Skip to content

Commit

Permalink
New Resource: azurerm_data_protection_backup_instance_mysql_flexible_…
Browse files Browse the repository at this point in the history
…server
  • Loading branch information
neil-yechenwei committed Sep 23, 2024
1 parent 78a8b5d commit 200262d
Show file tree
Hide file tree
Showing 4 changed files with 641 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,316 @@
// Copyright (c) HashiCorp, Inc.
// SPDX-License-Identifier: MPL-2.0

package dataprotection

import (
"context"
"fmt"
"time"

"github.com/hashicorp/go-azure-helpers/lang/pointer"
"github.com/hashicorp/go-azure-helpers/lang/response"
"github.com/hashicorp/go-azure-helpers/resourcemanager/commonschema"
"github.com/hashicorp/go-azure-helpers/resourcemanager/location"
"github.com/hashicorp/go-azure-sdk/resource-manager/dataprotection/2024-04-01/backupinstances"
"github.com/hashicorp/go-azure-sdk/resource-manager/dataprotection/2024-04-01/backuppolicies"
"github.com/hashicorp/go-azure-sdk/resource-manager/mysql/2022-01-01/servers"
"github.com/hashicorp/terraform-provider-azurerm/internal/sdk"
"github.com/hashicorp/terraform-provider-azurerm/internal/tf/pluginsdk"
"github.com/hashicorp/terraform-provider-azurerm/internal/tf/validation"
)

type BackupInstanceMySQLFlexibleServerModel struct {
Name string `tfschema:"name"`
Location string `tfschema:"location"`
VaultId string `tfschema:"vault_id"`
BackupPolicyId string `tfschema:"backup_policy_id"`
ServerId string `tfschema:"server_id"`
}

type DataProtectionBackupInstanceMySQLFlexibleServerResource struct{}

var _ sdk.Resource = DataProtectionBackupInstanceMySQLFlexibleServerResource{}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) ResourceType() string {
return "azurerm_data_protection_backup_instance_mysql_flexible_server"
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) ModelObject() interface{} {
return &BackupInstanceMySQLFlexibleServerModel{}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) IDValidationFunc() pluginsdk.SchemaValidateFunc {
return backupinstances.ValidateBackupInstanceID
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Arguments() map[string]*pluginsdk.Schema {
return map[string]*pluginsdk.Schema{
"name": {
Type: pluginsdk.TypeString,
Required: true,
ForceNew: true,
ValidateFunc: validation.StringIsNotEmpty,
},

"location": commonschema.Location(),

"vault_id": commonschema.ResourceIDReferenceRequiredForceNew(&backuppolicies.BackupVaultId{}),

"backup_policy_id": commonschema.ResourceIDReferenceRequired(&backuppolicies.BackupPolicyId{}),

"server_id": commonschema.ResourceIDReferenceRequiredForceNew(&servers.FlexibleServerId{}),
}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Attributes() map[string]*pluginsdk.Schema {
return map[string]*pluginsdk.Schema{}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Create() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 60 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
var model BackupInstanceMySQLFlexibleServerModel
if err := metadata.Decode(&model); err != nil {
return fmt.Errorf("decoding: %+v", err)
}

client := metadata.Client.DataProtection.BackupInstanceClient

vaultId, err := backupinstances.ParseBackupVaultID(model.VaultId)
if err != nil {
return err
}

id := backupinstances.NewBackupInstanceID(vaultId.SubscriptionId, vaultId.ResourceGroupName, vaultId.BackupVaultName, model.Name)

existing, err := client.Get(ctx, id)
if err != nil {
if !response.WasNotFound(existing.HttpResponse) {
return fmt.Errorf("checking for existing %s: %+v", id, err)
}
}

if !response.WasNotFound(existing.HttpResponse) {
return metadata.ResourceRequiresImport(r.ResourceType(), id)
}

serverId, err := servers.ParseFlexibleServerID(model.ServerId)
if err != nil {
return err
}

policyId, err := backuppolicies.ParseBackupPolicyID(model.BackupPolicyId)
if err != nil {
return err
}

parameters := backupinstances.BackupInstanceResource{
Properties: &backupinstances.BackupInstance{
DataSourceInfo: backupinstances.Datasource{
DatasourceType: pointer.To("Microsoft.DBforMySQL/flexibleServers"),
ObjectType: pointer.To("Datasource"),
ResourceID: serverId.ID(),
ResourceLocation: pointer.To(location.Normalize(model.Location)),
ResourceName: pointer.To(serverId.FlexibleServerName),
ResourceType: pointer.To("Microsoft.DBforMySQL/flexibleServers"),
ResourceUri: pointer.To(serverId.ID()),
},
DataSourceSetInfo: &backupinstances.DatasourceSet{
DatasourceType: pointer.To("Microsoft.DBforMySQL/flexibleServers"),
ObjectType: pointer.To("DatasourceSet"),
ResourceID: serverId.ID(),
ResourceLocation: pointer.To(location.Normalize(model.Location)),
ResourceName: pointer.To(serverId.FlexibleServerName),
ResourceType: pointer.To("Microsoft.DBforMySQL/flexibleServers"),
ResourceUri: pointer.To(serverId.ID()),
},
FriendlyName: pointer.To(id.BackupInstanceName),
PolicyInfo: backupinstances.PolicyInfo{
PolicyId: policyId.ID(),
},
},
}

if err := client.CreateOrUpdateThenPoll(ctx, id, parameters, backupinstances.DefaultCreateOrUpdateOperationOptions()); err != nil {
return fmt.Errorf("creating %s: %+v", id, err)
}

// Service will continue to configure the protection after the resource is created and `provisioningState` returns `Succeeded`. At this time, service doesn't allow to change the resource until it is configured completely
deadline, ok := ctx.Deadline()
if !ok {
return fmt.Errorf("internal-error: context had no deadline")
}

stateConf := &pluginsdk.StateChangeConf{
Delay: 5 * time.Second,
Pending: []string{string(backupinstances.CurrentProtectionStateConfiguringProtection)},
Target: []string{string(backupinstances.CurrentProtectionStateProtectionConfigured)},
Refresh: dataProtectionBackupInstanceMySQLFlexibleServerStateRefreshFunc(ctx, client, id),
PollInterval: 1 * time.Minute,
Timeout: time.Until(deadline),
}

if _, err = stateConf.WaitForStateContext(ctx); err != nil {
return fmt.Errorf("waiting for %s to become available: %s", id, err)
}

metadata.SetID(id)
return nil
},
}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Read() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 5 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.DataProtection.BackupInstanceClient

id, err := backupinstances.ParseBackupInstanceID(metadata.ResourceData.Id())
if err != nil {
return err
}

resp, err := client.Get(ctx, *id)
if err != nil {
if response.WasNotFound(resp.HttpResponse) {
return metadata.MarkAsGone(*id)
}

return fmt.Errorf("retrieving %s: %+v", *id, err)
}

vaultId := backupinstances.NewBackupVaultID(id.SubscriptionId, id.ResourceGroupName, id.BackupVaultName)

state := BackupInstanceMySQLFlexibleServerModel{
Name: id.BackupInstanceName,
VaultId: vaultId.ID(),
}

if model := resp.Model; model != nil {
if props := model.Properties; props != nil {
state.Location = location.NormalizeNilable(props.DataSourceInfo.ResourceLocation)

serverId, err := servers.ParseFlexibleServerID(props.DataSourceInfo.ResourceID)
if err != nil {
return err
}
state.ServerId = serverId.ID()

backupPolicyId, err := backuppolicies.ParseBackupPolicyID(props.PolicyInfo.PolicyId)
if err != nil {
return err
}
state.BackupPolicyId = backupPolicyId.ID()
}
}

return metadata.Encode(&state)
},
}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Update() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 60 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.DataProtection.BackupInstanceClient

id, err := backupinstances.ParseBackupInstanceID(metadata.ResourceData.Id())
if err != nil {
return err
}

var model BackupInstanceMySQLFlexibleServerModel
if err := metadata.Decode(&model); err != nil {
return fmt.Errorf("decoding: %+v", err)
}

existing, err := client.Get(ctx, *id)
if err != nil {
if response.WasNotFound(existing.HttpResponse) {
return metadata.MarkAsGone(id)
}

return fmt.Errorf("reading %s: %+v", *id, err)
}

parameters := *existing.Model

if metadata.ResourceData.HasChange("backup_policy_id") {
policyId, err := backuppolicies.ParseBackupPolicyID(model.BackupPolicyId)
if err != nil {
return err
}
parameters.Properties.PolicyInfo.PolicyId = policyId.ID()
}

if err := client.CreateOrUpdateThenPoll(ctx, *id, parameters, backupinstances.DefaultCreateOrUpdateOperationOptions()); err != nil {
return fmt.Errorf("updating %s: %+v", id, err)
}

// Service will update the protection after the resource is updated and `provisioningState` returns `Succeeded`. At this time, service doesn't allow to change the resource until it is updated completely
deadline, ok := ctx.Deadline()
if !ok {
return fmt.Errorf("internal-error: context had no deadline")
}

stateConf := &pluginsdk.StateChangeConf{
Delay: 5 * time.Second,
Pending: []string{string(backupinstances.CurrentProtectionStateUpdatingProtection)},
Target: []string{string(backupinstances.CurrentProtectionStateProtectionConfigured)},
Refresh: dataProtectionBackupInstanceMySQLFlexibleServerStateRefreshFunc(ctx, client, *id),
PollInterval: 1 * time.Minute,
Timeout: time.Until(deadline),
}

if _, err = stateConf.WaitForStateContext(ctx); err != nil {
return fmt.Errorf("waiting for %s to become available: %s", id, err)
}

return nil
},
}
}

func (r DataProtectionBackupInstanceMySQLFlexibleServerResource) Delete() sdk.ResourceFunc {
return sdk.ResourceFunc{
Timeout: 60 * time.Minute,
Func: func(ctx context.Context, metadata sdk.ResourceMetaData) error {
client := metadata.Client.DataProtection.BackupInstanceClient

id, err := backupinstances.ParseBackupInstanceID(metadata.ResourceData.Id())
if err != nil {
return err
}

err = client.DeleteThenPoll(ctx, *id, backupinstances.DefaultDeleteOperationOptions())
if err != nil {
return fmt.Errorf("deleting %s: %+v", *id, err)
}

return nil
},
}
}

func dataProtectionBackupInstanceMySQLFlexibleServerStateRefreshFunc(ctx context.Context, client *backupinstances.BackupInstancesClient, id backupinstances.BackupInstanceId) pluginsdk.StateRefreshFunc {
return func() (interface{}, string, error) {
resp, err := client.Get(ctx, id)
if err != nil {
return nil, "", fmt.Errorf("polling for %s: %+v", id, err)
}

if resp.Model == nil {
return nil, "", fmt.Errorf("polling for %s: `model` was nil", id)
}

if resp.Model.Properties == nil {
return nil, "", fmt.Errorf("polling for %s: `properties` was nil", id)
}

return resp, string(pointer.From(resp.Model.Properties.CurrentProtectionState)), nil
}
}
Loading

0 comments on commit 200262d

Please sign in to comment.