github.com/recobe182/terraform@v0.8.5-0.20170117231232-49ab22a935b7/builtin/providers/openstack/resource_openstack_fw_policy_v1_test.go (about) 1 package openstack 2 3 import ( 4 "fmt" 5 "testing" 6 "time" 7 8 "github.com/gophercloud/gophercloud" 9 "github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/fwaas/policies" 10 "github.com/hashicorp/terraform/helper/resource" 11 "github.com/hashicorp/terraform/terraform" 12 ) 13 14 func TestAccFWPolicyV1_basic(t *testing.T) { 15 resource.Test(t, resource.TestCase{ 16 PreCheck: func() { testAccPreCheck(t) }, 17 Providers: testAccProviders, 18 CheckDestroy: testAccCheckFWPolicyV1Destroy, 19 Steps: []resource.TestStep{ 20 resource.TestStep{ 21 Config: testAccFWPolicyV1_basic, 22 Check: resource.ComposeTestCheckFunc( 23 testAccCheckFWPolicyV1Exists( 24 "openstack_fw_policy_v1.policy_1", "", "", 0), 25 ), 26 }, 27 }, 28 }) 29 } 30 31 func TestAccFWPolicyV1_addRules(t *testing.T) { 32 resource.Test(t, resource.TestCase{ 33 PreCheck: func() { testAccPreCheck(t) }, 34 Providers: testAccProviders, 35 CheckDestroy: testAccCheckFWPolicyV1Destroy, 36 Steps: []resource.TestStep{ 37 resource.TestStep{ 38 Config: testAccFWPolicyV1_addRules, 39 Check: resource.ComposeTestCheckFunc( 40 testAccCheckFWPolicyV1Exists( 41 "openstack_fw_policy_v1.policy_1", "policy_1", "terraform acceptance test", 2), 42 ), 43 }, 44 }, 45 }) 46 } 47 48 func TestAccFWPolicyV1_deleteRules(t *testing.T) { 49 resource.Test(t, resource.TestCase{ 50 PreCheck: func() { testAccPreCheck(t) }, 51 Providers: testAccProviders, 52 CheckDestroy: testAccCheckFWPolicyV1Destroy, 53 Steps: []resource.TestStep{ 54 resource.TestStep{ 55 Config: testAccFWPolicyV1_deleteRules, 56 Check: resource.ComposeTestCheckFunc( 57 testAccCheckFWPolicyV1Exists( 58 "openstack_fw_policy_v1.policy_1", "policy_1", "terraform acceptance test", 1), 59 ), 60 }, 61 }, 62 }) 63 } 64 65 func testAccCheckFWPolicyV1Destroy(s *terraform.State) error { 66 config := testAccProvider.Meta().(*Config) 67 networkingClient, err := config.networkingV2Client(OS_REGION_NAME) 68 if err != nil { 69 return fmt.Errorf("Error creating OpenStack networking client: %s", err) 70 } 71 for _, rs := range s.RootModule().Resources { 72 if rs.Type != "openstack_fw_policy_v1" { 73 continue 74 } 75 _, err = policies.Get(networkingClient, rs.Primary.ID).Extract() 76 if err == nil { 77 return fmt.Errorf("Firewall policy (%s) still exists.", rs.Primary.ID) 78 } 79 if _, ok := err.(gophercloud.ErrDefault404); !ok { 80 return err 81 } 82 } 83 return nil 84 } 85 86 func testAccCheckFWPolicyV1Exists(n, name, description string, ruleCount int) resource.TestCheckFunc { 87 return func(s *terraform.State) error { 88 rs, ok := s.RootModule().Resources[n] 89 if !ok { 90 return fmt.Errorf("Not found: %s", n) 91 } 92 93 if rs.Primary.ID == "" { 94 return fmt.Errorf("No ID is set") 95 } 96 97 config := testAccProvider.Meta().(*Config) 98 networkingClient, err := config.networkingV2Client(OS_REGION_NAME) 99 if err != nil { 100 return fmt.Errorf("Error creating OpenStack networking client: %s", err) 101 } 102 103 var found *policies.Policy 104 for i := 0; i < 5; i++ { 105 // Firewall policy creation is asynchronous. Retry some times 106 // if we get a 404 error. Fail on any other error. 107 found, err = policies.Get(networkingClient, rs.Primary.ID).Extract() 108 if err != nil { 109 if _, ok := err.(gophercloud.ErrDefault404); ok { 110 time.Sleep(time.Second) 111 continue 112 } 113 return err 114 } 115 break 116 } 117 118 switch { 119 case name != found.Name: 120 err = fmt.Errorf("Expected name <%s>, but found <%s>", name, found.Name) 121 case description != found.Description: 122 err = fmt.Errorf("Expected description <%s>, but found <%s>", description, found.Description) 123 case ruleCount != len(found.Rules): 124 err = fmt.Errorf("Expected rule count <%d>, but found <%d>", ruleCount, len(found.Rules)) 125 } 126 127 if err != nil { 128 return err 129 } 130 131 return nil 132 } 133 } 134 135 const testAccFWPolicyV1_basic = ` 136 resource "openstack_fw_policy_v1" "policy_1" { 137 } 138 ` 139 140 const testAccFWPolicyV1_addRules = ` 141 resource "openstack_fw_policy_v1" "policy_1" { 142 name = "policy_1" 143 description = "terraform acceptance test" 144 rules = [ 145 "${openstack_fw_rule_v1.udp_deny.id}", 146 "${openstack_fw_rule_v1.tcp_allow.id}" 147 ] 148 } 149 150 resource "openstack_fw_rule_v1" "tcp_allow" { 151 protocol = "tcp" 152 action = "allow" 153 } 154 155 resource "openstack_fw_rule_v1" "udp_deny" { 156 protocol = "udp" 157 action = "deny" 158 } 159 ` 160 161 const testAccFWPolicyV1_deleteRules = ` 162 resource "openstack_fw_policy_v1" "policy_1" { 163 name = "policy_1" 164 description = "terraform acceptance test" 165 rules = [ 166 "${openstack_fw_rule_v1.udp_deny.id}" 167 ] 168 } 169 170 resource "openstack_fw_rule_v1" "udp_deny" { 171 protocol = "udp" 172 action = "deny" 173 } 174 `