Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

provider/aws: Provide the option to skip_destroy on aws_volume_attachment #9792

Merged
merged 2 commits into from
Nov 2, 2016
Merged
Show file tree
Hide file tree
Changes from 1 commit
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
28 changes: 20 additions & 8 deletions builtin/providers/aws/resource_aws_ebs_volume.go
Original file line number Diff line number Diff line change
Expand Up @@ -203,15 +203,27 @@ func resourceAwsEbsVolumeRead(d *schema.ResourceData, meta interface{}) error {
func resourceAwsEbsVolumeDelete(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).ec2conn

request := &ec2.DeleteVolumeInput{
VolumeId: aws.String(d.Id()),
}
return resource.Retry(5*time.Minute, func() *resource.RetryError {
request := &ec2.DeleteVolumeInput{
VolumeId: aws.String(d.Id()),
}
_, err := conn.DeleteVolume(request)
if err == nil {
return nil
}

ebsErr, ok := err.(awserr.Error)
if ebsErr.Code() == "VolumeInUse" {
return resource.RetryableError(fmt.Errorf("EBS VolumeInUse - trying again while it detaches"))
}

if !ok {
return resource.NonRetryableError(err)
}

return resource.NonRetryableError(err)
})

_, err := conn.DeleteVolume(request)
if err != nil {
return fmt.Errorf("Error deleting EC2 volume %s: %s", d.Id(), err)
}
return nil
}

func readVolume(d *schema.ResourceData, volume *ec2.Volume) error {
Expand Down
19 changes: 15 additions & 4 deletions builtin/providers/aws/resource_aws_volume_attachment.go
Original file line number Diff line number Diff line change
Expand Up @@ -21,25 +21,30 @@ func resourceAwsVolumeAttachment() *schema.Resource {
Delete: resourceAwsVolumeAttachmentDelete,

Schema: map[string]*schema.Schema{
"device_name": &schema.Schema{
"device_name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},

"instance_id": &schema.Schema{
"instance_id": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},

"volume_id": &schema.Schema{
"volume_id": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},

"force_detach": &schema.Schema{
"force_detach": {
Type: schema.TypeBool,
Optional: true,
Computed: true,
},
"skip_destroy": {
Type: schema.TypeBool,
Optional: true,
Computed: true,
Expand Down Expand Up @@ -156,6 +161,12 @@ func resourceAwsVolumeAttachmentRead(d *schema.ResourceData, meta interface{}) e
func resourceAwsVolumeAttachmentDelete(d *schema.ResourceData, meta interface{}) error {
conn := meta.(*AWSClient).ec2conn

if _, ok := d.GetOk("skip_destroy"); ok {
log.Printf("[INFO] Found skip_destroy to be true, removing attachment %q from state", d.Id())
d.SetId("")
return nil
}

vID := d.Get("volume_id").(string)
iID := d.Get("instance_id").(string)

Expand Down
69 changes: 68 additions & 1 deletion builtin/providers/aws/resource_aws_volume_attachment_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -19,7 +19,7 @@ func TestAccAWSVolumeAttachment_basic(t *testing.T) {
Providers: testAccProviders,
CheckDestroy: testAccCheckVolumeAttachmentDestroy,
Steps: []resource.TestStep{
resource.TestStep{
{
Config: testAccVolumeAttachmentConfig,
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr(
Expand All @@ -36,6 +36,32 @@ func TestAccAWSVolumeAttachment_basic(t *testing.T) {
})
}

func TestAccAWSVolumeAttachment_skipDestroy(t *testing.T) {
var i ec2.Instance
var v ec2.Volume

resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckVolumeAttachmentDestroy,
Steps: []resource.TestStep{
{
Config: testAccVolumeAttachmentConfigSkipDestroy,
Check: resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr(
"aws_volume_attachment.ebs_att", "device_name", "/dev/sdh"),
testAccCheckInstanceExists(
"aws_instance.web", &i),
testAccCheckVolumeExists(
"aws_ebs_volume.example", &v),
testAccCheckVolumeAttachmentExists(
"aws_volume_attachment.ebs_att", &i, &v),
),
},
},
})
}

func testAccCheckVolumeAttachmentExists(n string, i *ec2.Instance, v *ec2.Volume) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
Expand Down Expand Up @@ -91,3 +117,44 @@ resource "aws_volume_attachment" "ebs_att" {
instance_id = "${aws_instance.web.id}"
}
`

const testAccVolumeAttachmentConfigSkipDestroy = `
resource "aws_instance" "web" {
ami = "ami-21f78e11"
availability_zone = "us-west-2a"
instance_type = "t1.micro"
tags {
Name = "HelloWorld"
}
}

resource "aws_ebs_volume" "example" {
availability_zone = "us-west-2a"
size = 1
tags {
Name = "TestVolume"
}
}

data "aws_ebs_volume" "ebs_volume" {
filter {
name = "size"
values = ["${aws_ebs_volume.example.size}"]
}
filter {
name = "availability-zone"
values = ["${aws_ebs_volume.example.availability_zone}"]
}
filter {
name = "tag:Name"
values = ["TestVolume"]
}
}

resource "aws_volume_attachment" "ebs_att" {
device_name = "/dev/sdh"
volume_id = "${data.aws_ebs_volume.ebs_volume.id}"
instance_id = "${aws_instance.web.id}"
skip_destroy = true
}
`
Original file line number Diff line number Diff line change
Expand Up @@ -49,6 +49,10 @@ example, `/dev/sdh` or `xvdh`)
volume to detach. Useful if previous attempts failed, but use this option only
as a last resort, as this can result in **data loss**. See
[Detaching an Amazon EBS Volume from an Instance][1] for more information.
* `skip_destroy` - (Optional, Boolean) Set to `true` if you don't want to
try and remove an EBS volume from a running disk. This is required in the
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

"Set this to true if you do not wish to detach the volume from the instance to which it is attached at destroy time, and instead just remove the attachment from Terraform state. This is useful when destroying an instance which has volumes created by some other means attached."

case when you want to mount and unmount specific drives and let the instance
take care of attachment / detaching.

## Attributes Reference

Expand Down