package openstack import ( "fmt" "regexp" "testing" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" "github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/lbaas_v2/loadbalancers" "github.com/gophercloud/gophercloud/openstack/networking/v2/extensions/security/groups" "github.com/gophercloud/gophercloud/openstack/networking/v2/ports" ) func TestAccLBV2LoadBalancer_basic(t *testing.T) { var lb loadbalancers.LoadBalancer resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckLBV2LoadBalancerDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccLBV2LoadBalancerConfig_basic, Check: resource.ComposeTestCheckFunc( testAccCheckLBV2LoadBalancerExists("openstack_lb_loadbalancer_v2.loadbalancer_1", &lb), ), }, resource.TestStep{ Config: testAccLBV2LoadBalancerConfig_update, Check: resource.ComposeTestCheckFunc( resource.TestCheckResourceAttr( "openstack_lb_loadbalancer_v2.loadbalancer_1", "name", "loadbalancer_1_updated"), resource.TestMatchResourceAttr( "openstack_lb_loadbalancer_v2.loadbalancer_1", "vip_port_id", regexp.MustCompile("^[a-f0-9-]+")), ), }, }, }) } func TestAccLBV2LoadBalancer_secGroup(t *testing.T) { var lb loadbalancers.LoadBalancer var sg_1, sg_2 groups.SecGroup resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckLBV2LoadBalancerDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccLBV2LoadBalancer_secGroup, Check: resource.ComposeTestCheckFunc( testAccCheckLBV2LoadBalancerExists( "openstack_lb_loadbalancer_v2.loadbalancer_1", &lb), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_1", &sg_1), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_1", &sg_2), resource.TestCheckResourceAttr( "openstack_lb_loadbalancer_v2.loadbalancer_1", "security_group_ids.#", "1"), testAccCheckLBV2LoadBalancerHasSecGroup(&lb, &sg_1), ), }, resource.TestStep{ Config: testAccLBV2LoadBalancer_secGroup_update1, Check: resource.ComposeTestCheckFunc( testAccCheckLBV2LoadBalancerExists( "openstack_lb_loadbalancer_v2.loadbalancer_1", &lb), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_2", &sg_1), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_2", &sg_2), resource.TestCheckResourceAttr( "openstack_lb_loadbalancer_v2.loadbalancer_1", "security_group_ids.#", "2"), testAccCheckLBV2LoadBalancerHasSecGroup(&lb, &sg_1), testAccCheckLBV2LoadBalancerHasSecGroup(&lb, &sg_2), ), }, resource.TestStep{ Config: testAccLBV2LoadBalancer_secGroup_update2, Check: resource.ComposeTestCheckFunc( testAccCheckLBV2LoadBalancerExists( "openstack_lb_loadbalancer_v2.loadbalancer_1", &lb), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_2", &sg_1), testAccCheckNetworkingV2SecGroupExists( "openstack_networking_secgroup_v2.secgroup_2", &sg_2), resource.TestCheckResourceAttr( "openstack_lb_loadbalancer_v2.loadbalancer_1", "security_group_ids.#", "1"), testAccCheckLBV2LoadBalancerHasSecGroup(&lb, &sg_2), ), }, }, }) } func testAccCheckLBV2LoadBalancerDestroy(s *terraform.State) error { config := testAccProvider.Meta().(*Config) networkingClient, err := config.networkingV2Client(OS_REGION_NAME) if err != nil { return fmt.Errorf("Error creating OpenStack networking client: %s", err) } for _, rs := range s.RootModule().Resources { if rs.Type != "openstack_lb_loadbalancer_v2" { continue } _, err := loadbalancers.Get(networkingClient, rs.Primary.ID).Extract() if err == nil { return fmt.Errorf("LoadBalancer still exists: %s", rs.Primary.ID) } } return nil } func testAccCheckLBV2LoadBalancerExists( n string, lb *loadbalancers.LoadBalancer) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No ID is set") } config := testAccProvider.Meta().(*Config) networkingClient, err := config.networkingV2Client(OS_REGION_NAME) if err != nil { return fmt.Errorf("Error creating OpenStack networking client: %s", err) } found, err := loadbalancers.Get(networkingClient, rs.Primary.ID).Extract() if err != nil { return err } if found.ID != rs.Primary.ID { return fmt.Errorf("Member not found") } *lb = *found return nil } } func testAccCheckLBV2LoadBalancerHasSecGroup( lb *loadbalancers.LoadBalancer, sg *groups.SecGroup) resource.TestCheckFunc { return func(s *terraform.State) error { config := testAccProvider.Meta().(*Config) networkingClient, err := config.networkingV2Client(OS_REGION_NAME) if err != nil { return fmt.Errorf("Error creating OpenStack networking client: %s", err) } port, err := ports.Get(networkingClient, lb.VipPortID).Extract() if err != nil { return err } for _, p := range port.SecurityGroups { if p == sg.ID { return nil } } return fmt.Errorf("LoadBalancer does not have the security group") } } const testAccLBV2LoadBalancerConfig_basic = ` resource "openstack_networking_network_v2" "network_1" { name = "network_1" admin_state_up = "true" } resource "openstack_networking_subnet_v2" "subnet_1" { name = "subnet_1" cidr = "192.168.199.0/24" ip_version = 4 network_id = "${openstack_networking_network_v2.network_1.id}" } resource "openstack_lb_loadbalancer_v2" "loadbalancer_1" { name = "loadbalancer_1" loadbalancer_provider = "haproxy" vip_subnet_id = "${openstack_networking_subnet_v2.subnet_1.id}" } ` const testAccLBV2LoadBalancerConfig_update = ` resource "openstack_networking_network_v2" "network_1" { name = "network_1" admin_state_up = "true" } resource "openstack_networking_subnet_v2" "subnet_1" { name = "subnet_1" cidr = "192.168.199.0/24" ip_version = 4 network_id = "${openstack_networking_network_v2.network_1.id}" } resource "openstack_lb_loadbalancer_v2" "loadbalancer_1" { name = "loadbalancer_1_updated" loadbalancer_provider = "haproxy" admin_state_up = "true" vip_subnet_id = "${openstack_networking_subnet_v2.subnet_1.id}" } ` const testAccLBV2LoadBalancer_secGroup = ` resource "openstack_networking_secgroup_v2" "secgroup_1" { name = "secgroup_1" description = "secgroup_1" } resource "openstack_networking_secgroup_v2" "secgroup_2" { name = "secgroup_2" description = "secgroup_2" } resource "openstack_networking_network_v2" "network_1" { name = "network_1" admin_state_up = "true" } resource "openstack_networking_subnet_v2" "subnet_1" { name = "subnet_1" network_id = "${openstack_networking_network_v2.network_1.id}" cidr = "192.168.199.0/24" } resource "openstack_lb_loadbalancer_v2" "loadbalancer_1" { name = "loadbalancer_1" vip_subnet_id = "${openstack_networking_subnet_v2.subnet_1.id}" security_group_ids = [ "${openstack_networking_secgroup_v2.secgroup_1.id}" ] } ` const testAccLBV2LoadBalancer_secGroup_update1 = ` resource "openstack_networking_secgroup_v2" "secgroup_1" { name = "secgroup_1" description = "secgroup_1" } resource "openstack_networking_secgroup_v2" "secgroup_2" { name = "secgroup_2" description = "secgroup_2" } resource "openstack_networking_network_v2" "network_1" { name = "network_1" admin_state_up = "true" } resource "openstack_networking_subnet_v2" "subnet_1" { name = "subnet_1" network_id = "${openstack_networking_network_v2.network_1.id}" cidr = "192.168.199.0/24" } resource "openstack_lb_loadbalancer_v2" "loadbalancer_1" { name = "loadbalancer_1" vip_subnet_id = "${openstack_networking_subnet_v2.subnet_1.id}" security_group_ids = [ "${openstack_networking_secgroup_v2.secgroup_1.id}", "${openstack_networking_secgroup_v2.secgroup_2.id}" ] } ` const testAccLBV2LoadBalancer_secGroup_update2 = ` resource "openstack_networking_secgroup_v2" "secgroup_1" { name = "secgroup_1" description = "secgroup_1" } resource "openstack_networking_secgroup_v2" "secgroup_2" { name = "secgroup_2" description = "secgroup_2" } resource "openstack_networking_network_v2" "network_1" { name = "network_1" admin_state_up = "true" } resource "openstack_networking_subnet_v2" "subnet_1" { name = "subnet_1" network_id = "${openstack_networking_network_v2.network_1.id}" cidr = "192.168.199.0/24" } resource "openstack_lb_loadbalancer_v2" "loadbalancer_1" { name = "loadbalancer_1" vip_subnet_id = "${openstack_networking_subnet_v2.subnet_1.id}" security_group_ids = [ "${openstack_networking_secgroup_v2.secgroup_2.id}" ] depends_on = ["openstack_networking_secgroup_v2.secgroup_1"] } `