Merge pull request #396 from hashicorp/f-consul-schema

Port Consul provider to new helper.Schema, add Token support
pull/399/head
Mitchell Hashimoto 12 years ago
commit 6fea336c09

@ -3,13 +3,10 @@ package main
import ( import (
"github.com/hashicorp/terraform/builtin/providers/consul" "github.com/hashicorp/terraform/builtin/providers/consul"
"github.com/hashicorp/terraform/plugin" "github.com/hashicorp/terraform/plugin"
"github.com/hashicorp/terraform/terraform"
) )
func main() { func main() {
plugin.Serve(&plugin.ServeOpts{ plugin.Serve(&plugin.ServeOpts{
ProviderFunc: func() terraform.ResourceProvider { ProviderFunc: consul.Provider,
return new(consul.ResourceProvider)
},
}) })
} }

@ -1,201 +1,250 @@
package consul package consul
import ( import (
"bytes"
"fmt" "fmt"
"log" "log"
"strconv" "strconv"
"github.com/armon/consul-api" "github.com/armon/consul-api"
"github.com/hashicorp/terraform/flatmap" "github.com/hashicorp/terraform/helper/hashcode"
"github.com/hashicorp/terraform/helper/config" "github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/helper/diff"
"github.com/hashicorp/terraform/terraform"
) )
func resource_consul_keys_validation() *config.Validator { func resourceConsulKeys() *schema.Resource {
return &config.Validator{ return &schema.Resource{
Required: []string{ Create: resourceConsulKeysCreate,
"key.*.name", Update: resourceConsulKeysCreate,
"key.*.path", Read: resourceConsulKeysRead,
}, Delete: resourceConsulKeysDelete,
Optional: []string{
"datacenter", Schema: map[string]*schema.Schema{
"key.*.value", "datacenter": &schema.Schema{
"key.*.default", Type: schema.TypeString,
"key.*.delete", Optional: true,
Computed: true,
ForceNew: true,
},
"token": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"keys": &schema.Schema{
Type: schema.TypeSet,
Optional: true,
Elem: &schema.Resource{
Schema: map[string]*schema.Schema{
"name": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"path": &schema.Schema{
Type: schema.TypeString,
Required: true,
},
"value": &schema.Schema{
Type: schema.TypeString,
Optional: true,
Computed: true,
},
"default": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
"delete": &schema.Schema{
Type: schema.TypeBool,
Optional: true,
},
},
},
Set: resourceConsulKeysHash,
},
"var": &schema.Schema{
Type: schema.TypeMap,
Computed: true,
},
}, },
} }
} }
func resource_consul_keys_update(
s *terraform.InstanceState,
d *terraform.InstanceDiff,
meta interface{}) (*terraform.InstanceState, error) {
return resource_consul_keys_create(s, d, meta)
}
func resource_consul_keys_create( func resourceConsulKeysHash(v interface{}) int {
s *terraform.InstanceState, var buf bytes.Buffer
d *terraform.InstanceDiff, m := v.(map[string]interface{})
meta interface{}) (*terraform.InstanceState, error) { buf.WriteString(fmt.Sprintf("%s-", m["name"].(string)))
p := meta.(*ResourceProvider) buf.WriteString(fmt.Sprintf("%s-", m["path"].(string)))
return hashcode.String(buf.String())
}
// Merge the diff into the state so that we have all the attributes func resourceConsulKeysCreate(d *schema.ResourceData, meta interface{}) error {
// properly. client := meta.(*consulapi.Client)
rs := s.MergeDiff(d) kv := client.KV()
rs.ID = "consul"
// Check if the datacenter should be computed // Resolve the datacenter first, all the other keys are dependent
dc := rs.Attributes["datacenter"] // on this.
if aDiff, ok := d.Attributes["datacenter"]; ok && aDiff.NewComputed { var dc string
if v, ok := d.GetOk("datacenter"); ok {
dc = v.(string)
log.Printf("[DEBUG] Consul datacenter: %s", dc)
} else {
log.Printf("[DEBUG] Resolving Consul datacenter...")
var err error var err error
dc, err = get_dc(p.client) dc, err = get_dc(client)
if err != nil { if err != nil {
return rs, fmt.Errorf("Failed to get agent datacenter: %v", err) return err
} }
rs.Attributes["datacenter"] = dc
} }
var token string
// Get the keys if v, ok := d.GetOk("token"); ok {
keys, ok := flatmap.Expand(rs.Attributes, "key").([]interface{}) token = v.(string)
if !ok {
return rs, fmt.Errorf("Failed to unroll keys")
} }
kv := p.client.KV() // Setup the operations using the datacenter
qOpts := consulapi.QueryOptions{Datacenter: dc} qOpts := consulapi.QueryOptions{Datacenter: dc, Token: token}
wOpts := consulapi.WriteOptions{Datacenter: dc} wOpts := consulapi.WriteOptions{Datacenter: dc, Token: token}
for idx, raw := range keys {
// Store the computed vars
vars := make(map[string]string)
// Extract the keys
keys := d.Get("keys").(*schema.Set).List()
for _, raw := range keys {
key, path, sub, err := parse_key(raw) key, path, sub, err := parse_key(raw)
if err != nil { if err != nil {
return rs, err return err
} }
if valueRaw, ok := sub["value"]; ok { if valueRaw, ok := sub["value"]; ok {
value, ok := valueRaw.(string) value, ok := valueRaw.(string)
if !ok { if !ok {
return rs, fmt.Errorf("Failed to get value for key '%s'", key) return fmt.Errorf("Failed to get value for key '%s'", key)
} }
log.Printf("[DEBUG] Setting key '%s' to '%v' in %s", path, value, dc) log.Printf("[DEBUG] Setting key '%s' to '%v' in %s", path, value, dc)
pair := consulapi.KVPair{Key: path, Value: []byte(value)} pair := consulapi.KVPair{Key: path, Value: []byte(value)}
if _, err := kv.Put(&pair, &wOpts); err != nil { if _, err := kv.Put(&pair, &wOpts); err != nil {
return rs, fmt.Errorf("Failed to set Consul key '%s': %v", path, err) return fmt.Errorf("Failed to set Consul key '%s': %v", path, err)
} }
rs.Attributes[fmt.Sprintf("var.%s", key)] = value vars[key] = value
rs.Attributes[fmt.Sprintf("key.%d.value", idx)] = value sub["value"] = value
} else { } else {
log.Printf("[DEBUG] Getting key '%s' in %s", path, dc) log.Printf("[DEBUG] Getting key '%s' in %s", path, dc)
pair, _, err := kv.Get(path, &qOpts) pair, _, err := kv.Get(path, &qOpts)
if err != nil { if err != nil {
return rs, fmt.Errorf("Failed to get Consul key '%s': %v", path, err) return fmt.Errorf("Failed to get Consul key '%s': %v", path, err)
} }
rs.Attributes[fmt.Sprintf("var.%s", key)] = attribute_value(sub, key, pair) value := attribute_value(sub, key, pair)
vars[key] = value
sub["value"] = value
} }
} }
return rs, nil
// Update the resource
d.SetId("consul")
d.Set("datacenter", dc)
d.Set("keys", keys)
d.Set("var", vars)
return nil
} }
func resource_consul_keys_destroy( func resourceConsulKeysRead(d *schema.ResourceData, meta interface{}) error {
s *terraform.InstanceState, client := meta.(*consulapi.Client)
meta interface{}) error {
p := meta.(*ResourceProvider)
client := p.client
kv := client.KV() kv := client.KV()
// Get the keys // Get the DC, error if not available.
keys, ok := flatmap.Expand(s.Attributes, "key").([]interface{}) var dc string
if !ok { if v, ok := d.GetOk("datacenter"); ok {
return fmt.Errorf("Failed to unroll keys") dc = v.(string)
log.Printf("[DEBUG] Consul datacenter: %s", dc)
} else {
return fmt.Errorf("Missing datacenter configuration")
}
var token string
if v, ok := d.GetOk("token"); ok {
token = v.(string)
} }
dc := s.Attributes["datacenter"] // Setup the operations using the datacenter
wOpts := consulapi.WriteOptions{Datacenter: dc} qOpts := consulapi.QueryOptions{Datacenter: dc, Token: token}
// Store the computed vars
vars := make(map[string]string)
// Extract the keys
keys := d.Get("keys").(*schema.Set).List()
for _, raw := range keys { for _, raw := range keys {
_, path, sub, err := parse_key(raw) key, path, sub, err := parse_key(raw)
if err != nil { if err != nil {
return err return err
} }
// Ignore if the key is non-managed log.Printf("[DEBUG] Refreshing value of key '%s' in %s", path, dc)
shouldDelete, ok := sub["delete"].(bool) pair, _, err := kv.Get(path, &qOpts)
if !ok || !shouldDelete { if err != nil {
continue return fmt.Errorf("Failed to get value for path '%s' from Consul: %v", path, err)
} }
log.Printf("[DEBUG] Deleting key '%s' in %s", path, dc) value := attribute_value(sub, key, pair)
if _, err := kv.Delete(path, &wOpts); err != nil { vars[key] = value
return fmt.Errorf("Failed to delete Consul key '%s': %v", path, err) sub["value"] = value
}
} }
// Update the resource
d.Set("keys", keys)
d.Set("var", vars)
return nil return nil
} }
func resource_consul_keys_diff( func resourceConsulKeysDelete(d *schema.ResourceData, meta interface{}) error {
s *terraform.InstanceState, client := meta.(*consulapi.Client)
c *terraform.ResourceConfig, kv := client.KV()
meta interface{}) (*terraform.InstanceDiff, error) {
// Determine the list of computed variables // Get the DC, error if not available.
var computed []string var dc string
keys, ok := flatmap.Expand(flatmap.Flatten(c.Config), "key").([]interface{}) if v, ok := d.GetOk("datacenter"); ok {
if !ok { dc = v.(string)
goto AFTER log.Printf("[DEBUG] Consul datacenter: %s", dc)
} else {
return fmt.Errorf("Missing datacenter configuration")
} }
for _, sub := range keys { var token string
key, _, _, err := parse_key(sub) if v, ok := d.GetOk("token"); ok {
if err != nil { token = v.(string)
continue
}
computed = append(computed, "var."+key)
}
AFTER:
b := &diff.ResourceBuilder{
Attrs: map[string]diff.AttrType{
"datacenter": diff.AttrTypeCreate,
"key": diff.AttrTypeUpdate,
},
ComputedAttrsUpdate: computed,
} }
return b.Diff(s, c)
}
func resource_consul_keys_refresh( // Setup the operations using the datacenter
s *terraform.InstanceState, wOpts := consulapi.WriteOptions{Datacenter: dc, Token: token}
meta interface{}) (*terraform.InstanceState, error) {
p := meta.(*ResourceProvider)
client := p.client
kv := client.KV()
// Get the list of keys // Extract the keys
keys, ok := flatmap.Expand(s.Attributes, "key").([]interface{}) keys := d.Get("keys").(*schema.Set).List()
if !ok { for _, raw := range keys {
return s, fmt.Errorf("Failed to unroll keys") _, path, sub, err := parse_key(raw)
}
// Update each key
dc := s.Attributes["datacenter"]
opts := consulapi.QueryOptions{Datacenter: dc}
for idx, raw := range keys {
key, path, sub, err := parse_key(raw)
if err != nil { if err != nil {
return s, err return err
} }
log.Printf("[DEBUG] Refreshing value of key '%s' in %s", path, dc) // Ignore if the key is non-managed
pair, _, err := kv.Get(path, &opts) shouldDelete, ok := sub["delete"].(bool)
if err != nil { if !ok || !shouldDelete {
return s, fmt.Errorf("Failed to get value for path '%s' from Consul: %v", path, err) continue
} }
setVal := attribute_value(sub, key, pair) log.Printf("[DEBUG] Deleting key '%s' in %s", path, dc)
s.Attributes[fmt.Sprintf("var.%s", key)] = setVal if _, err := kv.Delete(path, &wOpts); err != nil {
if _, ok := sub["value"]; ok { return fmt.Errorf("Failed to delete Consul key '%s': %v", path, err)
s.Attributes[fmt.Sprintf("key.%d.value", idx)] = setVal
} }
} }
return s, nil
// Clear the ID
d.SetId("")
return nil
} }
// parse_key is used to parse a key into a name, path, config or error // parse_key is used to parse a key into a name, path, config or error
@ -217,7 +266,8 @@ func parse_key(raw interface{}) (string, string, map[string]interface{}, error)
return key, path, sub, nil return key, path, sub, nil
} }
// attribute_value determienes the value for a key // attribute_value determines the value for a key, potentially
// using a default value if provided.
func attribute_value(sub map[string]interface{}, key string, pair *consulapi.KVPair) string { func attribute_value(sub map[string]interface{}, key string, pair *consulapi.KVPair) string {
// Use the value if given // Use the value if given
if pair != nil { if pair != nil {

@ -29,7 +29,7 @@ func TestAccConsulKeys(t *testing.T) {
} }
func testAccCheckConsulKeysDestroy(s *terraform.State) error { func testAccCheckConsulKeysDestroy(s *terraform.State) error {
kv := testAccProvider.client.KV() kv := testAccProvider.Meta().(*consulapi.Client).KV()
opts := &consulapi.QueryOptions{Datacenter: "nyc1"} opts := &consulapi.QueryOptions{Datacenter: "nyc1"}
pair, _, err := kv.Get("test/set", opts) pair, _, err := kv.Get("test/set", opts)
if err != nil { if err != nil {
@ -43,7 +43,7 @@ func testAccCheckConsulKeysDestroy(s *terraform.State) error {
func testAccCheckConsulKeysExists() resource.TestCheckFunc { func testAccCheckConsulKeysExists() resource.TestCheckFunc {
return func(s *terraform.State) error { return func(s *terraform.State) error {
kv := testAccProvider.client.KV() kv := testAccProvider.Meta().(*consulapi.Client).KV()
opts := &consulapi.QueryOptions{Datacenter: "nyc1"} opts := &consulapi.QueryOptions{Datacenter: "nyc1"}
pair, _, err := kv.Get("test/set", opts) pair, _, err := kv.Get("test/set", opts)
if err != nil { if err != nil {

@ -3,71 +3,40 @@ package consul
import ( import (
"log" "log"
"github.com/armon/consul-api" "github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/helper/config"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
"github.com/mitchellh/mapstructure"
) )
type ResourceProvider struct { // Provider returns a terraform.ResourceProvider.
Config Config func Provider() terraform.ResourceProvider {
client *consulapi.Client return &schema.Provider{
} Schema: map[string]*schema.Schema{
"datacenter": &schema.Schema{
func (p *ResourceProvider) Input( Type: schema.TypeString,
input terraform.UIInput, Optional: true,
c *terraform.ResourceConfig) (*terraform.ResourceConfig, error) { },
return c, nil
} "address": &schema.Schema{
Type: schema.TypeString,
Optional: true,
},
},
func (p *ResourceProvider) Validate(c *terraform.ResourceConfig) ([]string, []error) { ResourcesMap: map[string]*schema.Resource{
v := &config.Validator{ "consul_keys": resourceConsulKeys(),
Optional: []string{
"datacenter",
"address",
}, },
}
return v.Validate(c)
}
func (p *ResourceProvider) ValidateResource( ConfigureFunc: providerConfigure,
t string, c *terraform.ResourceConfig) ([]string, []error) { }
return resourceMap.Validate(t, c)
} }
func (p *ResourceProvider) Configure(c *terraform.ResourceConfig) error { func providerConfigure(d *schema.ResourceData) (interface{}, error) {
if _, err := config.Decode(&p.Config, c.Config); err != nil { var config Config
return err configRaw := d.Get("").(map[string]interface{})
if err := mapstructure.Decode(configRaw, &config); err != nil {
return nil, err
} }
log.Printf("[INFO] Initializing Consul client") log.Printf("[INFO] Initializing Consul client")
var err error return config.Client()
p.client, err = p.Config.Client()
if err != nil {
return err
}
return nil
}
func (p *ResourceProvider) Apply(
info *terraform.InstanceInfo,
s *terraform.InstanceState,
d *terraform.InstanceDiff) (*terraform.InstanceState, error) {
return resourceMap.Apply(info, s, d, p)
}
func (p *ResourceProvider) Diff(
info *terraform.InstanceInfo,
s *terraform.InstanceState,
c *terraform.ResourceConfig) (*terraform.InstanceDiff, error) {
return resourceMap.Diff(info, s, c, p)
}
func (p *ResourceProvider) Refresh(
info *terraform.InstanceInfo,
s *terraform.InstanceState) (*terraform.InstanceState, error) {
return resourceMap.Refresh(info, s, p)
}
func (p *ResourceProvider) Resources() []terraform.ResourceType {
return resourceMap.Resources()
} }

@ -1,30 +1,35 @@
package consul package consul
import ( import (
"reflect"
"testing" "testing"
"github.com/hashicorp/terraform/config" "github.com/hashicorp/terraform/config"
"github.com/hashicorp/terraform/helper/schema"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
var testAccProviders map[string]terraform.ResourceProvider var testAccProviders map[string]terraform.ResourceProvider
var testAccProvider *ResourceProvider var testAccProvider *schema.Provider
func init() { func init() {
testAccProvider = new(ResourceProvider) testAccProvider = Provider().(*schema.Provider)
testAccProvider.Config.Address = "demo.consul.io:80"
testAccProviders = map[string]terraform.ResourceProvider{ testAccProviders = map[string]terraform.ResourceProvider{
"consul": testAccProvider, "consul": testAccProvider,
} }
} }
func TestResourceProvider(t *testing.T) {
if err := Provider().(*schema.Provider).InternalValidate(); err != nil {
t.Fatalf("err: %s", err)
}
}
func TestResourceProvider_impl(t *testing.T) { func TestResourceProvider_impl(t *testing.T) {
var _ terraform.ResourceProvider = new(ResourceProvider) var _ terraform.ResourceProvider = Provider()
} }
func TestResourceProvider_Configure(t *testing.T) { func TestResourceProvider_Configure(t *testing.T) {
rp := new(ResourceProvider) rp := Provider()
raw := map[string]interface{}{ raw := map[string]interface{}{
"address": "demo.consul.io:80", "address": "demo.consul.io:80",
@ -40,13 +45,4 @@ func TestResourceProvider_Configure(t *testing.T) {
if err != nil { if err != nil {
t.Fatalf("err: %s", err) t.Fatalf("err: %s", err)
} }
expected := Config{
Address: "demo.consul.io:80",
Datacenter: "nyc1",
}
if !reflect.DeepEqual(rp.Config, expected) {
t.Fatalf("bad: %#v", rp.Config)
}
} }

@ -1,24 +0,0 @@
package consul
import (
"github.com/hashicorp/terraform/helper/resource"
)
// resourceMap is the mapping of resources we support to their basic
// operations. This makes it easy to implement new resource types.
var resourceMap *resource.Map
func init() {
resourceMap = &resource.Map{
Mapping: map[string]resource.Resource{
"consul_keys": resource.Resource{
ConfigValidator: resource_consul_keys_validation(),
Create: resource_consul_keys_create,
Destroy: resource_consul_keys_destroy,
Update: resource_consul_keys_update,
Diff: resource_consul_keys_diff,
Refresh: resource_consul_keys_refresh,
},
},
}
}

@ -16,6 +16,7 @@ and to expose infrastructure details to clients.
``` ```
resource "consul_keys" "app" { resource "consul_keys" "app" {
datacenter = "nyc1" datacenter = "nyc1"
token = "abcd"
# Read the launch AMI from Consul # Read the launch AMI from Consul
key { key {
@ -46,6 +47,9 @@ The following arguments are supported:
* `datacenter` - (Optional) The datacenter to use. This overrides the * `datacenter` - (Optional) The datacenter to use. This overrides the
datacenter in the provider setup and the agent's default datacenter. datacenter in the provider setup and the agent's default datacenter.
* `token` - (Optional) The ACL token to use. This overrides the
token that the agent provides by default.
* `key` - (Required) Specifies a key in Consul to be read or written. * `key` - (Required) Specifies a key in Consul to be read or written.
Supported values documented below. Supported values documented below.

Loading…
Cancel
Save