// ---------------------------------------------------------------------------- // // *** AUTO GENERATED CODE *** AUTO GENERATED CODE *** // // ---------------------------------------------------------------------------- // // This file is automatically generated by Magic Modules and manual // changes will be clobbered when the file is regenerated. // // Please read more about how to change this file in // .github/CONTRIBUTING.md. // // ---------------------------------------------------------------------------- package google import ( "fmt" "log" "reflect" "strconv" "strings" "time" "github.com/hashicorp/terraform/helper/customdiff" "github.com/hashicorp/terraform/helper/schema" "google.golang.org/api/compute/v1" "google.golang.org/api/googleapi" ) // Is the new disk size smaller than the old one? func isDiskShrinkage(old, new, _ interface{}) bool { // It's okay to remove size entirely. if old == nil || new == nil { return false } return new.(int) < old.(int) } // We cannot suppress the diff for the case when family name is not part of the image name since we can't // make a network call in a DiffSuppressFunc. func diskImageDiffSuppress(_, old, new string, _ *schema.ResourceData) bool { // Understand that this function solves a messy problem ("how do we tell if the diff between two images // is 'ForceNew-worthy', without making a network call?") in the best way we can: through a series of special // cases and regexes. If you find yourself here because you are trying to add a new special case, // you are probably looking for the diskImageFamilyEquals function and its subfunctions. // In order to keep this maintainable, we need to ensure that the positive and negative examples // in resource_compute_disk_test.go are as complete as possible. // 'old' is read from the API. // It always has the format 'https://www.googleapis.com/compute/v1/projects/(%s)/global/images/(%s)' matches := resolveImageLink.FindStringSubmatch(old) if matches == nil { // Image read from the API doesn't have the expected format. In practice, it should never happen return false } oldProject := matches[1] oldName := matches[2] // Partial or full self link family if resolveImageProjectFamily.MatchString(new) { // Value matches pattern "projects/{project}/global/images/family/{family-name}$" matches := resolveImageProjectFamily.FindStringSubmatch(new) newProject := matches[1] newFamilyName := matches[2] return diskImageProjectNameEquals(oldProject, newProject) && diskImageFamilyEquals(oldName, newFamilyName) } // Partial or full self link image if resolveImageProjectImage.MatchString(new) { // Value matches pattern "projects/{project}/global/images/{image-name}$" matches := resolveImageProjectImage.FindStringSubmatch(new) newProject := matches[1] newImageName := matches[2] return diskImageProjectNameEquals(oldProject, newProject) && diskImageEquals(oldName, newImageName) } // Partial link without project family if resolveImageGlobalFamily.MatchString(new) { // Value is "global/images/family/{family-name}" matches := resolveImageGlobalFamily.FindStringSubmatch(new) familyName := matches[1] return diskImageFamilyEquals(oldName, familyName) } // Partial link without project image if resolveImageGlobalImage.MatchString(new) { // Value is "global/images/{image-name}" matches := resolveImageGlobalImage.FindStringSubmatch(new) imageName := matches[1] return diskImageEquals(oldName, imageName) } // Family shorthand if resolveImageFamilyFamily.MatchString(new) { // Value is "family/{family-name}" matches := resolveImageFamilyFamily.FindStringSubmatch(new) familyName := matches[1] return diskImageFamilyEquals(oldName, familyName) } // Shorthand for image or family if resolveImageProjectImageShorthand.MatchString(new) { // Value is "{project}/{image-name}" or "{project}/{family-name}" matches := resolveImageProjectImageShorthand.FindStringSubmatch(new) newProject := matches[1] newName := matches[2] return diskImageProjectNameEquals(oldProject, newProject) && (diskImageEquals(oldName, newName) || diskImageFamilyEquals(oldName, newName)) } // Image or family only if diskImageEquals(oldName, new) || diskImageFamilyEquals(oldName, new) { // Value is "{image-name}" or "{family-name}" return true } return false } func diskImageProjectNameEquals(project1, project2 string) bool { // Convert short project name to full name // For instance, centos => centos-cloud fullProjectName, ok := imageMap[project2] if ok { project2 = fullProjectName } return project1 == project2 } func diskImageEquals(oldImageName, newImageName string) bool { return oldImageName == newImageName } func diskImageFamilyEquals(imageName, familyName string) bool { // Handles the case when the image name includes the family name // e.g. image name: debian-9-drawfork-v20180109, family name: debian-9 if strings.Contains(imageName, familyName) { return true } if suppressCanonicalFamilyDiff(imageName, familyName) { return true } if suppressWindowsSqlFamilyDiff(imageName, familyName) { return true } if suppressWindowsFamilyDiff(imageName, familyName) { return true } return false } // e.g. image: ubuntu-1404-trusty-v20180122, family: ubuntu-1404-lts func suppressCanonicalFamilyDiff(imageName, familyName string) bool { parts := canonicalUbuntuLtsImage.FindStringSubmatch(imageName) if len(parts) == 3 { f := fmt.Sprintf("ubuntu-%s%s-lts", parts[1], parts[2]) if f == familyName { return true } } return false } // e.g. image: sql-2017-standard-windows-2016-dc-v20180109, family: sql-std-2017-win-2016 // e.g. image: sql-2017-express-windows-2012-r2-dc-v20180109, family: sql-exp-2017-win-2012-r2 func suppressWindowsSqlFamilyDiff(imageName, familyName string) bool { parts := windowsSqlImage.FindStringSubmatch(imageName) if len(parts) == 5 { edition := parts[2] // enterprise, standard or web. sqlVersion := parts[1] windowsVersion := parts[3] // Translate edition switch edition { case "enterprise": edition = "ent" case "standard": edition = "std" case "express": edition = "exp" } var f string if revision := parts[4]; revision != "" { // With revision f = fmt.Sprintf("sql-%s-%s-win-%s-r%s", edition, sqlVersion, windowsVersion, revision) } else { // No revision f = fmt.Sprintf("sql-%s-%s-win-%s", edition, sqlVersion, windowsVersion) } if f == familyName { return true } } return false } // e.g. image: windows-server-1709-dc-core-v20180109, family: windows-1709-core // e.g. image: windows-server-1709-dc-core-for-containers-v20180109, family: "windows-1709-core-for-containers func suppressWindowsFamilyDiff(imageName, familyName string) bool { updatedFamilyString := strings.Replace(familyName, "windows-", "windows-server-", 1) updatedImageName := strings.Replace(imageName, "-dc-", "-", 1) if strings.Contains(updatedImageName, updatedFamilyString) { return true } return false } func resourceComputeDisk() *schema.Resource { return &schema.Resource{ Create: resourceComputeDiskCreate, Read: resourceComputeDiskRead, Update: resourceComputeDiskUpdate, Delete: resourceComputeDiskDelete, Importer: &schema.ResourceImporter{ State: resourceComputeDiskImport, }, Timeouts: &schema.ResourceTimeout{ Create: schema.DefaultTimeout(300 * time.Second), Update: schema.DefaultTimeout(240 * time.Second), Delete: schema.DefaultTimeout(240 * time.Second), }, CustomizeDiff: customdiff.All( customdiff.ForceNewIfChange("size", isDiskShrinkage)), Schema: map[string]*schema.Schema{ "name": { Type: schema.TypeString, Required: true, ForceNew: true, }, "description": { Type: schema.TypeString, Optional: true, ForceNew: true, }, "disk_encryption_key": { Type: schema.TypeList, Optional: true, ForceNew: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "kms_key_self_link": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkRelativePaths, }, "raw_key": { Type: schema.TypeString, Optional: true, ForceNew: true, }, "sha256": { Type: schema.TypeString, Computed: true, }, }, }, }, "image": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: diskImageDiffSuppress, }, "labels": { Type: schema.TypeMap, Optional: true, Elem: &schema.Schema{Type: schema.TypeString}, }, "physical_block_size_bytes": { Type: schema.TypeInt, Computed: true, Optional: true, ForceNew: true, }, "size": { Type: schema.TypeInt, Computed: true, Optional: true, }, "snapshot": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkOrResourceName, }, "source_image_encryption_key": { Type: schema.TypeList, Optional: true, ForceNew: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "kms_key_self_link": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkRelativePaths, }, "raw_key": { Type: schema.TypeString, Optional: true, ForceNew: true, }, "sha256": { Type: schema.TypeString, Computed: true, }, }, }, }, "source_snapshot_encryption_key": { Type: schema.TypeList, Optional: true, ForceNew: true, MaxItems: 1, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "kms_key_self_link": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkRelativePaths, }, "raw_key": { Type: schema.TypeString, Optional: true, ForceNew: true, }, "sha256": { Type: schema.TypeString, Computed: true, }, }, }, }, "type": { Type: schema.TypeString, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkOrResourceName, Default: "pd-standard", }, "zone": { Type: schema.TypeString, Computed: true, Optional: true, ForceNew: true, DiffSuppressFunc: compareSelfLinkOrResourceName, }, "creation_timestamp": { Type: schema.TypeString, Computed: true, }, "label_fingerprint": { Type: schema.TypeString, Computed: true, }, "last_attach_timestamp": { Type: schema.TypeString, Computed: true, }, "last_detach_timestamp": { Type: schema.TypeString, Computed: true, }, "source_image_id": { Type: schema.TypeString, Computed: true, }, "source_snapshot_id": { Type: schema.TypeString, Computed: true, }, "users": { Type: schema.TypeList, Computed: true, Elem: &schema.Schema{ Type: schema.TypeString, DiffSuppressFunc: compareSelfLinkOrResourceName, }, }, "disk_encryption_key_raw": { Type: schema.TypeString, Optional: true, ForceNew: true, Sensitive: true, Removed: "Use disk_encryption_key.raw_key instead.", }, "disk_encryption_key_sha256": { Type: schema.TypeString, Computed: true, Removed: "Use disk_encryption_key.sha256 instead.", }, "project": { Type: schema.TypeString, Optional: true, Computed: true, ForceNew: true, }, "self_link": { Type: schema.TypeString, Computed: true, }, }, } } func resourceComputeDiskCreate(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) obj := make(map[string]interface{}) labelFingerprintProp, err := expandComputeDiskLabelFingerprint(d.Get("label_fingerprint"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("label_fingerprint"); !isEmptyValue(reflect.ValueOf(labelFingerprintProp)) && (ok || !reflect.DeepEqual(v, labelFingerprintProp)) { obj["labelFingerprint"] = labelFingerprintProp } descriptionProp, err := expandComputeDiskDescription(d.Get("description"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("description"); !isEmptyValue(reflect.ValueOf(descriptionProp)) && (ok || !reflect.DeepEqual(v, descriptionProp)) { obj["description"] = descriptionProp } labelsProp, err := expandComputeDiskLabels(d.Get("labels"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("labels"); !isEmptyValue(reflect.ValueOf(labelsProp)) && (ok || !reflect.DeepEqual(v, labelsProp)) { obj["labels"] = labelsProp } nameProp, err := expandComputeDiskName(d.Get("name"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("name"); !isEmptyValue(reflect.ValueOf(nameProp)) && (ok || !reflect.DeepEqual(v, nameProp)) { obj["name"] = nameProp } sizeGbProp, err := expandComputeDiskSize(d.Get("size"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("size"); !isEmptyValue(reflect.ValueOf(sizeGbProp)) && (ok || !reflect.DeepEqual(v, sizeGbProp)) { obj["sizeGb"] = sizeGbProp } physicalBlockSizeBytesProp, err := expandComputeDiskPhysicalBlockSizeBytes(d.Get("physical_block_size_bytes"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("physical_block_size_bytes"); !isEmptyValue(reflect.ValueOf(physicalBlockSizeBytesProp)) && (ok || !reflect.DeepEqual(v, physicalBlockSizeBytesProp)) { obj["physicalBlockSizeBytes"] = physicalBlockSizeBytesProp } typeProp, err := expandComputeDiskType(d.Get("type"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("type"); !isEmptyValue(reflect.ValueOf(typeProp)) && (ok || !reflect.DeepEqual(v, typeProp)) { obj["type"] = typeProp } sourceImageProp, err := expandComputeDiskImage(d.Get("image"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("image"); !isEmptyValue(reflect.ValueOf(sourceImageProp)) && (ok || !reflect.DeepEqual(v, sourceImageProp)) { obj["sourceImage"] = sourceImageProp } zoneProp, err := expandComputeDiskZone(d.Get("zone"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("zone"); !isEmptyValue(reflect.ValueOf(zoneProp)) && (ok || !reflect.DeepEqual(v, zoneProp)) { obj["zone"] = zoneProp } sourceImageEncryptionKeyProp, err := expandComputeDiskSourceImageEncryptionKey(d.Get("source_image_encryption_key"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("source_image_encryption_key"); !isEmptyValue(reflect.ValueOf(sourceImageEncryptionKeyProp)) && (ok || !reflect.DeepEqual(v, sourceImageEncryptionKeyProp)) { obj["sourceImageEncryptionKey"] = sourceImageEncryptionKeyProp } diskEncryptionKeyProp, err := expandComputeDiskDiskEncryptionKey(d.Get("disk_encryption_key"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("disk_encryption_key"); !isEmptyValue(reflect.ValueOf(diskEncryptionKeyProp)) && (ok || !reflect.DeepEqual(v, diskEncryptionKeyProp)) { obj["diskEncryptionKey"] = diskEncryptionKeyProp } sourceSnapshotProp, err := expandComputeDiskSnapshot(d.Get("snapshot"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("snapshot"); !isEmptyValue(reflect.ValueOf(sourceSnapshotProp)) && (ok || !reflect.DeepEqual(v, sourceSnapshotProp)) { obj["sourceSnapshot"] = sourceSnapshotProp } sourceSnapshotEncryptionKeyProp, err := expandComputeDiskSourceSnapshotEncryptionKey(d.Get("source_snapshot_encryption_key"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("source_snapshot_encryption_key"); !isEmptyValue(reflect.ValueOf(sourceSnapshotEncryptionKeyProp)) && (ok || !reflect.DeepEqual(v, sourceSnapshotEncryptionKeyProp)) { obj["sourceSnapshotEncryptionKey"] = sourceSnapshotEncryptionKeyProp } obj, err = resourceComputeDiskEncoder(d, meta, obj) if err != nil { return err } url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/zones/{{zone}}/disks") if err != nil { return err } log.Printf("[DEBUG] Creating new Disk: %#v", obj) res, err := sendRequestWithTimeout(config, "POST", url, obj, d.Timeout(schema.TimeoutCreate)) if err != nil { return fmt.Errorf("Error creating Disk: %s", err) } // Store the ID now id, err := replaceVars(d, config, "{{name}}") if err != nil { return fmt.Errorf("Error constructing id: %s", err) } d.SetId(id) project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } waitErr := computeOperationWaitTime( config.clientCompute, op, project, "Creating Disk", int(d.Timeout(schema.TimeoutCreate).Minutes())) if waitErr != nil { // The resource didn't actually create d.SetId("") return fmt.Errorf("Error waiting to create Disk: %s", waitErr) } log.Printf("[DEBUG] Finished creating Disk %q: %#v", d.Id(), res) return resourceComputeDiskRead(d, meta) } func resourceComputeDiskRead(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/zones/{{zone}}/disks/{{name}}") if err != nil { return err } res, err := sendRequest(config, "GET", url, nil) if err != nil { return handleNotFoundError(err, d, fmt.Sprintf("ComputeDisk %q", d.Id())) } res, err = resourceComputeDiskDecoder(d, meta, res) if err != nil { return err } project, err := getProject(d, config) if err != nil { return err } if err := d.Set("project", project); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("label_fingerprint", flattenComputeDiskLabelFingerprint(res["labelFingerprint"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("creation_timestamp", flattenComputeDiskCreationTimestamp(res["creationTimestamp"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("description", flattenComputeDiskDescription(res["description"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("last_attach_timestamp", flattenComputeDiskLastAttachTimestamp(res["lastAttachTimestamp"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("last_detach_timestamp", flattenComputeDiskLastDetachTimestamp(res["lastDetachTimestamp"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("labels", flattenComputeDiskLabels(res["labels"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("name", flattenComputeDiskName(res["name"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("size", flattenComputeDiskSize(res["sizeGb"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("users", flattenComputeDiskUsers(res["users"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("physical_block_size_bytes", flattenComputeDiskPhysicalBlockSizeBytes(res["physicalBlockSizeBytes"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("type", flattenComputeDiskType(res["type"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("image", flattenComputeDiskImage(res["sourceImage"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("zone", flattenComputeDiskZone(res["zone"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("source_image_encryption_key", flattenComputeDiskSourceImageEncryptionKey(res["sourceImageEncryptionKey"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("source_image_id", flattenComputeDiskSourceImageId(res["sourceImageId"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("disk_encryption_key", flattenComputeDiskDiskEncryptionKey(res["diskEncryptionKey"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("snapshot", flattenComputeDiskSnapshot(res["sourceSnapshot"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("source_snapshot_encryption_key", flattenComputeDiskSourceSnapshotEncryptionKey(res["sourceSnapshotEncryptionKey"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("source_snapshot_id", flattenComputeDiskSourceSnapshotId(res["sourceSnapshotId"], d)); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } if err := d.Set("self_link", ConvertSelfLinkToV1(res["selfLink"].(string))); err != nil { return fmt.Errorf("Error reading Disk: %s", err) } return nil } func resourceComputeDiskUpdate(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) d.Partial(true) if d.HasChange("label_fingerprint") || d.HasChange("labels") { obj := make(map[string]interface{}) labelFingerprintProp, err := expandComputeDiskLabelFingerprint(d.Get("label_fingerprint"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("label_fingerprint"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, labelFingerprintProp)) { obj["labelFingerprint"] = labelFingerprintProp } labelsProp, err := expandComputeDiskLabels(d.Get("labels"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("labels"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, labelsProp)) { obj["labels"] = labelsProp } url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/zones/{{zone}}/disks/{{name}}/setLabels") if err != nil { return err } res, err := sendRequestWithTimeout(config, "POST", url, obj, d.Timeout(schema.TimeoutUpdate)) if err != nil { return fmt.Errorf("Error updating Disk %q: %s", d.Id(), err) } project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } err = computeOperationWaitTime( config.clientCompute, op, project, "Updating Disk", int(d.Timeout(schema.TimeoutUpdate).Minutes())) if err != nil { return err } d.SetPartial("label_fingerprint") d.SetPartial("labels") } if d.HasChange("size") { obj := make(map[string]interface{}) sizeGbProp, err := expandComputeDiskSize(d.Get("size"), d, config) if err != nil { return err } else if v, ok := d.GetOkExists("size"); !isEmptyValue(reflect.ValueOf(v)) && (ok || !reflect.DeepEqual(v, sizeGbProp)) { obj["sizeGb"] = sizeGbProp } url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/zones/{{zone}}/disks/{{name}}/resize") if err != nil { return err } res, err := sendRequestWithTimeout(config, "POST", url, obj, d.Timeout(schema.TimeoutUpdate)) if err != nil { return fmt.Errorf("Error updating Disk %q: %s", d.Id(), err) } project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } err = computeOperationWaitTime( config.clientCompute, op, project, "Updating Disk", int(d.Timeout(schema.TimeoutUpdate).Minutes())) if err != nil { return err } d.SetPartial("size") } d.Partial(false) return resourceComputeDiskRead(d, meta) } func resourceComputeDiskDelete(d *schema.ResourceData, meta interface{}) error { config := meta.(*Config) url, err := replaceVars(d, config, "https://www.googleapis.com/compute/v1/projects/{{project}}/zones/{{zone}}/disks/{{name}}") if err != nil { return err } var obj map[string]interface{} readRes, err := sendRequest(config, "GET", url, nil) if err != nil { return handleNotFoundError(err, d, fmt.Sprintf("ComputeDisk %q", d.Id())) } // if disks are attached to instances, they must be detached before the disk can be deleted if v, ok := readRes["users"].([]interface{}); ok { type detachArgs struct{ project, zone, instance, deviceName string } var detachCalls []detachArgs for _, instance := range convertStringArr(v) { self := d.Get("self_link").(string) instanceProject, instanceZone, instanceName, err := GetLocationalResourcePropertiesFromSelfLinkString(instance) if err != nil { return err } i, err := config.clientCompute.Instances.Get(instanceProject, instanceZone, instanceName).Do() if err != nil { if gerr, ok := err.(*googleapi.Error); ok && gerr.Code == 404 { log.Printf("[WARN] instance %q not found, not bothering to detach disks", instance) continue } return fmt.Errorf("Error retrieving instance %s: %s", instance, err.Error()) } for _, disk := range i.Disks { if disk.Source == self { detachCalls = append(detachCalls, detachArgs{ project: instanceProject, zone: GetResourceNameFromSelfLink(i.Zone), instance: i.Name, deviceName: disk.DeviceName, }) } } } for _, call := range detachCalls { op, err := config.clientCompute.Instances.DetachDisk(call.project, call.zone, call.instance, call.deviceName).Do() if err != nil { return fmt.Errorf("Error detaching disk %s from instance %s/%s/%s: %s", call.deviceName, call.project, call.zone, call.instance, err.Error()) } err = computeOperationWait(config.clientCompute, op, call.project, fmt.Sprintf("Detaching disk from %s/%s/%s", call.project, call.zone, call.instance)) if err != nil { if opErr, ok := err.(ComputeOperationError); ok && len(opErr.Errors) == 1 && opErr.Errors[0].Code == "RESOURCE_NOT_FOUND" { log.Printf("[WARN] instance %q was deleted while awaiting detach", call.instance) continue } return err } } } log.Printf("[DEBUG] Deleting Disk %q", d.Id()) res, err := sendRequestWithTimeout(config, "DELETE", url, obj, d.Timeout(schema.TimeoutDelete)) if err != nil { return handleNotFoundError(err, d, "Disk") } project, err := getProject(d, config) if err != nil { return err } op := &compute.Operation{} err = Convert(res, op) if err != nil { return err } err = computeOperationWaitTime( config.clientCompute, op, project, "Deleting Disk", int(d.Timeout(schema.TimeoutDelete).Minutes())) if err != nil { return err } log.Printf("[DEBUG] Finished deleting Disk %q: %#v", d.Id(), res) return nil } func resourceComputeDiskImport(d *schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) { config := meta.(*Config) if err := parseImportId([]string{"projects/(?P[^/]+)/zones/(?P[^/]+)/disks/(?P[^/]+)", "(?P[^/]+)/(?P[^/]+)/(?P[^/]+)", "(?P[^/]+)"}, d, config); err != nil { return nil, err } // Replace import id for the resource id id, err := replaceVars(d, config, "{{name}}") if err != nil { return nil, fmt.Errorf("Error constructing id: %s", err) } d.SetId(id) return []*schema.ResourceData{d}, nil } func flattenComputeDiskLabelFingerprint(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskCreationTimestamp(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskDescription(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskLastAttachTimestamp(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskLastDetachTimestamp(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskLabels(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskName(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSize(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeDiskUsers(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return convertAndMapStringArr(v.([]interface{}), ConvertSelfLinkToV1) } func flattenComputeDiskPhysicalBlockSizeBytes(v interface{}, d *schema.ResourceData) interface{} { // Handles the string fixed64 format if strVal, ok := v.(string); ok { if intVal, err := strconv.ParseInt(strVal, 10, 64); err == nil { return intVal } // let terraform core handle it if we can't convert the string to an int. } return v } func flattenComputeDiskType(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return NameFromSelfLinkStateFunc(v) } func flattenComputeDiskImage(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskZone(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return NameFromSelfLinkStateFunc(v) } func flattenComputeDiskSourceImageEncryptionKey(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["raw_key"] = flattenComputeDiskSourceImageEncryptionKeyRawKey(original["rawKey"], d) transformed["sha256"] = flattenComputeDiskSourceImageEncryptionKeySha256(original["sha256"], d) transformed["kms_key_self_link"] = flattenComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d) return []interface{}{transformed} } func flattenComputeDiskSourceImageEncryptionKeyRawKey(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceImageEncryptionKeySha256(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceImageId(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskDiskEncryptionKey(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["raw_key"] = flattenComputeDiskDiskEncryptionKeyRawKey(original["rawKey"], d) transformed["sha256"] = flattenComputeDiskDiskEncryptionKeySha256(original["sha256"], d) transformed["kms_key_self_link"] = flattenComputeDiskDiskEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d) return []interface{}{transformed} } func flattenComputeDiskDiskEncryptionKeyRawKey(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskDiskEncryptionKeySha256(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskDiskEncryptionKeyKmsKeySelfLink(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSnapshot(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return v } return ConvertSelfLinkToV1(v.(string)) } func flattenComputeDiskSourceSnapshotEncryptionKey(v interface{}, d *schema.ResourceData) interface{} { if v == nil { return nil } original := v.(map[string]interface{}) if len(original) == 0 { return nil } transformed := make(map[string]interface{}) transformed["raw_key"] = flattenComputeDiskSourceSnapshotEncryptionKeyRawKey(original["rawKey"], d) transformed["kms_key_self_link"] = flattenComputeDiskSourceSnapshotEncryptionKeyKmsKeySelfLink(original["kmsKeyName"], d) transformed["sha256"] = flattenComputeDiskSourceSnapshotEncryptionKeySha256(original["sha256"], d) return []interface{}{transformed} } func flattenComputeDiskSourceSnapshotEncryptionKeyRawKey(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceSnapshotEncryptionKeyKmsKeySelfLink(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceSnapshotEncryptionKeySha256(v interface{}, d *schema.ResourceData) interface{} { return v } func flattenComputeDiskSourceSnapshotId(v interface{}, d *schema.ResourceData) interface{} { return v } func expandComputeDiskLabelFingerprint(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskDescription(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskLabels(v interface{}, d TerraformResourceData, config *Config) (map[string]string, error) { if v == nil { return map[string]string{}, nil } m := make(map[string]string) for k, val := range v.(map[string]interface{}) { m[k] = val.(string) } return m, nil } func expandComputeDiskName(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSize(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskPhysicalBlockSizeBytes(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskType(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { f, err := parseZonalFieldValue("diskTypes", v.(string), "project", "zone", d, config, true) if err != nil { return nil, fmt.Errorf("Invalid value for type: %s", err) } return f.RelativeLink(), nil } func expandComputeDiskImage(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskZone(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { f, err := parseGlobalFieldValue("zones", v.(string), "project", d, config, true) if err != nil { return nil, fmt.Errorf("Invalid value for zone: %s", err) } return f.RelativeLink(), nil } func expandComputeDiskSourceImageEncryptionKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedRawKey, err := expandComputeDiskSourceImageEncryptionKeyRawKey(original["raw_key"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedRawKey); val.IsValid() && !isEmptyValue(val) { transformed["rawKey"] = transformedRawKey } transformedSha256, err := expandComputeDiskSourceImageEncryptionKeySha256(original["sha256"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedSha256); val.IsValid() && !isEmptyValue(val) { transformed["sha256"] = transformedSha256 } transformedKmsKeySelfLink, err := expandComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(original["kms_key_self_link"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedKmsKeySelfLink); val.IsValid() && !isEmptyValue(val) { transformed["kmsKeyName"] = transformedKmsKeySelfLink } return transformed, nil } func expandComputeDiskSourceImageEncryptionKeyRawKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSourceImageEncryptionKeySha256(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSourceImageEncryptionKeyKmsKeySelfLink(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskDiskEncryptionKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedRawKey, err := expandComputeDiskDiskEncryptionKeyRawKey(original["raw_key"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedRawKey); val.IsValid() && !isEmptyValue(val) { transformed["rawKey"] = transformedRawKey } transformedSha256, err := expandComputeDiskDiskEncryptionKeySha256(original["sha256"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedSha256); val.IsValid() && !isEmptyValue(val) { transformed["sha256"] = transformedSha256 } transformedKmsKeySelfLink, err := expandComputeDiskDiskEncryptionKeyKmsKeySelfLink(original["kms_key_self_link"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedKmsKeySelfLink); val.IsValid() && !isEmptyValue(val) { transformed["kmsKeyName"] = transformedKmsKeySelfLink } return transformed, nil } func expandComputeDiskDiskEncryptionKeyRawKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskDiskEncryptionKeySha256(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskDiskEncryptionKeyKmsKeySelfLink(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSnapshot(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { f, err := parseGlobalFieldValue("snapshots", v.(string), "project", d, config, true) if err != nil { return nil, fmt.Errorf("Invalid value for snapshot: %s", err) } return f.RelativeLink(), nil } func expandComputeDiskSourceSnapshotEncryptionKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { l := v.([]interface{}) if len(l) == 0 || l[0] == nil { return nil, nil } raw := l[0] original := raw.(map[string]interface{}) transformed := make(map[string]interface{}) transformedRawKey, err := expandComputeDiskSourceSnapshotEncryptionKeyRawKey(original["raw_key"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedRawKey); val.IsValid() && !isEmptyValue(val) { transformed["rawKey"] = transformedRawKey } transformedKmsKeySelfLink, err := expandComputeDiskSourceSnapshotEncryptionKeyKmsKeySelfLink(original["kms_key_self_link"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedKmsKeySelfLink); val.IsValid() && !isEmptyValue(val) { transformed["kmsKeyName"] = transformedKmsKeySelfLink } transformedSha256, err := expandComputeDiskSourceSnapshotEncryptionKeySha256(original["sha256"], d, config) if err != nil { return nil, err } else if val := reflect.ValueOf(transformedSha256); val.IsValid() && !isEmptyValue(val) { transformed["sha256"] = transformedSha256 } return transformed, nil } func expandComputeDiskSourceSnapshotEncryptionKeyRawKey(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSourceSnapshotEncryptionKeyKmsKeySelfLink(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func expandComputeDiskSourceSnapshotEncryptionKeySha256(v interface{}, d TerraformResourceData, config *Config) (interface{}, error) { return v, nil } func resourceComputeDiskEncoder(d *schema.ResourceData, meta interface{}, obj map[string]interface{}) (map[string]interface{}, error) { config := meta.(*Config) project, err := getProject(d, config) if err != nil { return nil, err } // Get the zone z, err := getZone(d, config) if err != nil { return nil, err } zone, err := config.clientCompute.Zones.Get(project, z).Do() if err != nil { return nil, err } if v, ok := d.GetOk("type"); ok { log.Printf("[DEBUG] Loading disk type: %s", v.(string)) diskType, err := readDiskType(config, zone, project, v.(string)) if err != nil { return nil, fmt.Errorf( "Error loading disk type '%s': %s", v.(string), err) } obj["type"] = diskType.SelfLink } if v, ok := d.GetOk("image"); ok { log.Printf("[DEBUG] Resolving image name: %s", v.(string)) imageUrl, err := resolveImage(config, project, v.(string)) if err != nil { return nil, fmt.Errorf( "Error resolving image name '%s': %s", v.(string), err) } obj["sourceImage"] = imageUrl log.Printf("[DEBUG] Image name resolved to: %s", imageUrl) } return obj, nil } func resourceComputeDiskDecoder(d *schema.ResourceData, meta interface{}, res map[string]interface{}) (map[string]interface{}, error) { if v, ok := res["diskEncryptionKey"]; ok { original := v.(map[string]interface{}) transformed := make(map[string]interface{}) // The raw key won't be returned, so we need to use the original. transformed["rawKey"] = d.Get("disk_encryption_key.0.raw_key") transformed["sha256"] = original["sha256"] if kmsKeyName, ok := original["kmsKeyName"]; ok { // The response for crypto keys often includes the version of the key which needs to be removed // format: projects//locations//keyRings//cryptoKeys//cryptoKeyVersions/1 transformed["kmsKeyName"] = strings.Split(kmsKeyName.(string), "/cryptoKeyVersions")[0] } res["diskEncryptionKey"] = transformed } if v, ok := res["sourceImageEncryptionKey"]; ok { original := v.(map[string]interface{}) transformed := make(map[string]interface{}) // The raw key won't be returned, so we need to use the original. transformed["rawKey"] = d.Get("source_image_encryption_key.0.raw_key") transformed["sha256"] = original["sha256"] if kmsKeyName, ok := original["kmsKeyName"]; ok { // The response for crypto keys often includes the version of the key which needs to be removed // format: projects//locations//keyRings//cryptoKeys//cryptoKeyVersions/1 transformed["kmsKeyName"] = strings.Split(kmsKeyName.(string), "/cryptoKeyVersions")[0] } res["sourceImageEncryptionKey"] = transformed } if v, ok := res["sourceSnapshotEncryptionKey"]; ok { original := v.(map[string]interface{}) transformed := make(map[string]interface{}) // The raw key won't be returned, so we need to use the original. transformed["rawKey"] = d.Get("source_snapshot_encryption_key.0.raw_key") transformed["sha256"] = original["sha256"] if kmsKeyName, ok := original["kmsKeyName"]; ok { // The response for crypto keys often includes the version of the key which needs to be removed // format: projects//locations//keyRings//cryptoKeys//cryptoKeyVersions/1 transformed["kmsKeyName"] = strings.Split(kmsKeyName.(string), "/cryptoKeyVersions")[0] } res["sourceSnapshotEncryptionKey"] = transformed } return res, nil }