github.com/danp/terraform@v0.9.5-0.20170426144147-39d740081351/builtin/providers/azurerm/resource_arm_container_service_test.go (about)

     1  package azurerm
     2  
     3  import (
     4  	"fmt"
     5  	"net/http"
     6  	"testing"
     7  
     8  	"github.com/hashicorp/terraform/helper/acctest"
     9  	"github.com/hashicorp/terraform/helper/resource"
    10  	"github.com/hashicorp/terraform/terraform"
    11  )
    12  
    13  func TestAccAzureRMContainerService_orchestrationPlatformValidation(t *testing.T) {
    14  	cases := []struct {
    15  		Value    string
    16  		ErrCount int
    17  	}{
    18  		{Value: "DCOS", ErrCount: 0},
    19  		{Value: "Kubernetes", ErrCount: 0},
    20  		{Value: "Swarm", ErrCount: 0},
    21  		{Value: "Mesos", ErrCount: 1},
    22  	}
    23  
    24  	for _, tc := range cases {
    25  		_, errors := validateArmContainerServiceOrchestrationPlatform(tc.Value, "azurerm_container_service")
    26  
    27  		if len(errors) != tc.ErrCount {
    28  			t.Fatalf("Expected the Azure RM Container Service Orchestration Platform to trigger a validation error")
    29  		}
    30  	}
    31  }
    32  
    33  func TestAccAzureRMContainerService_masterProfileCountValidation(t *testing.T) {
    34  	cases := []struct {
    35  		Value    int
    36  		ErrCount int
    37  	}{
    38  		{Value: 0, ErrCount: 1},
    39  		{Value: 1, ErrCount: 0},
    40  		{Value: 2, ErrCount: 1},
    41  		{Value: 3, ErrCount: 0},
    42  		{Value: 4, ErrCount: 1},
    43  		{Value: 5, ErrCount: 0},
    44  		{Value: 6, ErrCount: 1},
    45  	}
    46  
    47  	for _, tc := range cases {
    48  		_, errors := validateArmContainerServiceMasterProfileCount(tc.Value, "azurerm_container_service")
    49  
    50  		if len(errors) != tc.ErrCount {
    51  			t.Fatalf("Expected the Azure RM Container Service Master Profile Count to trigger a validation error")
    52  		}
    53  	}
    54  }
    55  
    56  func TestAccAzureRMContainerService_agentProfilePoolCountValidation(t *testing.T) {
    57  	cases := []struct {
    58  		Value    int
    59  		ErrCount int
    60  	}{
    61  		{Value: 0, ErrCount: 1},
    62  		{Value: 1, ErrCount: 0},
    63  		{Value: 2, ErrCount: 0},
    64  		{Value: 99, ErrCount: 0},
    65  		{Value: 100, ErrCount: 0},
    66  		{Value: 101, ErrCount: 1},
    67  	}
    68  
    69  	for _, tc := range cases {
    70  		_, errors := validateArmContainerServiceAgentPoolProfileCount(tc.Value, "azurerm_container_service")
    71  
    72  		if len(errors) != tc.ErrCount {
    73  			t.Fatalf("Expected the Azure RM Container Service Agent Pool Profile Count to trigger a validation error")
    74  		}
    75  	}
    76  }
    77  
    78  func TestAccAzureRMContainerService_dcosBasic(t *testing.T) {
    79  	ri := acctest.RandInt()
    80  	config := fmt.Sprintf(testAccAzureRMContainerService_dcosBasic, ri, ri, ri, ri, ri)
    81  
    82  	resource.Test(t, resource.TestCase{
    83  		PreCheck:     func() { testAccPreCheck(t) },
    84  		Providers:    testAccProviders,
    85  		CheckDestroy: testCheckAzureRMContainerServiceDestroy,
    86  		Steps: []resource.TestStep{
    87  			{
    88  				Config: config,
    89  				Check: resource.ComposeTestCheckFunc(
    90  					testCheckAzureRMContainerServiceExists("azurerm_container_service.test"),
    91  				),
    92  			},
    93  		},
    94  	})
    95  }
    96  
    97  func TestAccAzureRMContainerService_kubernetesBasic(t *testing.T) {
    98  	ri := acctest.RandInt()
    99  	config := fmt.Sprintf(testAccAzureRMContainerService_kubernetesBasic, ri, ri, ri, ri, ri)
   100  
   101  	resource.Test(t, resource.TestCase{
   102  		PreCheck:     func() { testAccPreCheck(t) },
   103  		Providers:    testAccProviders,
   104  		CheckDestroy: testCheckAzureRMContainerServiceDestroy,
   105  		Steps: []resource.TestStep{
   106  			{
   107  				Config: config,
   108  				Check: resource.ComposeTestCheckFunc(
   109  					testCheckAzureRMContainerServiceExists("azurerm_container_service.test"),
   110  				),
   111  			},
   112  		},
   113  	})
   114  }
   115  
   116  func TestAccAzureRMContainerService_kubernetesComplete(t *testing.T) {
   117  	ri := acctest.RandInt()
   118  	config := fmt.Sprintf(testAccAzureRMContainerService_kubernetesComplete, ri, ri, ri, ri, ri)
   119  
   120  	resource.Test(t, resource.TestCase{
   121  		PreCheck:     func() { testAccPreCheck(t) },
   122  		Providers:    testAccProviders,
   123  		CheckDestroy: testCheckAzureRMContainerServiceDestroy,
   124  		Steps: []resource.TestStep{
   125  			{
   126  				Config: config,
   127  				Check: resource.ComposeTestCheckFunc(
   128  					testCheckAzureRMContainerServiceExists("azurerm_container_service.test"),
   129  				),
   130  			},
   131  		},
   132  	})
   133  }
   134  
   135  func TestAccAzureRMContainerService_swarmBasic(t *testing.T) {
   136  	ri := acctest.RandInt()
   137  	config := fmt.Sprintf(testAccAzureRMContainerService_swarmBasic, ri, ri, ri, ri, ri)
   138  
   139  	resource.Test(t, resource.TestCase{
   140  		PreCheck:     func() { testAccPreCheck(t) },
   141  		Providers:    testAccProviders,
   142  		CheckDestroy: testCheckAzureRMContainerServiceDestroy,
   143  		Steps: []resource.TestStep{
   144  			{
   145  				Config: config,
   146  				Check: resource.ComposeTestCheckFunc(
   147  					testCheckAzureRMContainerServiceExists("azurerm_container_service.test"),
   148  				),
   149  			},
   150  		},
   151  	})
   152  }
   153  
   154  var testAccAzureRMContainerService_dcosBasic = `
   155  resource "azurerm_resource_group" "test" {
   156    name     = "acctestRG-%d"
   157    location = "East US"
   158  }
   159  
   160  resource "azurerm_container_service" "test" {
   161    name                   = "acctestcontservice%d"
   162    location               = "${azurerm_resource_group.test.location}"
   163    resource_group_name    = "${azurerm_resource_group.test.name}"
   164    orchestration_platform = "DCOS"
   165  
   166    master_profile {
   167      count      = 1
   168      dns_prefix = "acctestmaster%d"
   169    }
   170  
   171    linux_profile {
   172      admin_username = "acctestuser%d"
   173  
   174      ssh_key {
   175        key_data = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld"
   176      }
   177    }
   178  
   179    agent_pool_profile {
   180      name       = "default"
   181      count      = 1
   182      dns_prefix = "acctestagent%d"
   183      vm_size    = "Standard_A0"
   184    }
   185  
   186    diagnostics_profile {
   187      enabled = false
   188    }
   189  }
   190  `
   191  
   192  var testAccAzureRMContainerService_kubernetesBasic = `
   193  resource "azurerm_resource_group" "test" {
   194    name     = "acctestRG-%d"
   195    location = "East US"
   196  }
   197  
   198  resource "azurerm_container_service" "test" {
   199    name                   = "acctestcontservice%d"
   200    location               = "${azurerm_resource_group.test.location}"
   201    resource_group_name    = "${azurerm_resource_group.test.name}"
   202    orchestration_platform = "Kubernetes"
   203  
   204    master_profile {
   205      count      = 1
   206      dns_prefix = "acctestmaster%d"
   207    }
   208  
   209    linux_profile {
   210      admin_username = "acctestuser%d"
   211  
   212      ssh_key {
   213        key_data = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld"
   214      }
   215    }
   216  
   217    agent_pool_profile {
   218      name       = "default"
   219      count      = 1
   220      dns_prefix = "acctestagent%d"
   221      vm_size    = "Standard_A0"
   222    }
   223  
   224    service_principal {
   225      client_id     = "00000000-0000-0000-0000-000000000000"
   226      client_secret = "00000000000000000000000000000000"
   227    }
   228  
   229    diagnostics_profile {
   230      enabled = false
   231    }
   232  }
   233  `
   234  
   235  var testAccAzureRMContainerService_kubernetesComplete = `
   236  resource "azurerm_resource_group" "test" {
   237    name     = "acctestRG-%d"
   238    location = "East US"
   239  }
   240  
   241  resource "azurerm_container_service" "test" {
   242    name                   = "acctestcontservice%d"
   243    location               = "${azurerm_resource_group.test.location}"
   244    resource_group_name    = "${azurerm_resource_group.test.name}"
   245    orchestration_platform = "Kubernetes"
   246  
   247    master_profile {
   248      count      = 1
   249      dns_prefix = "acctestmaster%d"
   250    }
   251  
   252    linux_profile {
   253      admin_username = "acctestuser%d"
   254  
   255      ssh_key {
   256        key_data = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld"
   257      }
   258    }
   259  
   260    agent_pool_profile {
   261      name       = "default"
   262      count      = 1
   263      dns_prefix = "acctestagent%d"
   264      vm_size    = "Standard_A0"
   265    }
   266  
   267    service_principal {
   268      client_id     = "00000000-0000-0000-0000-000000000000"
   269      client_secret = "00000000000000000000000000000000"
   270    }
   271  
   272    diagnostics_profile {
   273      enabled = false
   274    }
   275  
   276    tags {
   277      you = "me"
   278    }
   279  }
   280  `
   281  
   282  var testAccAzureRMContainerService_swarmBasic = `
   283  resource "azurerm_resource_group" "test" {
   284    name     = "acctestRG-%d"
   285    location = "East US"
   286  }
   287  
   288  resource "azurerm_container_service" "test" {
   289    name                   = "acctestcontservice%d"
   290    location               = "${azurerm_resource_group.test.location}"
   291    resource_group_name    = "${azurerm_resource_group.test.name}"
   292    orchestration_platform = "Swarm"
   293  
   294    master_profile {
   295      count      = 1
   296      dns_prefix = "acctestmaster%d"
   297    }
   298  
   299    linux_profile {
   300      admin_username = "acctestuser%d"
   301  
   302      ssh_key {
   303        key_data = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt terraform@demo.tld"
   304      }
   305    }
   306  
   307    agent_pool_profile {
   308      name       = "default"
   309      count      = 1
   310      dns_prefix = "acctestagent%d"
   311      vm_size    = "Standard_A0"
   312    }
   313  
   314    diagnostics_profile {
   315      enabled = false
   316    }
   317  }
   318  `
   319  
   320  func testCheckAzureRMContainerServiceExists(name string) resource.TestCheckFunc {
   321  	return func(s *terraform.State) error {
   322  		// Ensure we have enough information in state to look up in API
   323  		rs, ok := s.RootModule().Resources[name]
   324  		if !ok {
   325  			return fmt.Errorf("Not found: %s", name)
   326  		}
   327  
   328  		name := rs.Primary.Attributes["name"]
   329  		resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
   330  		if !hasResourceGroup {
   331  			return fmt.Errorf("Bad: no resource group found in state for Container Service Instance: %s", name)
   332  		}
   333  
   334  		conn := testAccProvider.Meta().(*ArmClient).containerServicesClient
   335  
   336  		resp, err := conn.Get(resourceGroup, name)
   337  		if err != nil {
   338  			return fmt.Errorf("Bad: Get on containerServicesClient: %s", err)
   339  		}
   340  
   341  		if resp.StatusCode == http.StatusNotFound {
   342  			return fmt.Errorf("Bad: Container Service Instance %q (resource group: %q) does not exist", name, resourceGroup)
   343  		}
   344  
   345  		return nil
   346  	}
   347  }
   348  
   349  func testCheckAzureRMContainerServiceDestroy(s *terraform.State) error {
   350  	conn := testAccProvider.Meta().(*ArmClient).containerServicesClient
   351  
   352  	for _, rs := range s.RootModule().Resources {
   353  		if rs.Type != "azurerm_container_service" {
   354  			continue
   355  		}
   356  
   357  		name := rs.Primary.Attributes["name"]
   358  		resourceGroup := rs.Primary.Attributes["resource_group_name"]
   359  
   360  		resp, err := conn.Get(resourceGroup, name)
   361  
   362  		if err != nil {
   363  			return nil
   364  		}
   365  
   366  		if resp.StatusCode != http.StatusNotFound {
   367  			return fmt.Errorf("Container Service Instance still exists:\n%#v", resp)
   368  		}
   369  	}
   370  
   371  	return nil
   372  }