319 lines
10 KiB
Go
319 lines
10 KiB
Go
package k8s
|
||
|
||
import (
|
||
"context"
|
||
"time"
|
||
|
||
"github.com/hashicorp/terraform-plugin-framework-timeouts/resource/timeouts"
|
||
"github.com/hashicorp/terraform-plugin-framework/path"
|
||
"github.com/hashicorp/terraform-plugin-framework/resource"
|
||
"github.com/hashicorp/terraform-plugin-framework/resource/schema"
|
||
"github.com/hashicorp/terraform-plugin-framework/types"
|
||
"github.com/hashicorp/terraform-plugin-log/tflog"
|
||
"repository.basistech.ru/BASIS/decort-golang-sdk/pkg/cloudapi/k8s"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/client"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/constants"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/service/cloudapi/k8s/flattens"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/service/cloudapi/k8s/models"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/service/cloudapi/k8s/schemas"
|
||
"repository.basistech.ru/BASIS/terraform-provider-dynamix/internal/service/cloudapi/k8s/utilities"
|
||
)
|
||
|
||
// Ensure the implementation satisfies the expected interfaces.
|
||
var (
|
||
_ resource.Resource = &resourceK8SCP{}
|
||
_ resource.ResourceWithImportState = &resourceK8SCP{}
|
||
)
|
||
|
||
// NewResourceK8S_CP is a helper function to simplify the provider implementation.
|
||
func NewResourceK8SCP() resource.Resource {
|
||
return &resourceK8SCP{}
|
||
}
|
||
|
||
// resourceK8S_CP is the resource implementation.
|
||
type resourceK8SCP struct {
|
||
client *client.Client
|
||
}
|
||
|
||
// Create the resource and sets the initial Terraform state.
|
||
func (r *resourceK8SCP) Create(ctx context.Context, req resource.CreateRequest, resp *resource.CreateResponse) {
|
||
var plan models.ResourceK8SCPModel
|
||
|
||
// Get plan for create cluster
|
||
resp.Diagnostics.Append(req.Plan.Get(ctx, &plan)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error receiving the plan")
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "Start create k8s_cp cluster", map[string]any{"name": plan.Name.ValueString()})
|
||
|
||
// Set timeouts
|
||
createTimeout, diags := plan.Timeouts.Create(ctx, constants.Timeout30m)
|
||
resp.Diagnostics.Append(diags...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set timeout")
|
||
return
|
||
}
|
||
|
||
ctx, cancel := context.WithTimeout(ctx, createTimeout)
|
||
defer cancel()
|
||
|
||
// Сhecking for values in the platform
|
||
resp.Diagnostics.Append(utilities.CheckParamsExistenceCP(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error check input values")
|
||
return
|
||
}
|
||
|
||
// Make request and get response
|
||
task, err := r.client.CloudAPI().K8S().Create(ctx, utilities.CreateRequestResourceK8CP(ctx, &plan))
|
||
if err != nil {
|
||
tflog.Error(ctx, "Error response for create k8s_cp cluster")
|
||
resp.Diagnostics.AddError("Unable to Create K8SCP", err.Error())
|
||
return
|
||
}
|
||
|
||
// Check cluster and validated
|
||
resp.Diagnostics.Append(utilities.CheckResourceK8SCPCreateAndDeleteWG(ctx, &plan, r.client, task)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error create k8s_cp cluster")
|
||
return
|
||
}
|
||
|
||
// Map response body to schema
|
||
resp.Diagnostics.Append(flattens.K8SCPResource(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error flatten k8s_cp cluster")
|
||
return
|
||
}
|
||
|
||
// Set state to fully populated data
|
||
resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set state")
|
||
return
|
||
}
|
||
tflog.Info(ctx, "End create k8s_cp cluster", map[string]any{"k8s_id": plan.K8SID.ValueInt64()})
|
||
}
|
||
|
||
// Read refreshes the Terraform state with the latest data.
|
||
func (r *resourceK8SCP) Read(ctx context.Context, req resource.ReadRequest, resp *resource.ReadResponse) {
|
||
var state models.ResourceK8SCPModel
|
||
|
||
// Get current state
|
||
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error get state")
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "Start read k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
|
||
// Set timeouts
|
||
readTimeout, diags := state.Timeouts.Read(ctx, constants.Timeout600s)
|
||
resp.Diagnostics.Append(diags...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set timeout")
|
||
return
|
||
}
|
||
|
||
ctx, cancel := context.WithTimeout(ctx, readTimeout)
|
||
defer cancel()
|
||
|
||
// Read status cluster and if it is necessary to restore it
|
||
resp.Diagnostics.Append(utilities.K8SCPReadStatus(ctx, &state, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error read status or restore")
|
||
return
|
||
}
|
||
|
||
// Overwrite items with refreshed state
|
||
resp.Diagnostics.Append(flattens.K8SCPResource(ctx, &state, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error flatten k8s_cp cluster")
|
||
return
|
||
}
|
||
|
||
// Set refreshed state
|
||
resp.Diagnostics.Append(resp.State.Set(ctx, &state)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set state")
|
||
return
|
||
}
|
||
tflog.Info(ctx, "End read k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
}
|
||
|
||
// Update updates the resource and sets the updated Terraform state on success.
|
||
func (r *resourceK8SCP) Update(ctx context.Context, req resource.UpdateRequest, resp *resource.UpdateResponse) {
|
||
var plan models.ResourceK8SCPModel
|
||
var state models.ResourceK8SCPModel
|
||
|
||
// Retrieve values from plan
|
||
resp.Diagnostics.Append(req.Plan.Get(ctx, &plan)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error receiving the plan")
|
||
return
|
||
}
|
||
|
||
// Retrieve values from state
|
||
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error receiving the state")
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "Start update k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
|
||
// Set timeouts
|
||
updateTimeout, diags := plan.Timeouts.Update(ctx, constants.Timeout600s)
|
||
resp.Diagnostics.Append(diags...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set timeout")
|
||
return
|
||
}
|
||
|
||
ctx, cancel := context.WithTimeout(ctx, updateTimeout)
|
||
defer cancel()
|
||
|
||
// Сhecking for values in the platform
|
||
resp.Diagnostics.Append(utilities.CheckParamsExistenceCP(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
|
||
tflog.Error(ctx, "Error check input values")
|
||
return
|
||
}
|
||
|
||
// Update Name or/and Description cluster
|
||
if !plan.Name.Equal(state.Name) || (!plan.Description.Equal(state.Description) && !plan.Description.IsNull()) {
|
||
resp.Diagnostics.Append(utilities.K8SCPUpdateNameOrDescription(ctx, &plan, &state, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error update info")
|
||
return
|
||
}
|
||
}
|
||
|
||
// Update Enable/Disable cluster
|
||
if !plan.Enabled.Equal(state.Enabled) {
|
||
resp.Diagnostics.Append(utilities.K8SCPEnableDisable(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error Enable/Disable")
|
||
return
|
||
}
|
||
}
|
||
|
||
// Update Start/Stop cluster
|
||
if !plan.Start.Equal(state.Start) {
|
||
resp.Diagnostics.Append(utilities.K8SCPStartStop(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error Start/Stop")
|
||
return
|
||
}
|
||
}
|
||
|
||
// Delete master node from cluster
|
||
if (plan.Num.ValueInt64() < state.Num.ValueInt64()) && (plan.Num.ValueInt64() != 0) {
|
||
resp.Diagnostics.Append(utilities.K8SCPDeleteMaster(ctx, &plan, &state, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error Delete master node")
|
||
return
|
||
}
|
||
}
|
||
|
||
//Update LB params
|
||
if state.WithLB.ValueBool() && !plan.LBSysctlParams.Equal(state.LBSysctlParams) && !plan.LBSysctlParams.IsNull() {
|
||
resp.Diagnostics.Append(utilities.K8CPUpdateSysctlParams(ctx, &plan, &state, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error Update LB params")
|
||
return
|
||
}
|
||
}
|
||
|
||
// Map response body to schema
|
||
resp.Diagnostics.Append(flattens.K8SCPResource(ctx, &plan, r.client)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error flatten k8s_cp cluster")
|
||
return
|
||
}
|
||
|
||
// Set data last update
|
||
plan.LastUpdated = types.StringValue(time.Now().Format(time.RFC850))
|
||
|
||
// Set state to fully populated data
|
||
resp.Diagnostics.Append(resp.State.Set(ctx, &plan)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set state")
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "End update k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
}
|
||
|
||
// Delete deletes the resource and removes the Terraform state on success.
|
||
func (r *resourceK8SCP) Delete(ctx context.Context, req resource.DeleteRequest, resp *resource.DeleteResponse) {
|
||
// Get current state
|
||
var state models.ResourceK8SCPModel
|
||
resp.Diagnostics.Append(req.State.Get(ctx, &state)...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error get state")
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "Start delete k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
|
||
// Set timeouts
|
||
deleteTimeout, diags := state.Timeouts.Delete(ctx, constants.Timeout600s)
|
||
resp.Diagnostics.Append(diags...)
|
||
if resp.Diagnostics.HasError() {
|
||
tflog.Error(ctx, "Error set timeout")
|
||
return
|
||
}
|
||
|
||
ctx, cancel := context.WithTimeout(ctx, deleteTimeout)
|
||
defer cancel()
|
||
|
||
var permanently bool
|
||
if state.Permanently.IsNull() {
|
||
permanently = true
|
||
} else {
|
||
permanently = state.Permanently.ValueBool()
|
||
}
|
||
|
||
// Delete existing k8s_cp cluster
|
||
_, err := r.client.CloudAPI().K8S().Delete(ctx, k8s.DeleteRequest{K8SID: uint64(state.K8SID.ValueInt64()), Permanently: permanently})
|
||
if err != nil {
|
||
resp.Diagnostics.AddError("Error deleting k8s_cp cluster with error: ", err.Error())
|
||
return
|
||
}
|
||
|
||
tflog.Info(ctx, "End delete k8s_cp cluster", map[string]any{"k8s_id": state.K8SID.ValueInt64()})
|
||
}
|
||
|
||
// Schema defines the schema for the resource.
|
||
func (r *resourceK8SCP) Schema(ctx context.Context, _ resource.SchemaRequest, resp *resource.SchemaResponse) {
|
||
resp.Schema = schema.Schema{
|
||
Attributes: schemas.MakeSchemaResourceK8SCP(),
|
||
Blocks: map[string]schema.Block{
|
||
"timeouts": timeouts.Block(ctx, timeouts.Opts{Create: true, Read: true, Update: true, Delete: true}),
|
||
},
|
||
Version: 1,
|
||
}
|
||
}
|
||
|
||
// Metadata returns the resource type name.
|
||
func (r *resourceK8SCP) Metadata(_ context.Context, req resource.MetadataRequest, resp *resource.MetadataResponse) {
|
||
resp.TypeName = req.ProviderTypeName + "_k8s_cp"
|
||
}
|
||
|
||
// Configure adds the provider configured client to the resource.
|
||
func (r *resourceK8SCP) Configure(ctx context.Context, req resource.ConfigureRequest, resp *resource.ConfigureResponse) {
|
||
tflog.Info(ctx, "Get configure resource")
|
||
r.client = client.Resource(ctx, &req, resp)
|
||
tflog.Info(ctx, "Getting configure resource successfully")
|
||
}
|
||
|
||
func (r *resourceK8SCP) ImportState(ctx context.Context, req resource.ImportStateRequest, resp *resource.ImportStateResponse) {
|
||
// Retrieve import ID and save to id attribute
|
||
resource.ImportStatePassthroughID(ctx, path.Root("id"), req, resp)
|
||
}
|