terraform-provider-proxmox/proxmox/provisioner.go

74 lines
1.7 KiB
Go
Raw Normal View History

package proxmox
import (
"context"
"fmt"
2018-07-10 17:37:45 +00:00
"time"
pxapi "github.com/Telmate/proxmox-api-go/proxmox"
"github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/terraform"
)
2018-07-13 17:25:37 +00:00
// Provisioner - Terrafrom properties for proxmox-provisioner
func Provisioner() terraform.ResourceProvisioner {
return &schema.Provisioner{
Schema: map[string]*schema.Schema{
"action": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"net1": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
},
ApplyFunc: applyFn,
}
}
2018-07-13 17:25:37 +00:00
var currentClient *pxapi.Client
func applyFn(ctx context.Context) error {
data := ctx.Value(schema.ProvConfigDataKey).(*schema.ResourceData)
state := ctx.Value(schema.ProvRawStateKey).(*terraform.InstanceState)
connInfo := state.Ephemeral.ConnInfo
act := data.Get("action").(string)
2018-07-13 17:25:37 +00:00
targetNode, _, vmID, err := parseResourceId(state.ID)
if err != nil {
return err
}
2018-07-13 17:25:37 +00:00
vmr := pxapi.NewVmRef(vmID)
vmr.SetNode(targetNode)
client := currentClient
if client == nil {
client, err = getClient(connInfo["pm_api_url"], connInfo["pm_user"], connInfo["pm_password"], connInfo["pm_otp"], connInfo["pm_tls_insecure"] == "true")
if err != nil {
return err
}
currentClient = client
}
switch act {
case "sshbackward":
return pxapi.RemoveSshForwardUsernet(vmr, client)
2017-08-01 23:00:55 +00:00
case "reconnect":
err = pxapi.RemoveSshForwardUsernet(vmr, client)
if err != nil {
return err
}
time.Sleep(10 * time.Second)
2018-07-29 01:39:11 +00:00
vmParams := map[string]interface{}{
2017-08-01 23:00:55 +00:00
"net1": data.Get("net1").(string),
}
_, err = client.SetVmConfig(vmr, vmParams)
time.Sleep(10 * time.Second)
2017-08-01 23:00:55 +00:00
return err
default:
return fmt.Errorf("Unkown action: %s", act)
}
}