diff --git a/aws/provider.go b/aws/provider.go index a26572f72c99..62c30b030855 100644 --- a/aws/provider.go +++ b/aws/provider.go @@ -404,6 +404,7 @@ func Provider() terraform.ResourceProvider { "aws_dlm_lifecycle_policy": resourceAwsDlmLifecyclePolicy(), "aws_dms_certificate": resourceAwsDmsCertificate(), "aws_dms_endpoint": resourceAwsDmsEndpoint(), + "aws_dms_event_subscription": resourceAwsDmsEventSubscription(), "aws_dms_replication_instance": resourceAwsDmsReplicationInstance(), "aws_dms_replication_subnet_group": resourceAwsDmsReplicationSubnetGroup(), "aws_dms_replication_task": resourceAwsDmsReplicationTask(), diff --git a/aws/resource_aws_dms_event_subscription.go b/aws/resource_aws_dms_event_subscription.go new file mode 100644 index 000000000000..822f2167bc96 --- /dev/null +++ b/aws/resource_aws_dms_event_subscription.go @@ -0,0 +1,251 @@ +package aws + +import ( + "fmt" + "log" + "time" + + "github.com/aws/aws-sdk-go/aws" + dms "github.com/aws/aws-sdk-go/service/databasemigrationservice" + "github.com/hashicorp/terraform/helper/resource" + "github.com/hashicorp/terraform/helper/schema" +) + +func resourceAwsDmsEventSubscription() *schema.Resource { + return &schema.Resource{ + Create: resourceAwsDmsEventSubscriptionCreate, + Read: resourceAwsDmsEventSubscriptionRead, + Update: resourceAwsDmsEventSubscriptionUpdate, + Delete: resourceAwsDmsEventSubscriptionDelete, + Timeouts: &schema.ResourceTimeout{ + Create: schema.DefaultTimeout(10 * time.Minute), + Delete: schema.DefaultTimeout(10 * time.Minute), + Update: schema.DefaultTimeout(10 * time.Minute), + }, + + Importer: &schema.ResourceImporter{ + State: schema.ImportStatePassthrough, + }, + + Schema: map[string]*schema.Schema{ + "enabled": { + Type: schema.TypeBool, + Optional: true, + Default: true, + }, + "event_categories": { + Type: schema.TypeSet, + Elem: &schema.Schema{Type: schema.TypeString}, + Set: schema.HashString, + Required: true, + }, + "name": { + Type: schema.TypeString, + Required: true, + ForceNew: true, + }, + "sns_topic_arn": { + Type: schema.TypeString, + Required: true, + }, + "source_ids": { + Type: schema.TypeSet, + Elem: &schema.Schema{Type: schema.TypeString}, + Set: schema.HashString, + ForceNew: true, + Optional: true, + }, + "source_type": { + Type: schema.TypeString, + Optional: true, + // The API suppors modification but doing so loses all source_ids + ForceNew: true, + }, + "tags": { + Type: schema.TypeMap, + Optional: true, + }, + }, + } +} + +func resourceAwsDmsEventSubscriptionCreate(d *schema.ResourceData, meta interface{}) error { + conn := meta.(*AWSClient).dmsconn + + request := &dms.CreateEventSubscriptionInput{ + Enabled: aws.Bool(d.Get("enabled").(bool)), + SnsTopicArn: aws.String(d.Get("sns_topic_arn").(string)), + SubscriptionName: aws.String(d.Get("name").(string)), + SourceType: aws.String(d.Get("source_type").(string)), + Tags: dmsTagsFromMap(d.Get("tags").(map[string]interface{})), + } + + if v, ok := d.GetOk("event_categories"); ok { + request.EventCategories = expandStringList(v.(*schema.Set).List()) + } + + if v, ok := d.GetOk("source_ids"); ok { + request.SourceIds = expandStringList(v.(*schema.Set).List()) + } + + _, err := conn.CreateEventSubscription(request) + + if err != nil { + return fmt.Errorf("Error creating DMS event subscription: %s", err) + } + + d.SetId(d.Get("name").(string)) + + log.Println("[DEBUG] DMS create event subscription", request) + + stateConf := &resource.StateChangeConf{ + Pending: []string{"creating", "modifying"}, + Target: []string{"active"}, + Refresh: resourceAwsDmsEventSubscriptionStateRefreshFunc(conn, d.Id()), + Timeout: d.Timeout(schema.TimeoutCreate), + MinTimeout: 10 * time.Second, + Delay: 10 * time.Second, + } + + // Wait, catching any errors + _, err = stateConf.WaitForState() + if err != nil { + return fmt.Errorf("error waiting for DMS event subscription (%s) creation: %s", d.Id(), err) + } + + return resourceAwsDmsEventSubscriptionUpdate(d, meta) +} + +func resourceAwsDmsEventSubscriptionUpdate(d *schema.ResourceData, meta interface{}) error { + conn := meta.(*AWSClient).dmsconn + + request := &dms.ModifyEventSubscriptionInput{ + Enabled: aws.Bool(d.Get("enabled").(bool)), + SnsTopicArn: aws.String(d.Get("sns_topic_arn").(string)), + SubscriptionName: aws.String(d.Get("name").(string)), + SourceType: aws.String(d.Get("source_type").(string)), + } + + if v, ok := d.GetOk("event_categories"); ok { + request.EventCategories = expandStringList(v.(*schema.Set).List()) + } + + log.Println("[DEBUG] DMS update event subscription:", request) + + _, err := conn.ModifyEventSubscription(request) + + if err != nil { + return fmt.Errorf("Error updating DMS event subscription: %s", err) + } + + stateConf := &resource.StateChangeConf{ + Pending: []string{"modifying"}, + Target: []string{"active"}, + Refresh: resourceAwsDmsEventSubscriptionStateRefreshFunc(conn, d.Id()), + Timeout: d.Timeout(schema.TimeoutCreate), + MinTimeout: 10 * time.Second, + Delay: 10 * time.Second, // Wait 30 secs before starting + } + + // Wait, catching any errors + _, err = stateConf.WaitForState() + if err != nil { + return fmt.Errorf("error waiting for DMS event subscription (%s) modification: %s", d.Id(), err) + } + + return resourceAwsDmsEventSubscriptionRead(d, meta) +} + +func resourceAwsDmsEventSubscriptionRead(d *schema.ResourceData, meta interface{}) error { + conn := meta.(*AWSClient).dmsconn + + request := &dms.DescribeEventSubscriptionsInput{ + SubscriptionName: aws.String(d.Id()), + } + + log.Println("[DEBUG] DMS read event subscription:", request) + + response, err := conn.DescribeEventSubscriptions(request) + + if isAWSErr(err, dms.ErrCodeResourceNotFoundFault, "") { + log.Printf("[WARN] DMS event subscription (%s) not found, removing from state", d.Id()) + d.SetId("") + return nil + } + + if err != nil { + return fmt.Errorf("Error reading DMS event subscription: %s", err) + } + + if response == nil || response.EventSubscriptionsList == nil || len(response.EventSubscriptionsList) == 0 { + log.Printf("[WARN] DMS event subscription (%s) not found, removing from state", d.Id()) + d.SetId("") + return nil + } + + subscription := response.EventSubscriptionsList[0] + + d.Set("enabled", subscription.Enabled) + d.Set("sns_topic_arn", subscription.SnsTopicArn) + d.Set("source_type", subscription.SourceType) + d.Set("name", d.Id()) + d.Set("event_categories", flattenStringList(subscription.EventCategoriesList)) + d.Set("source_ids", flattenStringList(subscription.SourceIdsList)) + + return nil +} + +func resourceAwsDmsEventSubscriptionDelete(d *schema.ResourceData, meta interface{}) error { + conn := meta.(*AWSClient).dmsconn + + request := &dms.DeleteEventSubscriptionInput{ + SubscriptionName: aws.String(d.Get("name").(string)), + } + + log.Println("[DEBUG] DMS event subscription delete:", request) + + _, err := conn.DeleteEventSubscription(request) + + if err != nil { + return fmt.Errorf("Error deleting DMS event subscription: %s", err) + } + + stateConf := &resource.StateChangeConf{ + Pending: []string{"deleting"}, + Target: []string{}, + Refresh: resourceAwsDmsEventSubscriptionStateRefreshFunc(conn, d.Id()), + Timeout: d.Timeout(schema.TimeoutCreate), + MinTimeout: 10 * time.Second, + Delay: 10 * time.Second, + } + + // Wait, catching any errors + _, err = stateConf.WaitForState() + if err != nil { + return fmt.Errorf("error waiting for DMS event subscription (%s) deletion: %s", d.Id(), err) + } + + return nil +} + +func resourceAwsDmsEventSubscriptionStateRefreshFunc(conn *dms.DatabaseMigrationService, name string) resource.StateRefreshFunc { + return func() (interface{}, string, error) { + v, err := conn.DescribeEventSubscriptions(&dms.DescribeEventSubscriptionsInput{ + SubscriptionName: aws.String(name), + }) + + if isAWSErr(err, dms.ErrCodeResourceNotFoundFault, "") { + return nil, "", nil + } + + if err != nil { + return nil, "", err + } + + if v == nil || len(v.EventSubscriptionsList) == 0 || v.EventSubscriptionsList[0] == nil { + return nil, "", nil + } + + return v, aws.StringValue(v.EventSubscriptionsList[0].Status), nil + } +} diff --git a/aws/resource_aws_dms_event_subscription_test.go b/aws/resource_aws_dms_event_subscription_test.go new file mode 100644 index 000000000000..1238abc13897 --- /dev/null +++ b/aws/resource_aws_dms_event_subscription_test.go @@ -0,0 +1,247 @@ +package aws + +import ( + "fmt" + "testing" + + "github.com/aws/aws-sdk-go/aws" + dms "github.com/aws/aws-sdk-go/service/databasemigrationservice" + "github.com/hashicorp/terraform/helper/acctest" + "github.com/hashicorp/terraform/helper/resource" + "github.com/hashicorp/terraform/terraform" +) + +func TestAccAWSDmsEventSubscriptionBasic(t *testing.T) { + resourceName := "aws_dms_event_subscription.dms_event_subscription" + randId := acctest.RandString(8) + + resource.ParallelTest(t, resource.TestCase{ + PreCheck: func() { testAccPreCheck(t) }, + Providers: testAccProviders, + CheckDestroy: dmsEventSubscriptionDestroy, + Steps: []resource.TestStep{ + { + Config: dmsEventSubscriptionConfig(randId), + Check: resource.ComposeTestCheckFunc( + checkDmsEventSubscriptionExists(resourceName), + resource.TestCheckResourceAttr(resourceName, "name", fmt.Sprintf("tf-test-dmses-%s", randId)), + resource.TestCheckResourceAttr(resourceName, "enabled", "true"), + resource.TestCheckResourceAttr(resourceName, "source_type", "replication-task"), + resource.TestCheckResourceAttr(resourceName, "event_categories.#", "2"), + resource.TestCheckResourceAttr(resourceName, "event_categories.1475249524", "creation"), + resource.TestCheckResourceAttr(resourceName, "event_categories.563807169", "failure"), + + resource.TestCheckResourceAttr(resourceName, "source_ids.#", "1"), + resource.TestCheckResourceAttrSet(resourceName, "sns_topic_arn"), + ), + }, + { + ResourceName: resourceName, + ImportState: true, + ImportStateVerify: true, + }, + { + Config: dmsEventSubscriptionUpdate(randId), + Check: resource.ComposeTestCheckFunc( + checkDmsEventSubscriptionExists(resourceName), + resource.TestCheckResourceAttr(resourceName, "name", fmt.Sprintf("tf-test-dmses-%s", randId)), + resource.TestCheckResourceAttr(resourceName, "enabled", "false"), + resource.TestCheckResourceAttr(resourceName, "source_type", "replication-task"), + resource.TestCheckResourceAttr(resourceName, "event_categories.#", "2"), + resource.TestCheckResourceAttr(resourceName, "event_categories.2890955135", "configuration change"), + resource.TestCheckResourceAttr(resourceName, "event_categories.769513765", "deletion"), + + resource.TestCheckResourceAttr(resourceName, "source_ids.#", "1"), + resource.TestCheckResourceAttrSet(resourceName, "sns_topic_arn"), + ), + }, + }, + }, + ) +} + +func dmsEventSubscriptionDestroy(s *terraform.State) error { + for _, rs := range s.RootModule().Resources { + if rs.Type != "aws_dms_event_subscription" { + continue + } + + conn := testAccProvider.Meta().(*AWSClient).dmsconn + + resp, err := conn.DescribeEventSubscriptions(&dms.DescribeEventSubscriptionsInput{ + SubscriptionName: aws.String(rs.Primary.ID), + }) + + if isAWSErr(err, dms.ErrCodeResourceNotFoundFault, "") { + continue + } + + if err != nil { + return err + } + + if resp != nil && len(resp.EventSubscriptionsList) > 0 { + return fmt.Errorf("DMS event subscription still exists: %s", rs.Primary.ID) + } + } + + return nil +} + +func dmsEventSubscriptionBaseConfig(randId string) string { + + return fmt.Sprintf(` + resource "aws_vpc" "dms_vpc" { + cidr_block = "10.1.0.0/16" + + tags = { + Name = "terraform-testacc-dmses-%[1]s" + } + } + + resource "aws_subnet" "dms_subnet_1" { + cidr_block = "10.1.1.0/24" + availability_zone = "us-west-2a" + vpc_id = "${aws_vpc.dms_vpc.id}" + + tags = { + Name = "tf-acc-dmses-1-%[1]s" + } + + depends_on = ["aws_vpc.dms_vpc"] + } + + resource "aws_subnet" "dms_subnet_2" { + cidr_block = "10.1.2.0/24" + availability_zone = "us-west-2b" + vpc_id = "${aws_vpc.dms_vpc.id}" + + tags = { + Name = "tf-acc-dmses-2-%[1]s" + } + + depends_on = ["aws_vpc.dms_vpc"] + } + + resource "aws_dms_endpoint" "dms_endpoint_source" { + database_name = "tf-test-dms-db" + endpoint_id = "tf-test-dmses-source-%[1]s" + endpoint_type = "source" + engine_name = "aurora" + server_name = "tf-test-cluster.cluster-xxxxxxx.us-west-2.rds.amazonaws.com" + port = 3306 + username = "tftest" + password = "tftest" + } + + resource "aws_dms_endpoint" "dms_endpoint_target" { + database_name = "tf-test-dms-db" + endpoint_id = "tf-test-dmses-target-%[1]s" + endpoint_type = "target" + engine_name = "aurora" + server_name = "tf-test-cluster.cluster-xxxxxxx.us-west-2.rds.amazonaws.com" + port = 3306 + username = "tftest" + password = "tftest" + } + + resource "aws_dms_replication_subnet_group" "dms_replication_subnet_group" { + replication_subnet_group_id = "tf-test-dmses-%[1]s" + replication_subnet_group_description = "terraform test for replication subnet group" + subnet_ids = ["${aws_subnet.dms_subnet_1.id}", "${aws_subnet.dms_subnet_2.id}"] + } + + resource "aws_dms_replication_instance" "dms_replication_instance" { + allocated_storage = 5 + auto_minor_version_upgrade = true + replication_instance_class = "dms.t2.micro" + replication_instance_id = "tf-test-dmses-%[1]s" + preferred_maintenance_window = "sun:00:30-sun:02:30" + publicly_accessible = false + replication_subnet_group_id = "${aws_dms_replication_subnet_group.dms_replication_subnet_group.replication_subnet_group_id}" + } + + resource "aws_dms_replication_task" "dms_replication_task" { + migration_type = "full-load" + replication_instance_arn = "${aws_dms_replication_instance.dms_replication_instance.replication_instance_arn}" + replication_task_id = "tf-test-dmses-%[1]s" + replication_task_settings = "{\"TargetMetadata\":{\"TargetSchema\":\"\",\"SupportLobs\":true,\"FullLobMode\":false,\"LobChunkSize\":0,\"LimitedSizeLobMode\":true,\"LobMaxSize\":32,\"InlineLobMaxSize\":0,\"LoadMaxFileSize\":0,\"ParallelLoadThreads\":0,\"ParallelLoadBufferSize\":0,\"BatchApplyEnabled\":false,\"TaskRecoveryTableEnabled\":false},\"FullLoadSettings\":{\"TargetTablePrepMode\":\"DROP_AND_CREATE\",\"CreatePkAfterFullLoad\":false,\"StopTaskCachedChangesApplied\":false,\"StopTaskCachedChangesNotApplied\":false,\"MaxFullLoadSubTasks\":8,\"TransactionConsistencyTimeout\":600,\"CommitRate\":10000},\"Logging\":{\"EnableLogging\":false,\"LogComponents\":[{\"Id\":\"SOURCE_UNLOAD\",\"Severity\":\"LOGGER_SEVERITY_DEFAULT\"},{\"Id\":\"TARGET_LOAD\",\"Severity\":\"LOGGER_SEVERITY_DEFAULT\"},{\"Id\":\"SOURCE_CAPTURE\",\"Severity\":\"LOGGER_SEVERITY_DEFAULT\"},{\"Id\":\"TARGET_APPLY\",\"Severity\":\"LOGGER_SEVERITY_DEFAULT\"},{\"Id\":\"TASK_MANAGER\",\"Severity\":\"LOGGER_SEVERITY_DEFAULT\"}],\"CloudWatchLogGroup\":null,\"CloudWatchLogStream\":null},\"ControlTablesSettings\":{\"historyTimeslotInMinutes\":5,\"ControlSchema\":\"\",\"HistoryTimeslotInMinutes\":5,\"HistoryTableEnabled\":false,\"SuspendedTablesTableEnabled\":false,\"StatusTableEnabled\":false},\"StreamBufferSettings\":{\"StreamBufferCount\":3,\"StreamBufferSizeInMB\":8,\"CtrlStreamBufferSizeInMB\":5},\"ChangeProcessingDdlHandlingPolicy\":{\"HandleSourceTableDropped\":true,\"HandleSourceTableTruncated\":true,\"HandleSourceTableAltered\":true},\"ErrorBehavior\":{\"DataErrorPolicy\":\"LOG_ERROR\",\"DataTruncationErrorPolicy\":\"LOG_ERROR\",\"DataErrorEscalationPolicy\":\"SUSPEND_TABLE\",\"DataErrorEscalationCount\":0,\"TableErrorPolicy\":\"SUSPEND_TABLE\",\"TableErrorEscalationPolicy\":\"STOP_TASK\",\"TableErrorEscalationCount\":0,\"RecoverableErrorCount\":-1,\"RecoverableErrorInterval\":5,\"RecoverableErrorThrottling\":true,\"RecoverableErrorThrottlingMax\":1800,\"ApplyErrorDeletePolicy\":\"IGNORE_RECORD\",\"ApplyErrorInsertPolicy\":\"LOG_ERROR\",\"ApplyErrorUpdatePolicy\":\"LOG_ERROR\",\"ApplyErrorEscalationPolicy\":\"LOG_ERROR\",\"ApplyErrorEscalationCount\":0,\"ApplyErrorFailOnTruncationDdl\":false,\"FullLoadIgnoreConflicts\":true,\"FailOnTransactionConsistencyBreached\":false,\"FailOnNoTablesCaptured\":false},\"ChangeProcessingTuning\":{\"BatchApplyPreserveTransaction\":true,\"BatchApplyTimeoutMin\":1,\"BatchApplyTimeoutMax\":30,\"BatchApplyMemoryLimit\":500,\"BatchSplitSize\":0,\"MinTransactionSize\":1000,\"CommitTimeout\":1,\"MemoryLimitTotal\":1024,\"MemoryKeepTime\":60,\"StatementCacheSize\":50}}" + source_endpoint_arn = "${aws_dms_endpoint.dms_endpoint_source.endpoint_arn}" + table_mappings = "{\"rules\":[{\"rule-type\":\"selection\",\"rule-id\":\"1\",\"rule-name\":\"1\",\"object-locator\":{\"schema-name\":\"%%\",\"table-name\":\"%%\"},\"rule-action\":\"include\"}]}" + + tags = { + Name = "tf-test-dmses-%[1]s" + Update = "to-update" + Remove = "to-remove" + } + + target_endpoint_arn = "${aws_dms_endpoint.dms_endpoint_target.endpoint_arn}" + } + + resource "aws_sns_topic" "topic" { + name = "tf-test-dmses-%[1]s" + } + `, randId) +} + +func dmsEventSubscriptionConfig(randId string) string { + return fmt.Sprintf(` + +resource "aws_dms_event_subscription" "dms_event_subscription" { + name = "tf-test-dmses-%[1]s" + enabled = true + event_categories = ["creation", "failure"] + source_type = "replication-task" + source_ids = ["${aws_dms_replication_task.dms_replication_task.replication_task_id}"] + sns_topic_arn = "${aws_sns_topic.topic.arn}" +} + +%[2]s +`, randId, dmsEventSubscriptionBaseConfig(randId)) + +} + +func dmsEventSubscriptionUpdate(randId string) string { + return fmt.Sprintf(` + +resource "aws_dms_event_subscription" "dms_event_subscription" { + name = "tf-test-dmses-%[1]s" + enabled = false + event_categories = ["deletion", "configuration change"] + source_type = "replication-task" + source_ids = ["${aws_dms_replication_task.dms_replication_task.replication_task_id}"] + sns_topic_arn = "${aws_sns_topic.topic.arn}" +} + +%[2]s +`, randId, dmsEventSubscriptionBaseConfig(randId)) + +} + +func checkDmsEventSubscriptionExists(n string) resource.TestCheckFunc { + return func(s *terraform.State) error { + rs, ok := s.RootModule().Resources[n] + if !ok { + return fmt.Errorf("Not found: %s", n) + } + + if rs.Primary.ID == "" { + return fmt.Errorf("No ID is set") + } + + conn := testAccProvider.Meta().(*AWSClient).dmsconn + resp, err := conn.DescribeEventSubscriptions(&dms.DescribeEventSubscriptionsInput{ + SubscriptionName: aws.String(rs.Primary.ID), + }) + + if err != nil { + return fmt.Errorf("DMS event subscription error: %v", err) + } + + if resp.EventSubscriptionsList == nil || len(resp.EventSubscriptionsList) == 0 { + return fmt.Errorf("DMS event subscription not found") + } + + return nil + } +} diff --git a/website/docs/r/dms_event_subscription.html.markdown b/website/docs/r/dms_event_subscription.html.markdown new file mode 100644 index 000000000000..8cbc69411494 --- /dev/null +++ b/website/docs/r/dms_event_subscription.html.markdown @@ -0,0 +1,59 @@ +--- +layout: "aws" +page_title: "AWS: aws_dms_event_subscription" +sidebar_current: "docs-aws-resource-dms-event-subscription" +description: |- + Provides a DMS (Data Migration Service) event subscription resource. +--- + +# aws_dms_event_subscription + +Provides a DMS (Data Migration Service) event subscription resource. DMS event subscriptions can be created, updated, deleted, and imported. + +## Example Usage + +```hcl +# Create a new DMS event subscription +resource "aws_dms_event_subscription" "test" { + name = "my-favorite-event-subscription" + enabled = true + event_categories = ["creation", "failure"] + source_type = "replication-task" + source_ids = ["${aws_dms_replication_task.dms_replication_task.replication_task_id}"] + sns_topic_arn = "${aws_sns_topic.topic.arn}" +} + + tags = { + Name = "test" + } +} +``` + +## Argument Reference + +The following arguments are supported: + +* `name` - (Required) Name of event subscription. +* `enabled` - (Optional, Default: true) Whether the event subscription should be enabled. +* `event_categories` - (Optional) List of event categories to listen for, see `DescribeEventCategories` for a canonical list. +* `source_type` - (Optional, Default: all events) If specificed may be either `replication-instance` or `migration-task` +* `source_ids` - (Required) Ids of sources to listen to. +* `sns_topic_arn` - (Required) SNS topic arn to send events on. + + +## Timeouts + +`aws_dms_event_subscription` provides the following +[Timeouts](/docs/configuration/resources.html#timeouts) configuration options: + +- `create` - (Default `30 minutes`) Used for creating event subscriptions. +- `update` - (Default `30 minutes`) Used for event subscription modifications. +- `delete` - (Default `30 minutes`) Used for destroying event descriptions. + +## Import + +Event subscriptions can be imported using the `name`, e.g. + +``` +$ terraform import aws_dms_event_subscription.test my-awesome-event-subscription +```