07 20:14:35 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build up the list of denied entries
|
|
|
|
var denied []*computeBeta.FirewallDenied
|
|
|
|
if v := d.Get("deny").(*schema.Set); v.Len() > 0 {
|
|
|
|
denied = make([]*computeBeta.FirewallDenied, 0, v.Len())
|
2014-08-26 19:50:08 +00:00
|
|
|
for _, v := range v.List() {
|
|
|
|
m := v.(map[string]interface{})
|
|
|
|
|
2017-08-07 20:14:35 +00:00
|
|
|
denied = append(denied, &computeBeta.FirewallDenied{
|
2014-08-26 19:50:08 +00:00
|
|
|
IPProtocol: m["protocol"].(string),
|
2017-10-27 22:08:22 +00:00
|
|
|
Ports: convertStringArr(m["ports"].([]interface{})),
|
2014-08-26 19:50:08 +00:00
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Build up the list of sources
|
|
|
|
var sourceRanges, sourceTags []string
|
|
|
|
if v := d.Get("source_ranges").(*schema.Set); v.Len() > 0 {
|
|
|
|
sourceRanges = make([]string, v.Len())
|
|
|
|
for i, v := range v.List() {
|
|
|
|
sourceRanges[i] = v.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if v := d.Get("source_tags").(*schema.Set); v.Len() > 0 {
|
|
|
|
sourceTags = make([]string, v.Len())
|
|
|
|
for i, v := range v.List() {
|
|
|
|
sourceTags[i] = v.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-08-08 20:28:49 +00:00
|
|
|
// Build up the list of destinations
|
|
|
|
var destinationRanges []string
|
|
|
|
if v := d.Get("destination_ranges").(*schema.Set); v.Len() > 0 {
|
|
|
|
destinationRanges = make([]string, v.Len())
|
|
|
|
for i, v := range v.List() {
|
|
|
|
destinationRanges[i] = v.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-26 05:15:31 +00:00
|
|
|
// Build up the list of targets
|
|
|
|
var targetTags []string
|
|
|
|
if v := d.Get("target_tags").(*schema.Set); v.Len() > 0 {
|
|
|
|
targetTags = make([]string, v.Len())
|
2014-09-28 18:51:49 +00:00
|
|
|
for i, v := range v.List() {
|
2014-09-26 05:15:31 +00:00
|
|
|
targetTags[i] = v.(string)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-08-26 19:50:08 +00:00
|
|
|
// Build the firewall parameter
|
2017-08-07 20:14:35 +00:00
|
|
|
return &computeBeta.Firewall{
|
2017-11-06 17:34:48 +00:00
|
|
|
Name: d.Get("name").(string),
|
|
|
|
Description: d.Get("description").(string),
|
|
|
|
Direction: d.Get("direction").(string),
|
|
|
|
Network: network.RelativeLink(),
|
|
|
|
Allowed: allowed,
|
|
|
|
Denied: denied,
|
|
|
|
SourceRanges: sourceRanges,
|
|
|
|
SourceTags: sourceTags,
|
|
|
|
DestinationRanges: destinationRanges,
|
|
|
|
TargetTags: targetTags,
|
|
|
|
Priority: int64(d.Get("priority").(int)),
|
|
|
|
SourceServiceAccounts: convertStringSet(d.Get("source_service_accounts").(*schema.Set)),
|
|
|
|
TargetServiceAccounts: convertStringSet(d.Get("target_service_accounts").(*schema.Set)),
|
2014-08-26 19:50:08 +00:00
|
|
|
}, nil
|
|
|
|
}
|