forked from GoogleCloudPlatform/terraformer
-
Notifications
You must be signed in to change notification settings - Fork 0
/
ibm_is_ipsec_policy.go
89 lines (81 loc) · 2.36 KB
/
ibm_is_ipsec_policy.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
// Copyright 2019 The Terraformer Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package ibm
import (
"fmt"
"log"
"os"
"github.com/GoogleCloudPlatform/terraformer/terraformutils"
"github.com/IBM/go-sdk-core/v4/core"
"github.com/IBM/vpc-go-sdk/vpcv1"
)
// IpsecGenerator ...
type IpsecGenerator struct {
IBMService
}
func (g IpsecGenerator) createIpsecResources() func(ipsecID, ipsecName string) terraformutils.Resource {
names := make(map[string]struct{})
random := false
return func(ipsecID, ipsecName string) terraformutils.Resource {
names, random = getRandom(names, ipsecName, random)
resources := terraformutils.NewSimpleResource(
ipsecID,
normalizeResourceName(ipsecName, random),
"ibm_is_ipsec_policy",
"ibm",
[]string{})
return resources
}
}
// InitResources ...
func (g *IpsecGenerator) InitResources() error {
region := g.Args["region"].(string)
apiKey := os.Getenv("IC_API_KEY")
if apiKey == "" {
log.Fatal("No API key set")
}
vpcurl := fmt.Sprintf("https://%s.iaas.cloud.ibm.com/v1", region)
vpcoptions := &vpcv1.VpcV1Options{
URL: envFallBack([]string{"IBMCLOUD_IS_API_ENDPOINT"}, vpcurl),
Authenticator: &core.IamAuthenticator{
ApiKey: apiKey,
},
}
vpcclient, err := vpcv1.NewVpcV1(vpcoptions)
if err != nil {
return err
}
start := ""
var allrecs []vpcv1.IPsecPolicy
for {
options := &vpcv1.ListIpsecPoliciesOptions{}
if start != "" {
options.Start = &start
}
policies, response, err := vpcclient.ListIpsecPolicies(options)
if err != nil {
return fmt.Errorf("Error Fetching IPSEC Policies %s\n%s", err, response)
}
start = GetNext(policies.Next)
allrecs = append(allrecs, policies.IpsecPolicies...)
if start == "" {
break
}
}
fnObjt := g.createIpsecResources()
for _, policy := range allrecs {
g.Resources = append(g.Resources, fnObjt(*policy.ID, *policy.Name))
}
return nil
}