package aws import ( "fmt" "math/rand" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/cloudformation" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSCloudFormation_basic(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.network", &stack), ), }, }, }) } func TestAccAWSCloudFormation_yaml(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_yaml, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.yaml", &stack), ), }, }, }) } func TestAccAWSCloudFormation_defaultParams(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_defaultParams, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.asg-demo", &stack), ), }, }, }) } func TestAccAWSCloudFormation_allAttributes(t *testing.T) { var stack cloudformation.Stack expectedPolicyBody := "{\"Statement\":[{\"Action\":\"Update:*\",\"Effect\":\"Deny\",\"Principal\":\"*\",\"Resource\":\"LogicalResourceId/StaticVPC\"},{\"Action\":\"Update:*\",\"Effect\":\"Allow\",\"Principal\":\"*\",\"Resource\":\"*\"}]}" resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_allAttributesWithBodies, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.full", &stack), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "name", "tf-full-stack"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "capabilities.#", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "capabilities.1328347040", "CAPABILITY_IAM"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "disable_rollback", "false"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "notification_arns.#", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "parameters.%", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "parameters.VpcCIDR", "10.0.0.0/16"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "policy_body", expectedPolicyBody), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.%", "2"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.First", "Mickey"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.Second", "Mouse"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "timeout_in_minutes", "10"), ), }, resource.TestStep{ Config: testAccAWSCloudFormationConfig_allAttributesWithBodies_modified, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.full", &stack), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "name", "tf-full-stack"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "capabilities.#", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "capabilities.1328347040", "CAPABILITY_IAM"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "disable_rollback", "false"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "notification_arns.#", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "parameters.%", "1"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "parameters.VpcCIDR", "10.0.0.0/16"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "policy_body", expectedPolicyBody), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.%", "2"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.First", "Mickey"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "tags.Second", "Mouse"), resource.TestCheckResourceAttr("aws_cloudformation_stack.full", "timeout_in_minutes", "10"), ), }, }, }) } // Regression for https://github.com/hashicorp/terraform/issues/4332 func TestAccAWSCloudFormation_withParams(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_withParams, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.with_params", &stack), ), }, resource.TestStep{ Config: testAccAWSCloudFormationConfig_withParams_modified, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.with_params", &stack), ), }, }, }) } // Regression for https://github.com/hashicorp/terraform/issues/4534 func TestAccAWSCloudFormation_withUrl_withParams(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_templateUrl_withParams, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.with-url-and-params", &stack), ), }, resource.TestStep{ Config: testAccAWSCloudFormationConfig_templateUrl_withParams_modified, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.with-url-and-params", &stack), ), }, }, }) } func TestAccAWSCloudFormation_withUrl_withParams_withYaml(t *testing.T) { var stack cloudformation.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSCloudFormationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSCloudFormationConfig_templateUrl_withParams_withYaml, Check: resource.ComposeTestCheckFunc( testAccCheckCloudFormationStackExists("aws_cloudformation_stack.with-url-and-params-and-yaml", &stack), ), }, }, }) } func testAccCheckCloudFormationStackExists(n string, stack *cloudformation.Stack) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } conn := testAccProvider.Meta().(*AWSClient).cfconn params := &cloudformation.DescribeStacksInput{ StackName: aws.String(rs.Primary.ID), } resp, err := conn.DescribeStacks(params) if err != nil { return err } if len(resp.Stacks) == 0 { return fmt.Errorf("CloudFormation stack not found") } return nil } } func testAccCheckAWSCloudFormationDestroy(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).cfconn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_cloudformation_stack" { continue } params := cloudformation.DescribeStacksInput{ StackName: aws.String(rs.Primary.ID), } resp, err := conn.DescribeStacks(¶ms) if err != nil { return err } for _, s := range resp.Stacks { if *s.StackId == rs.Primary.ID && *s.StackStatus != "DELETE_COMPLETE" { return fmt.Errorf("CloudFormation stack still exists: %q", rs.Primary.ID) } } } return nil } var testAccAWSCloudFormationConfig = ` resource "aws_cloudformation_stack" "network" { name = "tf-networking-stack" template_body = <