Skip to content

Commit

Permalink
Merge pull request #4028 from timja/add-cname-private-dns
Browse files Browse the repository at this point in the history
New resource: azurerm_private_dns_cname_record
  • Loading branch information
tombuildsstuff committed Aug 7, 2019
2 parents c331adb + 23d2b30 commit f9cca72
Show file tree
Hide file tree
Showing 6 changed files with 590 additions and 1 deletion.
1 change: 1 addition & 0 deletions azurerm/provider.go
Original file line number Diff line number Diff line change
Expand Up @@ -321,6 +321,7 @@ func Provider() terraform.ResourceProvider {
"azurerm_postgresql_virtual_network_rule": resourceArmPostgreSQLVirtualNetworkRule(),
"azurerm_private_dns_zone": resourceArmPrivateDnsZone(),
"azurerm_private_dns_a_record": resourceArmPrivateDnsARecord(),
"azurerm_private_dns_cname_record": resourceArmPrivateDnsCNameRecord(),
"azurerm_public_ip": resourceArmPublicIp(),
"azurerm_public_ip_prefix": resourceArmPublicIpPrefix(),
"azurerm_recovery_services_protected_vm": resourceArmRecoveryServicesProtectedVm(),
Expand Down
174 changes: 174 additions & 0 deletions azurerm/resource_arm_private_dns_cname_record.go
Original file line number Diff line number Diff line change
@@ -0,0 +1,174 @@
package azurerm

import (
"fmt"

"github.com/hashicorp/terraform/helper/validation"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/helpers/validate"

"github.com/Azure/azure-sdk-for-go/services/privatedns/mgmt/2018-09-01/privatedns"
"github.com/hashicorp/terraform/helper/schema"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/helpers/azure"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/helpers/tf"
"github.com/terraform-providers/terraform-provider-azurerm/azurerm/utils"
)

func resourceArmPrivateDnsCNameRecord() *schema.Resource {
return &schema.Resource{
Create: resourceArmPrivateDnsCNameRecordCreateUpdate,
Read: resourceArmPrivateDnsCNameRecordRead,
Update: resourceArmPrivateDnsCNameRecordCreateUpdate,
Delete: resourceArmPrivateDnsCNameRecordDelete,
Importer: &schema.ResourceImporter{
State: schema.ImportStatePassthrough,
},

Schema: map[string]*schema.Schema{
"name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
ValidateFunc: validate.NoEmptyStrings,
},

// TODO: make this case sensitive once the API's fixed https://github.com/Azure/azure-rest-api-specs/issues/6641
"resource_group_name": azure.SchemaResourceGroupNameDiffSuppress(),

"zone_name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
ValidateFunc: validate.NoEmptyStrings,
},

"record": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validate.NoEmptyStrings,
},

"ttl": {
Type: schema.TypeInt,
Required: true,
ValidateFunc: validation.IntBetween(1, 2147483647),
},

"tags": tagsSchema(),
},
}
}

func resourceArmPrivateDnsCNameRecordCreateUpdate(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient).privateDns.RecordSetsClient
ctx := meta.(*ArmClient).StopContext

name := d.Get("name").(string)
resGroup := d.Get("resource_group_name").(string)
zoneName := d.Get("zone_name").(string)

if requireResourcesToBeImported && d.IsNewResource() {
existing, err := client.Get(ctx, resGroup, zoneName, privatedns.CNAME, name)
if err != nil {
if !utils.ResponseWasNotFound(existing.Response) {
return fmt.Errorf("Error checking for presence of existing Private DNS CNAME Record %q (Zone %q / Resource Group %q): %s", name, zoneName, resGroup, err)
}
}

if existing.ID != nil && *existing.ID != "" {
return tf.ImportAsExistsError("azurerm_private_dns_cname_record", *existing.ID)
}
}

ttl := int64(d.Get("ttl").(int))
record := d.Get("record").(string)
tags := d.Get("tags").(map[string]interface{})

parameters := privatedns.RecordSet{
Name: &name,
RecordSetProperties: &privatedns.RecordSetProperties{
Metadata: expandTags(tags),
TTL: &ttl,
CnameRecord: &privatedns.CnameRecord{
Cname: &record,
},
},
}

eTag := ""
ifNoneMatch := "" // set to empty to allow updates to records after creation
if _, err := client.CreateOrUpdate(ctx, resGroup, zoneName, privatedns.CNAME, name, parameters, eTag, ifNoneMatch); err != nil {
return fmt.Errorf("Error creating/updating Private DNS CNAME Record %q (Zone %q / Resource Group %q): %s", name, zoneName, resGroup, err)
}

resp, err := client.Get(ctx, resGroup, zoneName, privatedns.CNAME, name)
if err != nil {
return fmt.Errorf("Error retrieving Private DNS CNAME Record %q (Zone %q / Resource Group %q): %s", name, zoneName, resGroup, err)
}

if resp.ID == nil {
return fmt.Errorf("Cannot read Private DNS CNAME Record %s (resource group %s) ID", name, resGroup)
}

d.SetId(*resp.ID)

return resourceArmPrivateDnsCNameRecordRead(d, meta)
}

func resourceArmPrivateDnsCNameRecordRead(d *schema.ResourceData, meta interface{}) error {
dnsClient := meta.(*ArmClient).privateDns.RecordSetsClient
ctx := meta.(*ArmClient).StopContext

id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}

resGroup := id.ResourceGroup
name := id.Path["CNAME"]
zoneName := id.Path["privateDnsZones"]

resp, err := dnsClient.Get(ctx, resGroup, zoneName, privatedns.CNAME, name)
if err != nil {
if utils.ResponseWasNotFound(resp.Response) {
d.SetId("")
return nil
}
return fmt.Errorf("Error reading Private DNS CNAME record %s: %+v", name, err)
}

d.Set("name", name)
d.Set("resource_group_name", resGroup)
d.Set("zone_name", zoneName)
d.Set("ttl", resp.TTL)

if props := resp.RecordSetProperties; props != nil {
if record := props.CnameRecord; record != nil {
d.Set("record", record.Cname)
}
}

flattenAndSetTags(d, resp.Metadata)

return nil
}

func resourceArmPrivateDnsCNameRecordDelete(d *schema.ResourceData, meta interface{}) error {
dnsClient := meta.(*ArmClient).privateDns.RecordSetsClient
ctx := meta.(*ArmClient).StopContext

id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}

resGroup := id.ResourceGroup
name := id.Path["CNAME"]
zoneName := id.Path["privateDnsZones"]

_, err = dnsClient.Get(ctx, resGroup, zoneName, privatedns.CNAME, name)
if err != nil {
return fmt.Errorf("Error deleting Private DNS CNAME Record %s: %+v", name, err)
}

return nil
}
Loading

0 comments on commit f9cca72

Please sign in to comment.