func resourceArmStorageAccountCreate(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient) storageClient := client.storageServiceClient resourceGroupName := d.Get("resource_group_name").(string) storageAccountName := d.Get("name").(string) accountKind := d.Get("account_kind").(string) accountType := d.Get("account_type").(string) location := d.Get("location").(string) tags := d.Get("tags").(map[string]interface{}) enableBlobEncryption := d.Get("enable_blob_encryption").(bool) sku := storage.Sku{ Name: storage.SkuName(accountType), } opts := storage.AccountCreateParameters{ Location: &location, Sku: &sku, Tags: expandTags(tags), Kind: storage.Kind(accountKind), Properties: &storage.AccountPropertiesCreateParameters{ Encryption: &storage.Encryption{ Services: &storage.EncryptionServices{ Blob: &storage.EncryptionService{ Enabled: &enableBlobEncryption, }, }, KeySource: &storageAccountEncryptionSource, }, }, } // AccessTier is only valid for BlobStorage accounts if accountKind == string(storage.BlobStorage) { accessTier, ok := d.GetOk("access_tier") if !ok { // default to "Hot" accessTier = blobStorageAccountDefaultAccessTier } opts.Properties.AccessTier = storage.AccessTier(accessTier.(string)) } // Create cancelCtx, cancelFunc := context.WithTimeout(client.StopContext, 1*time.Hour) _, createErr := storageClient.Create( resourceGroupName, storageAccountName, opts, cancelCtx.Done()) cancelFunc() // The only way to get the ID back apparently is to read the resource again read, err := storageClient.GetProperties(resourceGroupName, storageAccountName) // Set the ID right away if we have one if err == nil && read.ID != nil { log.Printf("[INFO] storage account %q ID: %q", storageAccountName, *read.ID) d.SetId(*read.ID) } // If we had a create error earlier then we return with that error now. // We do this later here so that we can grab the ID above is possible. if createErr != nil { return fmt.Errorf( "Error creating Azure Storage Account '%s': %s", storageAccountName, createErr) } // Check the read error now that we know it would exist without a create err if err != nil { return err } // If we got no ID then the resource group doesn't yet exist if read.ID == nil { return fmt.Errorf("Cannot read Storage Account %s (resource group %s) ID", storageAccountName, resourceGroupName) } log.Printf("[DEBUG] Waiting for Storage Account (%s) to become available", storageAccountName) stateConf := &resource.StateChangeConf{ Pending: []string{"Updating", "Creating"}, Target: []string{"Succeeded"}, Refresh: storageAccountStateRefreshFunc(client, resourceGroupName, storageAccountName), Timeout: 30 * time.Minute, MinTimeout: 15 * time.Second, } if _, err := stateConf.WaitForState(); err != nil { return fmt.Errorf("Error waiting for Storage Account (%s) to become available: %s", storageAccountName, err) } return resourceArmStorageAccountRead(d, meta) }
func resourceArmStorageAccountCreate(d *schema.ResourceData, meta interface{}) error { client := meta.(*ArmClient) storageClient := client.storageServiceClient resourceGroupName := d.Get("resource_group_name").(string) storageAccountName := d.Get("name").(string) accountKind := d.Get("account_kind").(string) accountType := d.Get("account_type").(string) location := d.Get("location").(string) tags := d.Get("tags").(map[string]interface{}) enableBlobEncryption := d.Get("enable_blob_encryption").(bool) sku := storage.Sku{ Name: storage.SkuName(accountType), } opts := storage.AccountCreateParameters{ Location: &location, Sku: &sku, Tags: expandTags(tags), Kind: storage.Kind(accountKind), Properties: &storage.AccountPropertiesCreateParameters{ Encryption: &storage.Encryption{ Services: &storage.EncryptionServices{ Blob: &storage.EncryptionService{ Enabled: &enableBlobEncryption, }, }, KeySource: &storageAccountEncryptionSource, }, }, } // AccessTier is only valid for BlobStorage accounts if accountKind == string(storage.BlobStorage) { accessTier, ok := d.GetOk("access_tier") if !ok { // default to "Hot" accessTier = blobStorageAccountDefaultAccessTier } opts.Properties.AccessTier = storage.AccessTier(accessTier.(string)) } // Create the storage account. We wrap this so that it is cancellable // with a Ctrl-C since this can take a LONG time. wrap := signalwrapper.Run(func(cancelCh <-chan struct{}) error { _, err := storageClient.Create(resourceGroupName, storageAccountName, opts, cancelCh) return err }) // Check the result of the wrapped function. var createErr error select { case <-time.After(1 * time.Hour): // An hour is way above the expected P99 for this API call so // we premature cancel and error here. createErr = wrap.Cancel() case createErr = <-wrap.ErrCh: // Successfully ran (but perhaps not successfully completed) // the function. } // The only way to get the ID back apparently is to read the resource again read, err := storageClient.GetProperties(resourceGroupName, storageAccountName) // Set the ID right away if we have one if err == nil && read.ID != nil { log.Printf("[INFO] storage account %q ID: %q", storageAccountName, *read.ID) d.SetId(*read.ID) } // If we had a create error earlier then we return with that error now. // We do this later here so that we can grab the ID above is possible. if createErr != nil { return fmt.Errorf( "Error creating Azure Storage Account '%s': %s", storageAccountName, createErr) } // Check the read error now that we know it would exist without a create err if err != nil { return err } // If we got no ID then the resource group doesn't yet exist if read.ID == nil { return fmt.Errorf("Cannot read Storage Account %s (resource group %s) ID", storageAccountName, resourceGroupName) } log.Printf("[DEBUG] Waiting for Storage Account (%s) to become available", storageAccountName) stateConf := &resource.StateChangeConf{ Pending: []string{"Updating", "Creating"}, Target: []string{"Succeeded"}, Refresh: storageAccountStateRefreshFunc(client, resourceGroupName, storageAccountName), Timeout: 30 * time.Minute, MinTimeout: 15 * time.Second, } if _, err := stateConf.WaitForState(); err != nil { return fmt.Errorf("Error waiting for Storage Account (%s) to become available: %s", storageAccountName, err) } return resourceArmStorageAccountRead(d, meta) }