providers/ionoscloud/firewall.go (84 lines of code) (raw):

package ionoscloud import ( "context" "log" "github.com/GoogleCloudPlatform/terraformer/providers/ionoscloud/helpers" "github.com/GoogleCloudPlatform/terraformer/terraformutils" ) type FirewallGenerator struct { Service } func (g *FirewallGenerator) InitResources() error { client := g.generateClient() cloudAPIClient := client.CloudAPIClient resourceType := "ionoscloud_firewall" datacenters, err := helpers.GetAllDatacenters(*cloudAPIClient) if err != nil { return err } for _, datacenter := range datacenters { servers, _, err := cloudAPIClient.ServersApi.DatacentersServersGet(context.TODO(), *datacenter.Id).Execute() if err != nil { return err } if servers.Items == nil { log.Printf( "[WARNING] expected a response containing servers but received 'nil' instead, skipping search for datacenter with ID: %v.\n", *datacenter.Id) continue } for _, server := range *servers.Items { nics, _, err := cloudAPIClient.NetworkInterfacesApi.DatacentersServersNicsGet(context.TODO(), *datacenter.Id, *server.Id).Execute() if err != nil { return err } if nics.Items == nil { log.Printf( "[WARNING] expected a response containing NICs but received 'nil' instead, skipping search for server with ID: %v, datacenter ID: %v.\n", *server.Id, *datacenter.Id) continue } lastNicIdx := len(*nics.Items) - 1 for nicIdx, nic := range *nics.Items { firewalls, _, err := cloudAPIClient.FirewallRulesApi.DatacentersServersNicsFirewallrulesGet(context.TODO(), *datacenter.Id, *server.Id, *nic.Id).Depth(1).Execute() if err != nil { return err } if firewalls.Items == nil { log.Printf( "[WARNING] expected a response containing firewall rules but received 'nil' instead, skipping search for NIC with ID: %v, server ID: %v, datacenter ID: %v.\n", *nic.Id, *server.Id, *datacenter.Id) continue } lastFirewallIdx := len(*firewalls.Items) - 1 for firewallIdx, firewall := range *firewalls.Items { // Skip the last firewall rule for the last NIC since this one will be added // to the server separately. if nicIdx == lastNicIdx && firewallIdx == lastFirewallIdx { continue } if firewall.Properties == nil || firewall.Properties.Name == nil { log.Printf( "[WARNING] 'nil' values in the response for the firewall rule with ID %v, NIC ID: %v, server ID: %v, datacenter ID: %v, skipping this resource.\n", *firewall.Id, *nic.Id, *server.Id, *datacenter.Id, ) continue } g.Resources = append(g.Resources, terraformutils.NewResource( *firewall.Id, *firewall.Properties.Name+"-"+*firewall.Id, resourceType, helpers.Ionos, map[string]string{helpers.DcID: *datacenter.Id, helpers.ServerID: *server.Id, helpers.NicID: *nic.Id}, []string{}, map[string]interface{}{})) } } } } return nil }