package aws import ( "fmt" "strings" "testing" "regexp" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/iam" "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSRole_basic(t *testing.T) { var conf iam.GetRoleOutput rName := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSRoleDestroy, Steps: []resource.TestStep{ { Config: testAccAWSRoleConfig(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role", &conf), resource.TestCheckResourceAttr("aws_iam_role.role", "path", "/"), resource.TestCheckResourceAttrSet("aws_iam_role.role", "create_date"), ), }, }, }) } func TestAccAWSRole_basicWithDescription(t *testing.T) { var conf iam.GetRoleOutput rName := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSRoleDestroy, Steps: []resource.TestStep{ { Config: testAccAWSRoleConfigWithDescription(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role", &conf), resource.TestCheckResourceAttr("aws_iam_role.role", "path", "/"), resource.TestCheckResourceAttr("aws_iam_role.role", "description", "This 1s a D3scr!pti0n with weird content: &@90ë“‘{«¡Çø}"), ), }, { Config: testAccAWSRoleConfigWithUpdatedDescription(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role", &conf), resource.TestCheckResourceAttr("aws_iam_role.role", "path", "/"), resource.TestCheckResourceAttr("aws_iam_role.role", "description", "This 1s an Upd@ted D3scr!pti0n with weird content: &90ë“‘{«¡Çø}"), ), }, { Config: testAccAWSRoleConfig(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role", &conf), resource.TestCheckResourceAttrSet("aws_iam_role.role", "create_date"), resource.TestCheckResourceAttr("aws_iam_role.role", "description", ""), ), }, }, }) } func TestAccAWSRole_namePrefix(t *testing.T) { var conf iam.GetRoleOutput rName := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_iam_role.role", IDRefreshIgnore: []string{"name_prefix"}, Providers: testAccProviders, CheckDestroy: testAccCheckAWSRoleDestroy, Steps: []resource.TestStep{ { Config: testAccAWSRolePrefixNameConfig(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role", &conf), testAccCheckAWSRoleGeneratedNamePrefix( "aws_iam_role.role", "test-role-"), ), }, }, }) } func TestAccAWSRole_testNameChange(t *testing.T) { var conf iam.GetRoleOutput rName := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSRoleDestroy, Steps: []resource.TestStep{ { Config: testAccAWSRolePre(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role_update_test", &conf), ), }, { Config: testAccAWSRolePost(rName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSRoleExists("aws_iam_role.role_update_test", &conf), ), }, }, }) } func TestAccAWSRole_badJSON(t *testing.T) { rName := acctest.RandString(10) resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSRoleDestroy, Steps: []resource.TestStep{ { Config: testAccAWSRoleConfig_badJson(rName), ExpectError: regexp.MustCompile(`.*contains an invalid JSON:.*`), }, }, }) } func testAccCheckAWSRoleDestroy(s *terraform.State) error { iamconn := testAccProvider.Meta().(*AWSClient).iamconn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_iam_role" { continue } // Try to get role _, err := iamconn.GetRole(&iam.GetRoleInput{ RoleName: aws.String(rs.Primary.ID), }) if err == nil { return fmt.Errorf("still exist.") } // Verify the error is what we want ec2err, ok := err.(awserr.Error) if !ok { return err } if ec2err.Code() != "NoSuchEntity" { return err } } return nil } func testAccCheckAWSRoleExists(n string, res *iam.GetRoleOutput) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No Role name is set") } iamconn := testAccProvider.Meta().(*AWSClient).iamconn resp, err := iamconn.GetRole(&iam.GetRoleInput{ RoleName: aws.String(rs.Primary.ID), }) if err != nil { return err } *res = *resp return nil } } func testAccCheckAWSRoleGeneratedNamePrefix(resource, prefix string) resource.TestCheckFunc { return func(s *terraform.State) error { r, ok := s.RootModule().Resources[resource] if !ok { return fmt.Errorf("Resource not found") } name, ok := r.Primary.Attributes["name"] if !ok { return fmt.Errorf("Name attr not found: %#v", r.Primary.Attributes) } if !strings.HasPrefix(name, prefix) { return fmt.Errorf("Name: %q, does not have prefix: %q", name, prefix) } return nil } } func testAccAWSRoleConfig(rName string) string { return fmt.Sprintf(` resource "aws_iam_role" "role" { name = "test-role-%s" path = "/" assume_role_policy = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}" } `, rName) } func testAccAWSRoleConfigWithDescription(rName string) string { return fmt.Sprintf(` resource "aws_iam_role" "role" { name = "test-role-%s" description = "This 1s a D3scr!pti0n with weird content: &@90ë“‘{«¡Çø}" path = "/" assume_role_policy = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}" } `, rName) } func testAccAWSRoleConfigWithUpdatedDescription(rName string) string { return fmt.Sprintf(` resource "aws_iam_role" "role" { name = "test-role-%s" description = "This 1s an Upd@ted D3scr!pti0n with weird content: &90ë“‘{«¡Çø}" path = "/" assume_role_policy = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}" } `, rName) } func testAccAWSRolePrefixNameConfig(rName string) string { return fmt.Sprintf(` resource "aws_iam_role" "role" { name_prefix = "test-role-%s" path = "/" assume_role_policy = "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"Service\":[\"ec2.amazonaws.com\"]},\"Action\":[\"sts:AssumeRole\"]}]}" } `, rName) } func testAccAWSRolePre(rName string) string { return fmt.Sprintf(` resource "aws_iam_role" "role_update_test" { name = "tf_old_name_%s" path = "/test/" assume_role_policy = <