github.com/minamijoyo/terraform@v0.7.8-0.20161029001309-18b3736ba44b/builtin/providers/cloudstack/resource_cloudstack_firewall_test.go (about) 1 package cloudstack 2 3 import ( 4 "fmt" 5 "strings" 6 "testing" 7 8 "github.com/hashicorp/terraform/helper/resource" 9 "github.com/hashicorp/terraform/terraform" 10 "github.com/xanzy/go-cloudstack/cloudstack" 11 ) 12 13 func TestAccCloudStackFirewall_basic(t *testing.T) { 14 resource.Test(t, resource.TestCase{ 15 PreCheck: func() { testAccPreCheck(t) }, 16 Providers: testAccProviders, 17 CheckDestroy: testAccCheckCloudStackFirewallDestroy, 18 Steps: []resource.TestStep{ 19 resource.TestStep{ 20 Config: testAccCloudStackFirewall_basic, 21 Check: resource.ComposeTestCheckFunc( 22 testAccCheckCloudStackFirewallRulesExist("cloudstack_firewall.foo"), 23 resource.TestCheckResourceAttr( 24 "cloudstack_firewall.foo", "ip_address_id", CLOUDSTACK_PUBLIC_IPADDRESS), 25 resource.TestCheckResourceAttr( 26 "cloudstack_firewall.foo", "rule.#", "2"), 27 resource.TestCheckResourceAttr( 28 "cloudstack_firewall.foo", "rule.2263505090.cidr_list.3482919157", "10.0.0.0/24"), 29 resource.TestCheckResourceAttr( 30 "cloudstack_firewall.foo", "rule.2263505090.protocol", "tcp"), 31 resource.TestCheckResourceAttr( 32 "cloudstack_firewall.foo", "rule.2263505090.ports.32925333", "8080"), 33 resource.TestCheckResourceAttr( 34 "cloudstack_firewall.foo", "rule.3782201428.cidr_list.3482919157", "10.0.0.0/24"), 35 resource.TestCheckResourceAttr( 36 "cloudstack_firewall.foo", "rule.3782201428.protocol", "tcp"), 37 resource.TestCheckResourceAttr( 38 "cloudstack_firewall.foo", "rule.3782201428.ports.1209010669", "1000-2000"), 39 resource.TestCheckResourceAttr( 40 "cloudstack_firewall.foo", "rule.3782201428.ports.1889509032", "80"), 41 ), 42 }, 43 }, 44 }) 45 } 46 47 func TestAccCloudStackFirewall_update(t *testing.T) { 48 resource.Test(t, resource.TestCase{ 49 PreCheck: func() { testAccPreCheck(t) }, 50 Providers: testAccProviders, 51 CheckDestroy: testAccCheckCloudStackFirewallDestroy, 52 Steps: []resource.TestStep{ 53 resource.TestStep{ 54 Config: testAccCloudStackFirewall_basic, 55 Check: resource.ComposeTestCheckFunc( 56 testAccCheckCloudStackFirewallRulesExist("cloudstack_firewall.foo"), 57 resource.TestCheckResourceAttr( 58 "cloudstack_firewall.foo", "ip_address_id", CLOUDSTACK_PUBLIC_IPADDRESS), 59 resource.TestCheckResourceAttr( 60 "cloudstack_firewall.foo", "rule.#", "2"), 61 resource.TestCheckResourceAttr( 62 "cloudstack_firewall.foo", "rule.2263505090.cidr_list.3482919157", "10.0.0.0/24"), 63 resource.TestCheckResourceAttr( 64 "cloudstack_firewall.foo", "rule.2263505090.protocol", "tcp"), 65 resource.TestCheckResourceAttr( 66 "cloudstack_firewall.foo", "rule.2263505090.ports.32925333", "8080"), 67 resource.TestCheckResourceAttr( 68 "cloudstack_firewall.foo", "rule.3782201428.cidr_list.3482919157", "10.0.0.0/24"), 69 resource.TestCheckResourceAttr( 70 "cloudstack_firewall.foo", "rule.3782201428.protocol", "tcp"), 71 resource.TestCheckResourceAttr( 72 "cloudstack_firewall.foo", "rule.3782201428.ports.1209010669", "1000-2000"), 73 resource.TestCheckResourceAttr( 74 "cloudstack_firewall.foo", "rule.3782201428.ports.1889509032", "80"), 75 ), 76 }, 77 78 resource.TestStep{ 79 Config: testAccCloudStackFirewall_update, 80 Check: resource.ComposeTestCheckFunc( 81 testAccCheckCloudStackFirewallRulesExist("cloudstack_firewall.foo"), 82 resource.TestCheckResourceAttr( 83 "cloudstack_firewall.foo", "ip_address_id", CLOUDSTACK_PUBLIC_IPADDRESS), 84 resource.TestCheckResourceAttr( 85 "cloudstack_firewall.foo", "rule.#", "3"), 86 resource.TestCheckResourceAttr( 87 "cloudstack_firewall.foo", "rule.3529885171.cidr_list.80081744", "10.0.1.0/24"), 88 resource.TestCheckResourceAttr( 89 "cloudstack_firewall.foo", "rule.3529885171.cidr_list.3482919157", "10.0.0.0/24"), 90 resource.TestCheckResourceAttr( 91 "cloudstack_firewall.foo", "rule.3529885171.protocol", "tcp"), 92 resource.TestCheckResourceAttr( 93 "cloudstack_firewall.foo", "rule.3529885171.ports.32925333", "8080"), 94 resource.TestCheckResourceAttr( 95 "cloudstack_firewall.foo", "rule.3782201428.cidr_list.3482919157", "10.0.0.0/24"), 96 resource.TestCheckResourceAttr( 97 "cloudstack_firewall.foo", "rule.3782201428.protocol", "tcp"), 98 resource.TestCheckResourceAttr( 99 "cloudstack_firewall.foo", "rule.3782201428.ports.1209010669", "1000-2000"), 100 resource.TestCheckResourceAttr( 101 "cloudstack_firewall.foo", "rule.3782201428.ports.1889509032", "80"), 102 resource.TestCheckResourceAttr( 103 "cloudstack_firewall.foo", "rule.4160426500.cidr_list.2835005819", "172.16.100.0/24"), 104 resource.TestCheckResourceAttr( 105 "cloudstack_firewall.foo", "rule.4160426500.protocol", "tcp"), 106 resource.TestCheckResourceAttr( 107 "cloudstack_firewall.foo", "rule.4160426500.ports.1889509032", "80"), 108 resource.TestCheckResourceAttr( 109 "cloudstack_firewall.foo", "rule.4160426500.ports.3638101695", "443"), 110 ), 111 }, 112 }, 113 }) 114 } 115 116 func testAccCheckCloudStackFirewallRulesExist(n string) resource.TestCheckFunc { 117 return func(s *terraform.State) error { 118 rs, ok := s.RootModule().Resources[n] 119 if !ok { 120 return fmt.Errorf("Not found: %s", n) 121 } 122 123 if rs.Primary.ID == "" { 124 return fmt.Errorf("No firewall ID is set") 125 } 126 127 for k, id := range rs.Primary.Attributes { 128 if !strings.Contains(k, ".uuids.") || strings.HasSuffix(k, ".uuids.%") { 129 continue 130 } 131 132 cs := testAccProvider.Meta().(*cloudstack.CloudStackClient) 133 _, count, err := cs.Firewall.GetFirewallRuleByID(id) 134 135 if err != nil { 136 return err 137 } 138 139 if count == 0 { 140 return fmt.Errorf("Firewall rule for %s not found", k) 141 } 142 } 143 144 return nil 145 } 146 } 147 148 func testAccCheckCloudStackFirewallDestroy(s *terraform.State) error { 149 cs := testAccProvider.Meta().(*cloudstack.CloudStackClient) 150 151 for _, rs := range s.RootModule().Resources { 152 if rs.Type != "cloudstack_firewall" { 153 continue 154 } 155 156 if rs.Primary.ID == "" { 157 return fmt.Errorf("No instance ID is set") 158 } 159 160 for k, id := range rs.Primary.Attributes { 161 if !strings.Contains(k, ".uuids.") || strings.HasSuffix(k, ".uuids.%") { 162 continue 163 } 164 165 _, _, err := cs.Firewall.GetFirewallRuleByID(id) 166 if err == nil { 167 return fmt.Errorf("Firewall rule %s still exists", rs.Primary.ID) 168 } 169 } 170 } 171 172 return nil 173 } 174 175 var testAccCloudStackFirewall_basic = fmt.Sprintf(` 176 resource "cloudstack_firewall" "foo" { 177 ip_address_id = "%s" 178 179 rule { 180 cidr_list = ["10.0.0.0/24"] 181 protocol = "tcp" 182 ports = ["8080"] 183 } 184 185 rule { 186 cidr_list = ["10.0.0.0/24"] 187 protocol = "tcp" 188 ports = ["80", "1000-2000"] 189 } 190 }`, CLOUDSTACK_PUBLIC_IPADDRESS) 191 192 var testAccCloudStackFirewall_update = fmt.Sprintf(` 193 resource "cloudstack_firewall" "foo" { 194 ip_address_id = "%s" 195 196 rule { 197 cidr_list = ["10.0.0.0/24", "10.0.1.0/24"] 198 protocol = "tcp" 199 ports = ["8080"] 200 } 201 202 rule { 203 cidr_list = ["10.0.0.0/24"] 204 protocol = "tcp" 205 ports = ["80", "1000-2000"] 206 } 207 208 rule { 209 cidr_list = ["172.16.100.0/24"] 210 protocol = "tcp" 211 ports = ["80", "443"] 212 } 213 }`, CLOUDSTACK_PUBLIC_IPADDRESS)