terraform/builtin/providers/aws/resource_aws_db_security_gr...

155 lines
3.7 KiB
Go
Raw Normal View History

2014-07-23 04:22:52 +02:00
package aws
import (
"fmt"
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/aws/awserr"
"github.com/aws/aws-sdk-go/service/rds"
2014-07-23 04:22:52 +02:00
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
)
func TestAccAWSDBSecurityGroup_basic(t *testing.T) {
2014-07-23 04:22:52 +02:00
var v rds.DBSecurityGroup
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSDBSecurityGroupDestroy,
Steps: []resource.TestStep{
resource.TestStep{
Config: testAccAWSDBSecurityGroupConfig,
Check: resource.ComposeTestCheckFunc(
testAccCheckAWSDBSecurityGroupExists("aws_db_security_group.bar", &v),
testAccCheckAWSDBSecurityGroupAttributes(&v),
resource.TestCheckResourceAttr(
"aws_db_security_group.bar", "name", "secgroup-terraform"),
resource.TestCheckResourceAttr(
"aws_db_security_group.bar", "description", "Managed by Terraform"),
2014-07-23 04:22:52 +02:00
resource.TestCheckResourceAttr(
"aws_db_security_group.bar", "ingress.3363517775.cidr", "10.0.0.1/24"),
2014-07-23 04:22:52 +02:00
resource.TestCheckResourceAttr(
"aws_db_security_group.bar", "ingress.#", "1"),
resource.TestCheckResourceAttr(
"aws_db_security_group.bar", "tags.%", "1"),
2014-07-23 04:22:52 +02:00
),
},
},
})
}
func testAccCheckAWSDBSecurityGroupDestroy(s *terraform.State) error {
conn := testAccProvider.Meta().(*AWSClient).rdsconn
2014-07-23 04:22:52 +02:00
2014-09-17 02:44:42 +02:00
for _, rs := range s.RootModule().Resources {
2014-07-23 04:22:52 +02:00
if rs.Type != "aws_db_security_group" {
continue
}
// Try to find the Group
resp, err := conn.DescribeDBSecurityGroups(
2015-04-15 22:02:52 +02:00
&rds.DescribeDBSecurityGroupsInput{
DBSecurityGroupName: aws.String(rs.Primary.ID),
2014-07-23 04:22:52 +02:00
})
if err == nil {
if len(resp.DBSecurityGroups) != 0 &&
*resp.DBSecurityGroups[0].DBSecurityGroupName == rs.Primary.ID {
2014-07-23 04:22:52 +02:00
return fmt.Errorf("DB Security Group still exists")
}
}
// Verify the error
newerr, ok := err.(awserr.Error)
2014-07-23 04:22:52 +02:00
if !ok {
return err
}
if newerr.Code() != "DBSecurityGroupNotFound" {
2014-07-23 04:22:52 +02:00
return err
}
}
return nil
}
func testAccCheckAWSDBSecurityGroupAttributes(group *rds.DBSecurityGroup) resource.TestCheckFunc {
return func(s *terraform.State) error {
if len(group.IPRanges) == 0 {
return fmt.Errorf("no cidr: %#v", group.IPRanges)
2014-07-23 04:22:52 +02:00
}
if *group.IPRanges[0].CIDRIP != "10.0.0.1/24" {
return fmt.Errorf("bad cidr: %#v", group.IPRanges)
2014-07-23 04:22:52 +02:00
}
statuses := make([]string, 0, len(group.IPRanges))
for _, ips := range group.IPRanges {
statuses = append(statuses, *ips.Status)
}
if statuses[0] != "authorized" {
return fmt.Errorf("bad status: %#v", statuses)
2014-07-23 04:22:52 +02:00
}
if *group.DBSecurityGroupName != "secgroup-terraform" {
return fmt.Errorf("bad name: %#v", *group.DBSecurityGroupName)
2014-07-23 04:22:52 +02:00
}
return nil
}
}
func testAccCheckAWSDBSecurityGroupExists(n string, v *rds.DBSecurityGroup) resource.TestCheckFunc {
return func(s *terraform.State) error {
2014-09-17 02:44:42 +02:00
rs, ok := s.RootModule().Resources[n]
2014-07-23 04:22:52 +02:00
if !ok {
return fmt.Errorf("Not found: %s", n)
}
2014-09-17 02:44:42 +02:00
if rs.Primary.ID == "" {
2014-07-23 04:22:52 +02:00
return fmt.Errorf("No DB Security Group ID is set")
}
conn := testAccProvider.Meta().(*AWSClient).rdsconn
2014-07-23 04:22:52 +02:00
2015-04-15 22:02:52 +02:00
opts := rds.DescribeDBSecurityGroupsInput{
DBSecurityGroupName: aws.String(rs.Primary.ID),
2014-07-23 04:22:52 +02:00
}
resp, err := conn.DescribeDBSecurityGroups(&opts)
if err != nil {
return err
}
if len(resp.DBSecurityGroups) != 1 ||
*resp.DBSecurityGroups[0].DBSecurityGroupName != rs.Primary.ID {
2014-07-23 04:22:52 +02:00
return fmt.Errorf("DB Security Group not found")
}
2015-04-15 22:02:52 +02:00
*v = *resp.DBSecurityGroups[0]
2014-07-23 04:22:52 +02:00
return nil
}
}
const testAccAWSDBSecurityGroupConfig = `
provider "aws" {
region = "us-east-1"
}
2014-07-23 04:22:52 +02:00
resource "aws_db_security_group" "bar" {
name = "secgroup-terraform"
ingress {
cidr = "10.0.0.1/24"
}
tags {
foo = "bar"
}
2014-07-23 04:22:52 +02:00
}
`