mirror of
https://github.com/kreuzwerker/terraform-provider-docker.git
synced 2025-12-20 22:59:42 -05:00
233 lines
6.7 KiB
Go
233 lines
6.7 KiB
Go
package docker
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"context"
|
|
"encoding/json"
|
|
"log"
|
|
"time"
|
|
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/network"
|
|
"github.com/hashicorp/terraform-plugin-sdk/helper/resource"
|
|
"github.com/hashicorp/terraform-plugin-sdk/helper/schema"
|
|
)
|
|
|
|
func resourceDockerNetworkCreate(d *schema.ResourceData, meta interface{}) error {
|
|
client := meta.(*ProviderConfig).DockerClient
|
|
|
|
createOpts := types.NetworkCreate{}
|
|
if v, ok := d.GetOk("labels"); ok {
|
|
createOpts.Labels = labelSetToMap(v.(*schema.Set))
|
|
}
|
|
if v, ok := d.GetOk("check_duplicate"); ok {
|
|
createOpts.CheckDuplicate = v.(bool)
|
|
}
|
|
if v, ok := d.GetOk("driver"); ok {
|
|
createOpts.Driver = v.(string)
|
|
}
|
|
if v, ok := d.GetOk("options"); ok {
|
|
createOpts.Options = mapTypeMapValsToString(v.(map[string]interface{}))
|
|
}
|
|
if v, ok := d.GetOk("internal"); ok {
|
|
createOpts.Internal = v.(bool)
|
|
}
|
|
if v, ok := d.GetOk("attachable"); ok {
|
|
createOpts.Attachable = v.(bool)
|
|
}
|
|
if v, ok := d.GetOk("ingress"); ok {
|
|
createOpts.Ingress = v.(bool)
|
|
}
|
|
if v, ok := d.GetOk("ipv6"); ok {
|
|
createOpts.EnableIPv6 = v.(bool)
|
|
}
|
|
|
|
ipamOpts := &network.IPAM{}
|
|
ipamOptsSet := false
|
|
if v, ok := d.GetOk("ipam_driver"); ok {
|
|
ipamOpts.Driver = v.(string)
|
|
ipamOptsSet = true
|
|
}
|
|
if v, ok := d.GetOk("ipam_config"); ok {
|
|
ipamOpts.Config = ipamConfigSetToIpamConfigs(v.(*schema.Set))
|
|
ipamOptsSet = true
|
|
}
|
|
|
|
if ipamOptsSet {
|
|
createOpts.IPAM = ipamOpts
|
|
}
|
|
|
|
retNetwork := types.NetworkCreateResponse{}
|
|
retNetwork, err := client.NetworkCreate(context.Background(), d.Get("name").(string), createOpts)
|
|
if err != nil {
|
|
return fmt.Errorf("Unable to create network: %s", err)
|
|
}
|
|
|
|
d.SetId(retNetwork.ID)
|
|
// d.Set("check_duplicate") TODO
|
|
return resourceDockerNetworkRead(d, meta)
|
|
}
|
|
|
|
func resourceDockerNetworkRead(d *schema.ResourceData, meta interface{}) error {
|
|
log.Printf("[INFO] Waiting for network: '%s' to expose all fields: max '%v seconds'", d.Id(), 30)
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
Pending: []string{"pending"},
|
|
Target: []string{"all_fields", "removed"},
|
|
Refresh: resourceDockerNetworkReadRefreshFunc(d, meta),
|
|
Timeout: 30 * time.Second,
|
|
MinTimeout: 5 * time.Second,
|
|
Delay: 2 * time.Second,
|
|
}
|
|
|
|
// Wait, catching any errors
|
|
_, err := stateConf.WaitForState()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func resourceDockerNetworkDelete(d *schema.ResourceData, meta interface{}) error {
|
|
log.Printf("[INFO] Waiting for network: '%s' to be removed: max '%v seconds'", d.Id(), 30)
|
|
|
|
stateConf := &resource.StateChangeConf{
|
|
Pending: []string{"pending"},
|
|
Target: []string{"removed"},
|
|
Refresh: resourceDockerNetworkRemoveRefreshFunc(d, meta),
|
|
Timeout: 30 * time.Second,
|
|
MinTimeout: 5 * time.Second,
|
|
Delay: 2 * time.Second,
|
|
}
|
|
|
|
// Wait, catching any errors
|
|
_, err := stateConf.WaitForState()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
d.SetId("")
|
|
return nil
|
|
}
|
|
|
|
func ipamConfigSetToIpamConfigs(ipamConfigSet *schema.Set) []network.IPAMConfig {
|
|
ipamConfigs := make([]network.IPAMConfig, ipamConfigSet.Len())
|
|
|
|
for i, ipamConfigInt := range ipamConfigSet.List() {
|
|
ipamConfigRaw := ipamConfigInt.(map[string]interface{})
|
|
|
|
ipamConfig := network.IPAMConfig{}
|
|
ipamConfig.Subnet = ipamConfigRaw["subnet"].(string)
|
|
ipamConfig.IPRange = ipamConfigRaw["ip_range"].(string)
|
|
ipamConfig.Gateway = ipamConfigRaw["gateway"].(string)
|
|
|
|
auxAddressRaw := ipamConfigRaw["aux_address"].(map[string]interface{})
|
|
ipamConfig.AuxAddress = make(map[string]string, len(auxAddressRaw))
|
|
for k, v := range auxAddressRaw {
|
|
ipamConfig.AuxAddress[k] = v.(string)
|
|
}
|
|
|
|
ipamConfigs[i] = ipamConfig
|
|
}
|
|
|
|
return ipamConfigs
|
|
}
|
|
|
|
func resourceDockerNetworkReadRefreshFunc(
|
|
d *schema.ResourceData, meta interface{}) resource.StateRefreshFunc {
|
|
return func() (interface{}, string, error) {
|
|
client := meta.(*ProviderConfig).DockerClient
|
|
networkID := d.Id()
|
|
|
|
retNetwork, _, err := client.NetworkInspectWithRaw(context.Background(), networkID, types.NetworkInspectOptions{})
|
|
if err != nil {
|
|
log.Printf("[WARN] Network (%s) not found, removing from state", networkID)
|
|
d.SetId("")
|
|
return networkID, "removed", nil
|
|
}
|
|
|
|
jsonObj, _ := json.MarshalIndent(retNetwork, "", "\t")
|
|
log.Printf("[DEBUG] Docker network inspect: %s", jsonObj)
|
|
|
|
d.Set("name", retNetwork.Name)
|
|
d.Set("labels", retNetwork.Labels)
|
|
d.Set("driver", retNetwork.Driver)
|
|
d.Set("internal", retNetwork.Internal)
|
|
d.Set("attachable", retNetwork.Attachable)
|
|
d.Set("ingress", retNetwork.Ingress)
|
|
d.Set("ipv6", retNetwork.EnableIPv6)
|
|
d.Set("ipam_driver", retNetwork.IPAM.Driver)
|
|
d.Set("scope", retNetwork.Scope)
|
|
if retNetwork.Scope == "overlay" {
|
|
if retNetwork.Options != nil && len(retNetwork.Options) != 0 {
|
|
d.Set("options", retNetwork.Options)
|
|
} else {
|
|
log.Printf("[DEBUG] options: %v not exposed", retNetwork.Options)
|
|
return networkID, "pending", nil
|
|
}
|
|
} else {
|
|
d.Set("options", retNetwork.Options)
|
|
}
|
|
|
|
if err = d.Set("ipam_config", flattenIpamConfigSpec(retNetwork.IPAM.Config)); err != nil {
|
|
log.Printf("[WARN] failed to set ipam config from API: %s", err)
|
|
}
|
|
|
|
log.Println("[DEBUG] all network fields exposed")
|
|
return networkID, "all_fields", nil
|
|
}
|
|
}
|
|
|
|
func resourceDockerNetworkRemoveRefreshFunc(
|
|
d *schema.ResourceData, meta interface{}) resource.StateRefreshFunc {
|
|
return func() (interface{}, string, error) {
|
|
client := meta.(*ProviderConfig).DockerClient
|
|
networkID := d.Id()
|
|
|
|
_, _, err := client.NetworkInspectWithRaw(context.Background(), networkID, types.NetworkInspectOptions{})
|
|
if err != nil {
|
|
log.Printf("[INFO] Network (%s) not found. Already removed", networkID)
|
|
return networkID, "removed", nil
|
|
}
|
|
|
|
if err := client.NetworkRemove(context.Background(), networkID); err != nil {
|
|
if strings.Contains(err.Error(), "has active endpoints") {
|
|
return networkID, "pending", nil
|
|
}
|
|
return networkID, "other", err
|
|
}
|
|
|
|
return networkID, "removed", nil
|
|
}
|
|
}
|
|
|
|
// TODO mavogel: separate structure file
|
|
// TODO 2: seems like we can replace the set hash generation with plain lists -> #219
|
|
func flattenIpamConfigSpec(in []network.IPAMConfig) *schema.Set { // []interface{} {
|
|
var out = make([]interface{}, len(in), len(in))
|
|
for i, v := range in {
|
|
log.Printf("[DEBUG] flatten ipam %d: %#v", i, v)
|
|
m := make(map[string]interface{})
|
|
if len(v.Subnet) > 0 {
|
|
m["subnet"] = v.Subnet
|
|
}
|
|
if len(v.IPRange) > 0 {
|
|
m["ip_range"] = v.IPRange
|
|
}
|
|
if len(v.Gateway) > 0 {
|
|
m["gateway"] = v.Gateway
|
|
}
|
|
if len(v.AuxAddress) > 0 {
|
|
m["aux_address"] = v.AuxAddress
|
|
}
|
|
out[i] = m
|
|
}
|
|
// log.Printf("[INFO] flatten ipam out: %#v", out)
|
|
imapConfigsResource := resourceDockerNetwork().Schema["ipam_config"].Elem.(*schema.Resource)
|
|
f := schema.HashResource(imapConfigsResource)
|
|
return schema.NewSet(f, out)
|
|
// return out
|
|
}
|