github.com/danp/terraform@v0.9.5-0.20170426144147-39d740081351/builtin/providers/azurerm/resource_arm_storage_container_test.go (about) 1 package azurerm 2 3 import ( 4 "fmt" 5 "log" 6 "strings" 7 "testing" 8 9 "github.com/Azure/azure-sdk-for-go/storage" 10 "github.com/hashicorp/terraform/helper/acctest" 11 "github.com/hashicorp/terraform/helper/resource" 12 "github.com/hashicorp/terraform/terraform" 13 ) 14 15 func TestAccAzureRMStorageContainer_basic(t *testing.T) { 16 var c storage.Container 17 18 ri := acctest.RandInt() 19 rs := strings.ToLower(acctest.RandString(11)) 20 config := fmt.Sprintf(testAccAzureRMStorageContainer_basic, ri, rs) 21 22 resource.Test(t, resource.TestCase{ 23 PreCheck: func() { testAccPreCheck(t) }, 24 Providers: testAccProviders, 25 CheckDestroy: testCheckAzureRMStorageContainerDestroy, 26 Steps: []resource.TestStep{ 27 { 28 Config: config, 29 Check: resource.ComposeTestCheckFunc( 30 testCheckAzureRMStorageContainerExists("azurerm_storage_container.test", &c), 31 ), 32 }, 33 }, 34 }) 35 } 36 37 func TestAccAzureRMStorageContainer_disappears(t *testing.T) { 38 var c storage.Container 39 40 ri := acctest.RandInt() 41 rs := strings.ToLower(acctest.RandString(11)) 42 config := fmt.Sprintf(testAccAzureRMStorageContainer_basic, ri, rs) 43 44 resource.Test(t, resource.TestCase{ 45 PreCheck: func() { testAccPreCheck(t) }, 46 Providers: testAccProviders, 47 CheckDestroy: testCheckAzureRMStorageContainerDestroy, 48 Steps: []resource.TestStep{ 49 { 50 Config: config, 51 Check: resource.ComposeTestCheckFunc( 52 testCheckAzureRMStorageContainerExists("azurerm_storage_container.test", &c), 53 testAccARMStorageContainerDisappears("azurerm_storage_container.test", &c), 54 ), 55 ExpectNonEmptyPlan: true, 56 }, 57 }, 58 }) 59 } 60 61 func TestAccAzureRMStorageContainer_root(t *testing.T) { 62 var c storage.Container 63 64 ri := acctest.RandInt() 65 rs := strings.ToLower(acctest.RandString(11)) 66 config := fmt.Sprintf(testAccAzureRMStorageContainer_root, ri, rs) 67 68 resource.Test(t, resource.TestCase{ 69 PreCheck: func() { testAccPreCheck(t) }, 70 Providers: testAccProviders, 71 CheckDestroy: testCheckAzureRMStorageContainerDestroy, 72 Steps: []resource.TestStep{ 73 { 74 Config: config, 75 Check: resource.ComposeTestCheckFunc( 76 testCheckAzureRMStorageContainerExists("azurerm_storage_container.test", &c), 77 resource.TestCheckResourceAttr("azurerm_storage_container.test", "name", "$root"), 78 ), 79 }, 80 }, 81 }) 82 } 83 84 func testCheckAzureRMStorageContainerExists(name string, c *storage.Container) resource.TestCheckFunc { 85 return func(s *terraform.State) error { 86 87 rs, ok := s.RootModule().Resources[name] 88 if !ok { 89 return fmt.Errorf("Not found: %s", name) 90 } 91 92 name := rs.Primary.Attributes["name"] 93 storageAccountName := rs.Primary.Attributes["storage_account_name"] 94 resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"] 95 if !hasResourceGroup { 96 return fmt.Errorf("Bad: no resource group found in state for storage container: %s", name) 97 } 98 99 armClient := testAccProvider.Meta().(*ArmClient) 100 blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName) 101 if err != nil { 102 return err 103 } 104 if !accountExists { 105 return fmt.Errorf("Bad: Storage Account %q does not exist", storageAccountName) 106 } 107 108 containers, err := blobClient.ListContainers(storage.ListContainersParameters{ 109 Prefix: name, 110 Timeout: 90, 111 }) 112 113 if len(containers.Containers) == 0 { 114 return fmt.Errorf("Bad: Storage Container %q (storage account: %q) does not exist", name, storageAccountName) 115 } 116 117 var found bool 118 for _, container := range containers.Containers { 119 if container.Name == name { 120 found = true 121 *c = container 122 } 123 } 124 125 if !found { 126 return fmt.Errorf("Bad: Storage Container %q (storage account: %q) does not exist", name, storageAccountName) 127 } 128 129 return nil 130 } 131 } 132 133 func testAccARMStorageContainerDisappears(name string, c *storage.Container) resource.TestCheckFunc { 134 return func(s *terraform.State) error { 135 rs, ok := s.RootModule().Resources[name] 136 if !ok { 137 return fmt.Errorf("Not found: %s", name) 138 } 139 140 armClient := testAccProvider.Meta().(*ArmClient) 141 142 storageAccountName := rs.Primary.Attributes["storage_account_name"] 143 resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"] 144 if !hasResourceGroup { 145 return fmt.Errorf("Bad: no resource group found in state for storage container: %s", c.Name) 146 } 147 148 blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName) 149 if err != nil { 150 return err 151 } 152 if !accountExists { 153 log.Printf("[INFO]Storage Account %q doesn't exist so the container won't exist", storageAccountName) 154 return nil 155 } 156 157 _, err = blobClient.DeleteContainerIfExists(c.Name) 158 if err != nil { 159 return err 160 } 161 162 return nil 163 } 164 } 165 166 func testCheckAzureRMStorageContainerDestroy(s *terraform.State) error { 167 for _, rs := range s.RootModule().Resources { 168 if rs.Type != "azurerm_storage_container" { 169 continue 170 } 171 172 name := rs.Primary.Attributes["name"] 173 storageAccountName := rs.Primary.Attributes["storage_account_name"] 174 resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"] 175 if !hasResourceGroup { 176 return fmt.Errorf("Bad: no resource group found in state for storage container: %s", name) 177 } 178 179 armClient := testAccProvider.Meta().(*ArmClient) 180 blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName) 181 if err != nil { 182 //If we can't get keys then the blob can't exist 183 return nil 184 } 185 if !accountExists { 186 return nil 187 } 188 189 containers, err := blobClient.ListContainers(storage.ListContainersParameters{ 190 Prefix: name, 191 Timeout: 90, 192 }) 193 194 if err != nil { 195 return nil 196 } 197 198 var found bool 199 for _, container := range containers.Containers { 200 if container.Name == name { 201 found = true 202 } 203 } 204 205 if found { 206 return fmt.Errorf("Bad: Storage Container %q (storage account: %q) still exist", name, storageAccountName) 207 } 208 } 209 210 return nil 211 } 212 213 func TestValidateArmStorageContainerName(t *testing.T) { 214 validNames := []string{ 215 "valid-name", 216 "valid02-name", 217 "$root", 218 } 219 for _, v := range validNames { 220 _, errors := validateArmStorageContainerName(v, "name") 221 if len(errors) != 0 { 222 t.Fatalf("%q should be a valid Storage Container Name: %q", v, errors) 223 } 224 } 225 226 invalidNames := []string{ 227 "InvalidName1", 228 "-invalidname1", 229 "invalid_name", 230 "invalid!", 231 "ww", 232 "$notroot", 233 strings.Repeat("w", 65), 234 } 235 for _, v := range invalidNames { 236 _, errors := validateArmStorageContainerName(v, "name") 237 if len(errors) == 0 { 238 t.Fatalf("%q should be an invalid Storage Container Name", v) 239 } 240 } 241 } 242 243 var testAccAzureRMStorageContainer_basic = ` 244 resource "azurerm_resource_group" "test" { 245 name = "acctestRG-%d" 246 location = "westus" 247 } 248 249 resource "azurerm_storage_account" "test" { 250 name = "acctestacc%s" 251 resource_group_name = "${azurerm_resource_group.test.name}" 252 location = "westus" 253 account_type = "Standard_LRS" 254 255 tags { 256 environment = "staging" 257 } 258 } 259 260 resource "azurerm_storage_container" "test" { 261 name = "vhds" 262 resource_group_name = "${azurerm_resource_group.test.name}" 263 storage_account_name = "${azurerm_storage_account.test.name}" 264 container_access_type = "private" 265 } 266 ` 267 268 var testAccAzureRMStorageContainer_root = ` 269 resource "azurerm_resource_group" "test" { 270 name = "acctestRG-%d" 271 location = "westus" 272 } 273 274 resource "azurerm_storage_account" "test" { 275 name = "acctestacc%s" 276 resource_group_name = "${azurerm_resource_group.test.name}" 277 location = "westus" 278 account_type = "Standard_LRS" 279 280 tags { 281 environment = "staging" 282 } 283 } 284 285 resource "azurerm_storage_container" "test" { 286 name = "$root" 287 resource_group_name = "${azurerm_resource_group.test.name}" 288 storage_account_name = "${azurerm_storage_account.test.name}" 289 container_access_type = "private" 290 } 291 `