github.com/pmcatominey/terraform@v0.7.0-rc2.0.20160708105029-1401a52a5cc5/builtin/providers/aws/resource_aws_iam_user_policy_test.go (about)

     1  package aws
     2  
     3  import (
     4  	"fmt"
     5  	"testing"
     6  
     7  	"github.com/aws/aws-sdk-go/aws"
     8  	"github.com/aws/aws-sdk-go/aws/awserr"
     9  	"github.com/aws/aws-sdk-go/service/iam"
    10  	"github.com/hashicorp/terraform/helper/resource"
    11  	"github.com/hashicorp/terraform/terraform"
    12  )
    13  
    14  func TestAccAWSIAMUserPolicy_basic(t *testing.T) {
    15  	resource.Test(t, resource.TestCase{
    16  		PreCheck:     func() { testAccPreCheck(t) },
    17  		Providers:    testAccProviders,
    18  		CheckDestroy: testAccCheckIAMUserPolicyDestroy,
    19  		Steps: []resource.TestStep{
    20  			resource.TestStep{
    21  				Config: testAccIAMUserPolicyConfig,
    22  				Check: resource.ComposeTestCheckFunc(
    23  					testAccCheckIAMUserPolicy(
    24  						"aws_iam_user.user",
    25  						"aws_iam_user_policy.foo",
    26  					),
    27  				),
    28  			},
    29  			resource.TestStep{
    30  				Config: testAccIAMUserPolicyConfigUpdate,
    31  				Check: resource.ComposeTestCheckFunc(
    32  					testAccCheckIAMUserPolicy(
    33  						"aws_iam_user.user",
    34  						"aws_iam_user_policy.bar",
    35  					),
    36  				),
    37  			},
    38  		},
    39  	})
    40  }
    41  
    42  func testAccCheckIAMUserPolicyDestroy(s *terraform.State) error {
    43  	iamconn := testAccProvider.Meta().(*AWSClient).iamconn
    44  
    45  	for _, rs := range s.RootModule().Resources {
    46  		if rs.Type != "aws_iam_user_policy" {
    47  			continue
    48  		}
    49  
    50  		role, name := resourceAwsIamRolePolicyParseId(rs.Primary.ID)
    51  
    52  		request := &iam.GetRolePolicyInput{
    53  			PolicyName: aws.String(name),
    54  			RoleName:   aws.String(role),
    55  		}
    56  
    57  		var err error
    58  		getResp, err := iamconn.GetRolePolicy(request)
    59  		if err != nil {
    60  			if iamerr, ok := err.(awserr.Error); ok && iamerr.Code() == "NoSuchEntity" {
    61  				// none found, that's good
    62  				return nil
    63  			}
    64  			return fmt.Errorf("Error reading IAM policy %s from role %s: %s", name, role, err)
    65  		}
    66  
    67  		if getResp != nil {
    68  			return fmt.Errorf("Found IAM Role, expected none: %s", getResp)
    69  		}
    70  	}
    71  
    72  	return nil
    73  }
    74  
    75  func testAccCheckIAMUserPolicy(
    76  	iamUserResource string,
    77  	iamUserPolicyResource string) resource.TestCheckFunc {
    78  	return func(s *terraform.State) error {
    79  		rs, ok := s.RootModule().Resources[iamUserResource]
    80  		if !ok {
    81  			return fmt.Errorf("Not Found: %s", iamUserResource)
    82  		}
    83  
    84  		if rs.Primary.ID == "" {
    85  			return fmt.Errorf("No ID is set")
    86  		}
    87  
    88  		policy, ok := s.RootModule().Resources[iamUserPolicyResource]
    89  		if !ok {
    90  			return fmt.Errorf("Not Found: %s", iamUserPolicyResource)
    91  		}
    92  
    93  		iamconn := testAccProvider.Meta().(*AWSClient).iamconn
    94  		username, name := resourceAwsIamUserPolicyParseId(policy.Primary.ID)
    95  		_, err := iamconn.GetUserPolicy(&iam.GetUserPolicyInput{
    96  			UserName:   aws.String(username),
    97  			PolicyName: aws.String(name),
    98  		})
    99  
   100  		if err != nil {
   101  			return err
   102  		}
   103  
   104  		return nil
   105  	}
   106  }
   107  
   108  const testAccIAMUserPolicyConfig = `
   109  resource "aws_iam_user" "user" {
   110  	name = "test_user"
   111  	path = "/"
   112  }
   113  
   114  resource "aws_iam_user_policy" "foo" {
   115  	name = "foo_policy"
   116  	user = "${aws_iam_user.user.name}"
   117  	policy = "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}"
   118  }
   119  `
   120  
   121  const testAccIAMUserPolicyConfigUpdate = `
   122  resource "aws_iam_user" "user" {
   123  	name = "test_user"
   124  	path = "/"
   125  }
   126  
   127  resource "aws_iam_user_policy" "foo" {
   128  	name = "foo_policy"
   129  	user = "${aws_iam_user.user.name}"
   130  	policy = "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}"
   131  }
   132  
   133  resource "aws_iam_user_policy" "bar" {
   134  	name = "bar_policy"
   135  	user = "${aws_iam_user.user.name}"
   136  	policy = "{\"Version\":\"2012-10-17\",\"Statement\":{\"Effect\":\"Allow\",\"Action\":\"*\",\"Resource\":\"*\"}}"
   137  }
   138  `