cloudstack/resource_cloudstack_port_forward.go (303 lines of code) (raw):

// // Licensed to the Apache Software Foundation (ASF) under one // or more contributor license agreements. See the NOTICE file // distributed with this work for additional information // regarding copyright ownership. The ASF licenses this file // to you under the Apache License, Version 2.0 (the // "License"); you may not use this file except in compliance // with the License. You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, // software distributed under the License is distributed on an // "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY // KIND, either express or implied. See the License for the // specific language governing permissions and limitations // under the License. // package cloudstack import ( "fmt" "log" "strconv" "strings" "sync" "time" "github.com/apache/cloudstack-go/v2/cloudstack" "github.com/hashicorp/go-multierror" "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema" ) func resourceCloudStackPortForward() *schema.Resource { return &schema.Resource{ Create: resourceCloudStackPortForwardCreate, Read: resourceCloudStackPortForwardRead, Update: resourceCloudStackPortForwardUpdate, Delete: resourceCloudStackPortForwardDelete, Schema: map[string]*schema.Schema{ "ip_address_id": { Type: schema.TypeString, Required: true, ForceNew: true, }, "managed": { Type: schema.TypeBool, Optional: true, Default: false, }, "project": { Type: schema.TypeString, Optional: true, ForceNew: true, }, "forward": { Type: schema.TypeSet, Required: true, Elem: &schema.Resource{ Schema: map[string]*schema.Schema{ "protocol": { Type: schema.TypeString, Required: true, }, "private_port": { Type: schema.TypeInt, Required: true, }, "public_port": { Type: schema.TypeInt, Required: true, }, "virtual_machine_id": { Type: schema.TypeString, Required: true, }, "vm_guest_ip": { Type: schema.TypeString, Optional: true, }, "uuid": { Type: schema.TypeString, Computed: true, }, }, }, }, }, } } func resourceCloudStackPortForwardCreate(d *schema.ResourceData, meta interface{}) error { // We need to set this upfront in order to be able to save a partial state d.SetId(d.Get("ip_address_id").(string)) // Create all forwards that are configured if nrs := d.Get("forward").(*schema.Set); nrs.Len() > 0 { // Create an empty schema.Set to hold all forwards forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set) err := createPortForwards(d, meta, forwards, nrs) if err != nil { return err } // We need to update this first to preserve the correct state d.Set("forward", forwards) } return resourceCloudStackPortForwardRead(d, meta) } func createPortForwards(d *schema.ResourceData, meta interface{}, forwards *schema.Set, nrs *schema.Set) error { var errs *multierror.Error var wg sync.WaitGroup wg.Add(nrs.Len()) sem := make(chan struct{}, 10) for _, forward := range nrs.List() { // Put in a tiny sleep here to avoid DoS'ing the API time.Sleep(500 * time.Millisecond) go func(forward map[string]interface{}) { defer wg.Done() sem <- struct{}{} // Create a single forward err := createPortForward(d, meta, forward) // If we have a UUID, we need to save the forward if forward["uuid"].(string) != "" { forwards.Add(forward) } if err != nil { errs = multierror.Append(errs, err) } <-sem }(forward.(map[string]interface{})) } wg.Wait() return errs.ErrorOrNil() } func createPortForward(d *schema.ResourceData, meta interface{}, forward map[string]interface{}) error { cs := meta.(*cloudstack.CloudStackClient) // Make sure all required parameters are there if err := verifyPortForwardParams(d, forward); err != nil { return err } vm, _, err := cs.VirtualMachine.GetVirtualMachineByID( forward["virtual_machine_id"].(string), cloudstack.WithProject(d.Get("project").(string)), ) if err != nil { return err } // Create a new parameter struct p := cs.Firewall.NewCreatePortForwardingRuleParams(d.Id(), forward["private_port"].(int), forward["protocol"].(string), forward["public_port"].(int), vm.Id) if vmGuestIP, ok := forward["vm_guest_ip"]; ok && vmGuestIP.(string) != "" { p.SetVmguestip(vmGuestIP.(string)) // Set the network ID based on the guest IP, needed when the public IP address // is not associated with any network yet NICS: for _, nic := range vm.Nic { if vmGuestIP.(string) == nic.Ipaddress { p.SetNetworkid(nic.Networkid) break NICS } for _, ip := range nic.Secondaryip { if vmGuestIP.(string) == ip.Ipaddress { p.SetNetworkid(nic.Networkid) break NICS } } } } else { // If no guest IP is configured, use the primary NIC p.SetNetworkid(vm.Nic[0].Networkid) } // Do not open the firewall automatically in any case p.SetOpenfirewall(false) r, err := cs.Firewall.CreatePortForwardingRule(p) if err != nil { return err } forward["uuid"] = r.Id return nil } func resourceCloudStackPortForwardRead(d *schema.ResourceData, meta interface{}) error { cs := meta.(*cloudstack.CloudStackClient) // First check if the IP address is still associated _, count, err := cs.Address.GetPublicIpAddressByID( d.Id(), cloudstack.WithProject(d.Get("project").(string)), ) if err != nil { if count == 0 { log.Printf( "[DEBUG] IP address with ID %s is no longer associated", d.Id()) d.SetId("") return nil } return err } // Get all the forwards from the running environment p := cs.Firewall.NewListPortForwardingRulesParams() p.SetIpaddressid(d.Id()) p.SetListall(true) if err := setProjectid(p, cs, d); err != nil { return err } l, err := cs.Firewall.ListPortForwardingRules(p) if err != nil { return err } // Make a map of all the forwards so we can easily find a forward forwardMap := make(map[string]*cloudstack.PortForwardingRule, l.Count) for _, f := range l.PortForwardingRules { forwardMap[f.Id] = f } // Create an empty schema.Set to hold all forwards forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set) // Read all forwards that are configured if rs := d.Get("forward").(*schema.Set); rs.Len() > 0 { for _, forward := range rs.List() { forward := forward.(map[string]interface{}) id, ok := forward["uuid"] if !ok || id.(string) == "" { continue } // Get the forward f, ok := forwardMap[id.(string)] if !ok { forward["uuid"] = "" continue } // Delete the known rule so only unknown rules remain in the ruleMap delete(forwardMap, id.(string)) privPort, err := strconv.Atoi(f.Privateport) if err != nil { return err } pubPort, err := strconv.Atoi(f.Publicport) if err != nil { return err } // Update the values forward["protocol"] = f.Protocol forward["private_port"] = privPort forward["public_port"] = pubPort forward["virtual_machine_id"] = f.Virtualmachineid // This one is a bit tricky. We only want to update this optional value // if we've set one ourselves. If not this would become a computed value // and that would mess up the calculated hash of the set item. if forward["vm_guest_ip"].(string) != "" { forward["vm_guest_ip"] = f.Vmguestip } forwards.Add(forward) } } // If this is a managed resource, add all unknown forwards to dummy forwards managed := d.Get("managed").(bool) if managed && len(forwardMap) > 0 { for uuid := range forwardMap { // Make a dummy forward to hold the unknown UUID forward := map[string]interface{}{ "protocol": uuid, "private_port": 0, "public_port": 0, "virtual_machine_id": uuid, "uuid": uuid, } // Add the dummy forward to the forwards set forwards.Add(forward) } } if forwards.Len() > 0 { d.Set("forward", forwards) } else if !managed { d.SetId("") } return nil } func resourceCloudStackPortForwardUpdate(d *schema.ResourceData, meta interface{}) error { // Check if the forward set as a whole has changed if d.HasChange("forward") { o, n := d.GetChange("forward") ors := o.(*schema.Set).Difference(n.(*schema.Set)) nrs := n.(*schema.Set).Difference(o.(*schema.Set)) // We need to start with a rule set containing all the rules we // already have and want to keep. Any rules that are not deleted // correctly and any newly created rules, will be added to this // set to make sure we end up in a consistent state forwards := o.(*schema.Set).Intersection(n.(*schema.Set)) // First loop through all the old forwards and delete them if ors.Len() > 0 { err := deletePortForwards(d, meta, forwards, ors) // We need to update this first to preserve the correct state d.Set("forward", forwards) if err != nil { return err } } // Then loop through all the new forwards and create them if nrs.Len() > 0 { err := createPortForwards(d, meta, forwards, nrs) // We need to update this first to preserve the correct state d.Set("forward", forwards) if err != nil { return err } } } return resourceCloudStackPortForwardRead(d, meta) } func resourceCloudStackPortForwardDelete(d *schema.ResourceData, meta interface{}) error { // Create an empty rule set to hold all rules that where // not deleted correctly forwards := resourceCloudStackPortForward().Schema["forward"].ZeroValue().(*schema.Set) // Delete all forwards if ors := d.Get("forward").(*schema.Set); ors.Len() > 0 { err := deletePortForwards(d, meta, forwards, ors) // We need to update this first to preserve the correct state d.Set("forward", forwards) if err != nil { return err } } return nil } func deletePortForwards(d *schema.ResourceData, meta interface{}, forwards *schema.Set, ors *schema.Set) error { var errs *multierror.Error var wg sync.WaitGroup wg.Add(ors.Len()) sem := make(chan struct{}, 10) for _, forward := range ors.List() { // Put a sleep here to avoid DoS'ing the API time.Sleep(500 * time.Millisecond) go func(forward map[string]interface{}) { defer wg.Done() sem <- struct{}{} // Delete a single forward err := deletePortForward(d, meta, forward) // If we have a UUID, we need to save the forward if forward["uuid"].(string) != "" { forwards.Add(forward) } if err != nil { errs = multierror.Append(errs, err) } <-sem }(forward.(map[string]interface{})) } wg.Wait() return errs.ErrorOrNil() } func deletePortForward(d *schema.ResourceData, meta interface{}, forward map[string]interface{}) error { cs := meta.(*cloudstack.CloudStackClient) // Create the parameter struct p := cs.Firewall.NewDeletePortForwardingRuleParams(forward["uuid"].(string)) // Delete the forward if _, err := cs.Firewall.DeletePortForwardingRule(p); err != nil { // This is a very poor way to be told the ID does no longer exist :( if !strings.Contains(err.Error(), fmt.Sprintf( "Invalid parameter id value=%s due to incorrect long value format, "+ "or entity does not exist", forward["uuid"].(string))) { return err } } // Empty the UUID of this rule forward["uuid"] = "" return nil } func verifyPortForwardParams(d *schema.ResourceData, forward map[string]interface{}) error { protocol := forward["protocol"].(string) if protocol != "tcp" && protocol != "udp" { return fmt.Errorf( "%s is not a valid protocol. Valid options are 'tcp' and 'udp'", protocol) } return nil }