github.com/vtorhonen/terraform@v0.9.0-beta2.0.20170307220345-5d894e4ffda7/builtin/providers/azure/resource_azure_instance_test.go (about)

     1  package azure
     2  
     3  import (
     4  	"fmt"
     5  	"math/rand"
     6  	"testing"
     7  	"time"
     8  
     9  	"github.com/Azure/azure-sdk-for-go/management"
    10  	"github.com/Azure/azure-sdk-for-go/management/virtualmachine"
    11  	"github.com/hashicorp/terraform/helper/acctest"
    12  	"github.com/hashicorp/terraform/helper/resource"
    13  	"github.com/hashicorp/terraform/terraform"
    14  )
    15  
    16  var randInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int()
    17  var instanceName = fmt.Sprintf("terraform-test-%d", randInt)
    18  
    19  func TestAccAzureInstance_basic(t *testing.T) {
    20  	var dpmt virtualmachine.DeploymentResponse
    21  
    22  	resource.Test(t, resource.TestCase{
    23  		PreCheck:     func() { testAccPreCheck(t) },
    24  		Providers:    testAccProviders,
    25  		CheckDestroy: testAccCheckAzureInstanceDestroyed(""),
    26  		Steps: []resource.TestStep{
    27  			resource.TestStep{
    28  				Config: testAccAzureInstance_basic,
    29  				Check: resource.ComposeTestCheckFunc(
    30  					testAccCheckAzureInstanceExists(
    31  						"azure_instance.foo", "", &dpmt),
    32  					testAccCheckAzureInstanceBasicAttributes(&dpmt),
    33  					resource.TestCheckResourceAttr(
    34  						"azure_instance.foo", "name", instanceName),
    35  					resource.TestCheckResourceAttr(
    36  						"azure_instance.foo", "hosted_service_name", instanceName),
    37  					resource.TestCheckResourceAttr(
    38  						"azure_instance.foo", "location", "West US"),
    39  					resource.TestCheckResourceAttr(
    40  						"azure_instance.foo", "endpoint.2462817782.public_port", "22"),
    41  					resource.TestCheckResourceAttr(
    42  						"azure_instance.foo", "custom_data", "0ea0f28b0c42d6bef7d0c7ab4886324feaa8b5e1"),
    43  				),
    44  			},
    45  		},
    46  	})
    47  }
    48  
    49  func TestAccAzureInstance_separateHostedService(t *testing.T) {
    50  	var dpmt virtualmachine.DeploymentResponse
    51  
    52  	hostedServiceName := fmt.Sprintf("terraform-testing-service%d", acctest.RandInt())
    53  
    54  	config := fmt.Sprintf(testAccAzureInstance_separateHostedService, hostedServiceName, instanceName, testAccStorageServiceName)
    55  
    56  	resource.Test(t, resource.TestCase{
    57  		PreCheck:     func() { testAccPreCheck(t) },
    58  		Providers:    testAccProviders,
    59  		CheckDestroy: testAccCheckAzureInstanceDestroyed(hostedServiceName),
    60  		Steps: []resource.TestStep{
    61  			resource.TestStep{
    62  				Config: config,
    63  				Check: resource.ComposeTestCheckFunc(
    64  					testAccCheckAzureInstanceExists(
    65  						"azure_instance.foo", hostedServiceName, &dpmt),
    66  					testAccCheckAzureInstanceBasicAttributes(&dpmt),
    67  					resource.TestCheckResourceAttr(
    68  						"azure_instance.foo", "name", instanceName),
    69  					resource.TestCheckResourceAttr(
    70  						"azure_instance.foo", "hosted_service_name", hostedServiceName),
    71  					resource.TestCheckResourceAttr(
    72  						"azure_instance.foo", "location", "West US"),
    73  					resource.TestCheckResourceAttr(
    74  						"azure_instance.foo", "endpoint.2462817782.public_port", "22"),
    75  				),
    76  			},
    77  		},
    78  	})
    79  }
    80  
    81  func TestAccAzureInstance_advanced(t *testing.T) {
    82  	var dpmt virtualmachine.DeploymentResponse
    83  
    84  	resource.Test(t, resource.TestCase{
    85  		PreCheck:     func() { testAccPreCheck(t) },
    86  		Providers:    testAccProviders,
    87  		CheckDestroy: testAccCheckAzureInstanceDestroyed(""),
    88  		Steps: []resource.TestStep{
    89  			resource.TestStep{
    90  				Config: testAccAzureInstance_advanced,
    91  				Check: resource.ComposeTestCheckFunc(
    92  					testAccCheckAzureInstanceExists(
    93  						"azure_instance.foo", "", &dpmt),
    94  					testAccCheckAzureInstanceAdvancedAttributes(&dpmt),
    95  					resource.TestCheckResourceAttr(
    96  						"azure_instance.foo", "name", "terraform-test1"),
    97  					resource.TestCheckResourceAttr(
    98  						"azure_instance.foo", "hosted_service_name", "terraform-test1"),
    99  					resource.TestCheckResourceAttr(
   100  						"azure_instance.foo", "size", "Basic_A1"),
   101  					resource.TestCheckResourceAttr(
   102  						"azure_instance.foo", "subnet", "subnet1"),
   103  					resource.TestCheckResourceAttr(
   104  						"azure_instance.foo", "virtual_network", "terraform-vnet-advanced-test"),
   105  					resource.TestCheckResourceAttr(
   106  						"azure_instance.foo", "security_group", "terraform-security-group1"),
   107  					resource.TestCheckResourceAttr(
   108  						"azure_instance.foo", "endpoint.1814039778.public_port", "3389"),
   109  					resource.TestCheckResourceAttr(
   110  						"azure_instance.foo", "custom_data", "04c589e0edaa5ffe185d1e5532e77d1b2ac4b948"),
   111  				),
   112  			},
   113  		},
   114  	})
   115  }
   116  
   117  func TestAccAzureInstance_update(t *testing.T) {
   118  	var dpmt virtualmachine.DeploymentResponse
   119  
   120  	resource.Test(t, resource.TestCase{
   121  		PreCheck:     func() { testAccPreCheck(t) },
   122  		Providers:    testAccProviders,
   123  		CheckDestroy: testAccCheckAzureInstanceDestroyed(""),
   124  		Steps: []resource.TestStep{
   125  			resource.TestStep{
   126  				Config: testAccAzureInstance_advanced,
   127  				Check: resource.ComposeTestCheckFunc(
   128  					testAccCheckAzureInstanceExists(
   129  						"azure_instance.foo", "", &dpmt),
   130  					testAccCheckAzureInstanceAdvancedAttributes(&dpmt),
   131  					resource.TestCheckResourceAttr(
   132  						"azure_instance.foo", "name", "terraform-test1"),
   133  					resource.TestCheckResourceAttr(
   134  						"azure_instance.foo", "hosted_service_name", "terraform-test1"),
   135  					resource.TestCheckResourceAttr(
   136  						"azure_instance.foo", "size", "Basic_A1"),
   137  					resource.TestCheckResourceAttr(
   138  						"azure_instance.foo", "subnet", "subnet1"),
   139  					resource.TestCheckResourceAttr(
   140  						"azure_instance.foo", "virtual_network", "terraform-vnet-advanced-test"),
   141  					resource.TestCheckResourceAttr(
   142  						"azure_instance.foo", "security_group", "terraform-security-group1"),
   143  					resource.TestCheckResourceAttr(
   144  						"azure_instance.foo", "endpoint.1814039778.public_port", "3389"),
   145  				),
   146  			},
   147  
   148  			resource.TestStep{
   149  				Config: testAccAzureInstance_update,
   150  				Check: resource.ComposeTestCheckFunc(
   151  					testAccCheckAzureInstanceExists(
   152  						"azure_instance.foo", "", &dpmt),
   153  					testAccCheckAzureInstanceUpdatedAttributes(&dpmt),
   154  					resource.TestCheckResourceAttr(
   155  						"azure_instance.foo", "size", "Basic_A2"),
   156  					resource.TestCheckResourceAttr(
   157  						"azure_instance.foo", "security_group", "terraform-security-update-group2"),
   158  					resource.TestCheckResourceAttr(
   159  						"azure_instance.foo", "endpoint.1814039778.public_port", "3389"),
   160  					resource.TestCheckResourceAttr(
   161  						"azure_instance.foo", "endpoint.3713350066.public_port", "5985"),
   162  				),
   163  			},
   164  		},
   165  	})
   166  }
   167  
   168  func testAccCheckAzureInstanceExists(
   169  	n string,
   170  	hostedServiceName string,
   171  	dpmt *virtualmachine.DeploymentResponse) resource.TestCheckFunc {
   172  	return func(s *terraform.State) error {
   173  		rs, ok := s.RootModule().Resources[n]
   174  		if !ok {
   175  			return fmt.Errorf("Not found: %s", n)
   176  		}
   177  
   178  		if rs.Primary.ID == "" {
   179  			return fmt.Errorf("No instance ID is set")
   180  		}
   181  
   182  		// if not hosted service was provided; it means that we expect it
   183  		// to be identical with the name of the instance; which is in the ID.
   184  		var serviceName string
   185  		if hostedServiceName == "" {
   186  			serviceName = rs.Primary.ID
   187  		} else {
   188  			serviceName = hostedServiceName
   189  		}
   190  
   191  		vmClient := testAccProvider.Meta().(*Client).vmClient
   192  		vm, err := vmClient.GetDeployment(serviceName, rs.Primary.ID)
   193  		if err != nil {
   194  			return err
   195  		}
   196  
   197  		if vm.Name != rs.Primary.ID {
   198  			return fmt.Errorf("Instance not found")
   199  		}
   200  
   201  		*dpmt = vm
   202  
   203  		return nil
   204  	}
   205  }
   206  
   207  func testAccCheckAzureInstanceBasicAttributes(
   208  	dpmt *virtualmachine.DeploymentResponse) resource.TestCheckFunc {
   209  	return func(s *terraform.State) error {
   210  
   211  		if dpmt.Name != instanceName {
   212  			return fmt.Errorf("Bad name: %s", dpmt.Name)
   213  		}
   214  
   215  		if len(dpmt.RoleList) != 1 {
   216  			return fmt.Errorf(
   217  				"Instance %s has an unexpected number of roles: %d", dpmt.Name, len(dpmt.RoleList))
   218  		}
   219  
   220  		if dpmt.RoleList[0].RoleSize != "Basic_A1" {
   221  			return fmt.Errorf("Bad size: %s", dpmt.RoleList[0].RoleSize)
   222  		}
   223  
   224  		return nil
   225  	}
   226  }
   227  
   228  func testAccCheckAzureInstanceAdvancedAttributes(
   229  	dpmt *virtualmachine.DeploymentResponse) resource.TestCheckFunc {
   230  	return func(s *terraform.State) error {
   231  
   232  		if dpmt.Name != "terraform-test1" {
   233  			return fmt.Errorf("Bad name: %s", dpmt.Name)
   234  		}
   235  
   236  		if dpmt.VirtualNetworkName != "terraform-vnet-advanced-test" {
   237  			return fmt.Errorf("Bad virtual network: %s", dpmt.VirtualNetworkName)
   238  		}
   239  
   240  		if len(dpmt.RoleList) != 1 {
   241  			return fmt.Errorf(
   242  				"Instance %s has an unexpected number of roles: %d", dpmt.Name, len(dpmt.RoleList))
   243  		}
   244  
   245  		if dpmt.RoleList[0].RoleSize != "Basic_A1" {
   246  			return fmt.Errorf("Bad size: %s", dpmt.RoleList[0].RoleSize)
   247  		}
   248  
   249  		for _, c := range dpmt.RoleList[0].ConfigurationSets {
   250  			if c.ConfigurationSetType == virtualmachine.ConfigurationSetTypeNetwork {
   251  				if len(c.InputEndpoints) != 1 {
   252  					return fmt.Errorf(
   253  						"Instance %s has an unexpected number of endpoints %d",
   254  						dpmt.Name, len(c.InputEndpoints))
   255  				}
   256  
   257  				if c.InputEndpoints[0].Name != "RDP" {
   258  					return fmt.Errorf("Bad endpoint name: %s", c.InputEndpoints[0].Name)
   259  				}
   260  
   261  				if c.InputEndpoints[0].Port != 3389 {
   262  					return fmt.Errorf("Bad endpoint port: %d", c.InputEndpoints[0].Port)
   263  				}
   264  
   265  				if len(c.SubnetNames) != 1 {
   266  					return fmt.Errorf(
   267  						"Instance %s has an unexpected number of associated subnets %d",
   268  						dpmt.Name, len(c.SubnetNames))
   269  				}
   270  
   271  				if c.SubnetNames[0] != "subnet1" {
   272  					return fmt.Errorf("Bad subnet: %s", c.SubnetNames[0])
   273  				}
   274  
   275  				if c.NetworkSecurityGroup != "terraform-security-group1" {
   276  					return fmt.Errorf("Bad security group: %s", c.NetworkSecurityGroup)
   277  				}
   278  			}
   279  		}
   280  
   281  		return nil
   282  	}
   283  }
   284  
   285  func testAccCheckAzureInstanceAdvancedUpdatedAttributes(
   286  	dpmt *virtualmachine.DeploymentResponse) resource.TestCheckFunc {
   287  	return func(s *terraform.State) error {
   288  
   289  		if dpmt.Name != "terraform-test1" {
   290  			return fmt.Errorf("Bad name: %s", dpmt.Name)
   291  		}
   292  
   293  		if dpmt.VirtualNetworkName != "terraform-vnet-update-test" {
   294  			return fmt.Errorf("Bad virtual network: %s", dpmt.VirtualNetworkName)
   295  		}
   296  
   297  		if len(dpmt.RoleList) != 1 {
   298  			return fmt.Errorf(
   299  				"Instance %s has an unexpected number of roles: %d", dpmt.Name, len(dpmt.RoleList))
   300  		}
   301  
   302  		if dpmt.RoleList[0].RoleSize != "Basic_A1" {
   303  			return fmt.Errorf("Bad size: %s", dpmt.RoleList[0].RoleSize)
   304  		}
   305  
   306  		for _, c := range dpmt.RoleList[0].ConfigurationSets {
   307  			if c.ConfigurationSetType == virtualmachine.ConfigurationSetTypeNetwork {
   308  				if len(c.InputEndpoints) != 1 {
   309  					return fmt.Errorf(
   310  						"Instance %s has an unexpected number of endpoints %d",
   311  						dpmt.Name, len(c.InputEndpoints))
   312  				}
   313  
   314  				if c.InputEndpoints[0].Name != "RDP" {
   315  					return fmt.Errorf("Bad endpoint name: %s", c.InputEndpoints[0].Name)
   316  				}
   317  
   318  				if c.InputEndpoints[0].Port != 3389 {
   319  					return fmt.Errorf("Bad endpoint port: %d", c.InputEndpoints[0].Port)
   320  				}
   321  
   322  				if len(c.SubnetNames) != 1 {
   323  					return fmt.Errorf(
   324  						"Instance %s has an unexpected number of associated subnets %d",
   325  						dpmt.Name, len(c.SubnetNames))
   326  				}
   327  
   328  				if c.SubnetNames[0] != "subnet1" {
   329  					return fmt.Errorf("Bad subnet: %s", c.SubnetNames[0])
   330  				}
   331  
   332  				if c.NetworkSecurityGroup != "terraform-security-group1" {
   333  					return fmt.Errorf("Bad security group: %s", c.NetworkSecurityGroup)
   334  				}
   335  			}
   336  		}
   337  
   338  		return nil
   339  	}
   340  }
   341  
   342  func testAccCheckAzureInstanceUpdatedAttributes(
   343  	dpmt *virtualmachine.DeploymentResponse) resource.TestCheckFunc {
   344  	return func(s *terraform.State) error {
   345  
   346  		if dpmt.Name != "terraform-test1" {
   347  			return fmt.Errorf("Bad name: %s", dpmt.Name)
   348  		}
   349  
   350  		if dpmt.VirtualNetworkName != "terraform-vnet-update-test" {
   351  			return fmt.Errorf("Bad virtual network: %s", dpmt.VirtualNetworkName)
   352  		}
   353  
   354  		if len(dpmt.RoleList) != 1 {
   355  			return fmt.Errorf(
   356  				"Instance %s has an unexpected number of roles: %d", dpmt.Name, len(dpmt.RoleList))
   357  		}
   358  
   359  		if dpmt.RoleList[0].RoleSize != "Basic_A2" {
   360  			return fmt.Errorf("Bad size: %s", dpmt.RoleList[0].RoleSize)
   361  		}
   362  
   363  		for _, c := range dpmt.RoleList[0].ConfigurationSets {
   364  			if c.ConfigurationSetType == virtualmachine.ConfigurationSetTypeNetwork {
   365  				if len(c.InputEndpoints) != 2 {
   366  					return fmt.Errorf(
   367  						"Instance %s has an unexpected number of endpoints %d",
   368  						dpmt.Name, len(c.InputEndpoints))
   369  				}
   370  
   371  				if c.InputEndpoints[1].Name != "WINRM" {
   372  					return fmt.Errorf("Bad endpoint name: %s", c.InputEndpoints[1].Name)
   373  				}
   374  
   375  				if c.InputEndpoints[1].Port != 5985 {
   376  					return fmt.Errorf("Bad endpoint port: %d", c.InputEndpoints[1].Port)
   377  				}
   378  
   379  				if len(c.SubnetNames) != 1 {
   380  					return fmt.Errorf(
   381  						"Instance %s has an unexpected number of associated subnets %d",
   382  						dpmt.Name, len(c.SubnetNames))
   383  				}
   384  
   385  				if c.SubnetNames[0] != "subnet1" {
   386  					return fmt.Errorf("Bad subnet: %s", c.SubnetNames[0])
   387  				}
   388  
   389  				if c.NetworkSecurityGroup != "terraform-security-update-group2" {
   390  					return fmt.Errorf("Bad security group: %s", c.NetworkSecurityGroup)
   391  				}
   392  			}
   393  		}
   394  
   395  		return nil
   396  	}
   397  }
   398  
   399  func testAccCheckAzureInstanceDestroyed(hostedServiceName string) resource.TestCheckFunc {
   400  	return func(s *terraform.State) error {
   401  		hostedServiceClient := testAccProvider.Meta().(*Client).hostedServiceClient
   402  
   403  		for _, rs := range s.RootModule().Resources {
   404  			if rs.Type != "azure_instance" {
   405  				continue
   406  			}
   407  
   408  			if rs.Primary.ID == "" {
   409  				return fmt.Errorf("No instance ID is set")
   410  			}
   411  
   412  			// if not hosted service was provided; it means that we expect it
   413  			// to be identical with the name of the instance; which is in the ID.
   414  			var serviceName string
   415  			if hostedServiceName == "" {
   416  				serviceName = rs.Primary.ID
   417  			} else {
   418  				serviceName = hostedServiceName
   419  			}
   420  
   421  			_, err := hostedServiceClient.GetHostedService(serviceName)
   422  			if err == nil {
   423  				return fmt.Errorf("Instance %s still exists", rs.Primary.ID)
   424  			}
   425  
   426  			if !management.IsResourceNotFoundError(err) {
   427  				return err
   428  			}
   429  		}
   430  
   431  		return nil
   432  	}
   433  }
   434  
   435  var testAccAzureInstance_basic = fmt.Sprintf(`
   436  resource "azure_instance" "foo" {
   437      name = "%s"
   438      image = "Ubuntu Server 14.04 LTS"
   439      size = "Basic_A1"
   440      storage_service_name = "%s"
   441      location = "West US"
   442      username = "terraform"
   443      password = "Pass!admin123"
   444      custom_data = "# Hello world"
   445  
   446      endpoint {
   447          name = "SSH"
   448          protocol = "tcp"
   449          public_port = 22
   450          private_port = 22
   451      }
   452  }`, instanceName, testAccStorageServiceName)
   453  
   454  var testAccAzureInstance_separateHostedService = `
   455  resource "azure_hosted_service" "foo" {
   456      name = "%s"
   457      location = "West US"
   458      ephemeral_contents = true
   459  }
   460  
   461  resource "azure_instance" "foo" {
   462      name = "%s"
   463      hosted_service_name = "${azure_hosted_service.foo.name}"
   464      image = "Ubuntu Server 14.04 LTS"
   465      size = "Basic_A1"
   466      storage_service_name = "%s"
   467      location = "West US"
   468      username = "terraform"
   469      password = "Pass!admin123"
   470  
   471      endpoint {
   472          name = "SSH"
   473          protocol = "tcp"
   474          public_port = 22
   475          private_port = 22
   476      }
   477  }`
   478  
   479  var testAccAzureInstance_advanced = fmt.Sprintf(`
   480  resource "azure_virtual_network" "foo" {
   481      name = "terraform-vnet-advanced-test"
   482      address_space = ["10.1.2.0/24"]
   483          location = "West US"
   484  
   485          subnet {
   486          name = "subnet1"
   487                  address_prefix = "10.1.2.0/25"
   488          }
   489  
   490          subnet {
   491          name = "subnet2"
   492                  address_prefix = "10.1.2.128/25"
   493      }
   494  }
   495  
   496  resource "azure_security_group" "foo" {
   497      name = "terraform-security-group1"
   498      location = "West US"
   499  }
   500  
   501  resource "azure_security_group_rule" "foo" {
   502      name = "rdp"
   503      security_group_names = ["${azure_security_group.foo.name}"]
   504      priority = 101
   505      source_address_prefix = "*"
   506      source_port_range = "*"
   507      destination_address_prefix = "*"
   508      destination_port_range = "3389"
   509      action = "Deny"
   510      type = "Inbound"
   511      protocol = "TCP"
   512  }
   513  
   514  resource "azure_instance" "foo" {
   515      name = "terraform-test1"
   516      image = "Windows Server 2012 R2 Datacenter, January 2016"
   517      size = "Basic_A1"
   518      storage_service_name = "%s"
   519      location = "West US"
   520      time_zone = "America/Los_Angeles"
   521      subnet = "subnet1"
   522      virtual_network = "${azure_virtual_network.foo.name}"
   523      security_group = "${azure_security_group.foo.name}"
   524      username = "terraform"
   525      password = "Pass!admin123"
   526      custom_data = "IyBIZWxsbyB3b3JsZA=="
   527  
   528      endpoint {
   529          name = "RDP"
   530          protocol = "tcp"
   531          public_port = 3389
   532          private_port = 3389
   533      }
   534  }`, testAccStorageServiceName)
   535  
   536  var testAccAzureInstance_update = fmt.Sprintf(`
   537  resource "azure_virtual_network" "foo" {
   538      name = "terraform-vnet-update-test"
   539      address_space = ["10.1.2.0/24"]
   540      location = "West US"
   541  
   542      subnet {
   543          name = "subnet1"
   544          address_prefix = "10.1.2.0/25"
   545      }
   546  
   547      subnet {
   548          name = "subnet2"
   549          address_prefix = "10.1.2.128/25"
   550      }
   551  }
   552  
   553  resource "azure_security_group" "foo" {
   554      name = "terraform-security-group1"
   555      location = "West US"
   556  }
   557  
   558  resource "azure_security_group_rule" "foo" {
   559      name = "rdp"
   560      security_group_names = ["${azure_security_group.foo.name}"]
   561      priority = 101
   562      source_address_prefix = "*"
   563      source_port_range = "*"
   564      destination_address_prefix = "*"
   565      destination_port_range = "3389"
   566      type = "Inbound"
   567      action = "Deny"
   568      protocol = "TCP"
   569  }
   570  
   571  resource "azure_security_group" "bar" {
   572      name = "terraform-security-update-group2"
   573      location = "West US"
   574  }
   575  
   576  resource "azure_security_group_rule" "bar" {
   577      name = "rdp"
   578      security_group_names = ["${azure_security_group.bar.name}"]
   579      priority = 101
   580      source_address_prefix = "192.168.0.0/24"
   581      source_port_range = "*"
   582      destination_address_prefix = "*"
   583      destination_port_range = "3389"
   584      type = "Inbound"
   585      action = "Deny"
   586      protocol = "TCP"
   587  }
   588  
   589  resource "azure_instance" "foo" {
   590      name = "terraform-test1"
   591      image = "Windows Server 2012 R2 Datacenter, January 2016"
   592      size = "Basic_A2"
   593      storage_service_name = "%s"
   594      location = "West US"
   595      time_zone = "America/Los_Angeles"
   596      subnet = "subnet1"
   597      virtual_network = "${azure_virtual_network.foo.name}"
   598      security_group = "${azure_security_group.bar.name}"
   599      username = "terraform"
   600      password = "Pass!admin123"
   601  
   602      endpoint {
   603          name = "RDP"
   604          protocol = "tcp"
   605          public_port = 3389
   606          private_port = 3389
   607      }
   608  
   609      endpoint {
   610          name = "WINRM"
   611          protocol = "tcp"
   612          public_port = 5985
   613          private_port = 5985
   614      }
   615  }`, testAccStorageServiceName)