package aws import ( "fmt" "math/rand" "strings" "testing" "time" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/autoscaling" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSLaunchConfiguration_basic(t *testing.T) { var conf autoscaling.LaunchConfiguration resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSLaunchConfigurationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSLaunchConfigurationNoNameConfig, Check: resource.ComposeTestCheckFunc( testAccCheckAWSLaunchConfigurationExists("aws_launch_configuration.bar", &conf), testAccCheckAWSLaunchConfigurationGeneratedNamePrefix( "aws_launch_configuration.bar", "terraform-"), ), }, resource.TestStep{ Config: testAccAWSLaunchConfigurationPrefixNameConfig, Check: resource.ComposeTestCheckFunc( testAccCheckAWSLaunchConfigurationExists("aws_launch_configuration.baz", &conf), testAccCheckAWSLaunchConfigurationGeneratedNamePrefix( "aws_launch_configuration.baz", "baz-"), ), }, }, }) } func TestAccAWSLaunchConfiguration_withBlockDevices(t *testing.T) { var conf autoscaling.LaunchConfiguration resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSLaunchConfigurationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSLaunchConfigurationConfig, Check: resource.ComposeTestCheckFunc( testAccCheckAWSLaunchConfigurationExists("aws_launch_configuration.bar", &conf), testAccCheckAWSLaunchConfigurationAttributes(&conf), resource.TestCheckResourceAttr( "aws_launch_configuration.bar", "image_id", "ami-21f78e11"), resource.TestCheckResourceAttr( "aws_launch_configuration.bar", "instance_type", "m1.small"), resource.TestCheckResourceAttr( "aws_launch_configuration.bar", "associate_public_ip_address", "true"), resource.TestCheckResourceAttr( "aws_launch_configuration.bar", "spot_price", ""), ), }, }, }) } func TestAccAWSLaunchConfiguration_withSpotPrice(t *testing.T) { var conf autoscaling.LaunchConfiguration resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSLaunchConfigurationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSLaunchConfigurationWithSpotPriceConfig, Check: resource.ComposeTestCheckFunc( testAccCheckAWSLaunchConfigurationExists("aws_launch_configuration.bar", &conf), resource.TestCheckResourceAttr( "aws_launch_configuration.bar", "spot_price", "0.01"), ), }, }, }) } func testAccCheckAWSLaunchConfigurationWithEncryption(conf *autoscaling.LaunchConfiguration) resource.TestCheckFunc { return func(s *terraform.State) error { // Map out the block devices by name, which should be unique. blockDevices := make(map[string]*autoscaling.BlockDeviceMapping) for _, blockDevice := range conf.BlockDeviceMappings { blockDevices[*blockDevice.DeviceName] = blockDevice } // Check if the root block device exists. if _, ok := blockDevices["/dev/sda1"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sda1") } else if blockDevices["/dev/sda1"].Ebs.Encrypted != nil { return fmt.Errorf("root device should not include value for Encrypted") } // Check if the secondary block device exists. if _, ok := blockDevices["/dev/sdb"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sdb") } else if !*blockDevices["/dev/sdb"].Ebs.Encrypted { return fmt.Errorf("block device isn't encrypted as expected: /dev/sdb") } return nil } } func TestAccAWSLaunchConfiguration_withEncryption(t *testing.T) { var conf autoscaling.LaunchConfiguration resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAWSLaunchConfigurationDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAWSLaunchConfigurationWithEncryption, Check: resource.ComposeTestCheckFunc( testAccCheckAWSLaunchConfigurationExists("aws_launch_configuration.baz", &conf), testAccCheckAWSLaunchConfigurationWithEncryption(&conf), ), }, }, }) } func testAccCheckAWSLaunchConfigurationGeneratedNamePrefix( resource, prefix string) resource.TestCheckFunc { return func(s *terraform.State) error { r, ok := s.RootModule().Resources[resource] if !ok { return fmt.Errorf("Resource not found") } name, ok := r.Primary.Attributes["name"] if !ok { return fmt.Errorf("Name attr not found: %#v", r.Primary.Attributes) } if !strings.HasPrefix(name, prefix) { return fmt.Errorf("Name: %q, does not have prefix: %q", name, prefix) } return nil } } func testAccCheckAWSLaunchConfigurationDestroy(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).autoscalingconn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_launch_configuration" { continue } describe, err := conn.DescribeLaunchConfigurations( &autoscaling.DescribeLaunchConfigurationsInput{ LaunchConfigurationNames: []*string{aws.String(rs.Primary.ID)}, }) if err == nil { if len(describe.LaunchConfigurations) != 0 && *describe.LaunchConfigurations[0].LaunchConfigurationName == rs.Primary.ID { return fmt.Errorf("Launch Configuration still exists") } } // Verify the error providerErr, ok := err.(awserr.Error) if !ok { return err } if providerErr.Code() != "InvalidLaunchConfiguration.NotFound" { return err } } return nil } func testAccCheckAWSLaunchConfigurationAttributes(conf *autoscaling.LaunchConfiguration) resource.TestCheckFunc { return func(s *terraform.State) error { if *conf.ImageId != "ami-21f78e11" { return fmt.Errorf("Bad image_id: %s", *conf.ImageId) } if !strings.HasPrefix(*conf.LaunchConfigurationName, "terraform-") { return fmt.Errorf("Bad name: %s", *conf.LaunchConfigurationName) } if *conf.InstanceType != "m1.small" { return fmt.Errorf("Bad instance_type: %s", *conf.InstanceType) } // Map out the block devices by name, which should be unique. blockDevices := make(map[string]*autoscaling.BlockDeviceMapping) for _, blockDevice := range conf.BlockDeviceMappings { blockDevices[*blockDevice.DeviceName] = blockDevice } // Check if the root block device exists. if _, ok := blockDevices["/dev/sda1"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sda1") } // Check if the secondary block device exists. if _, ok := blockDevices["/dev/sdb"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sdb") } // Check if the third block device exists. if _, ok := blockDevices["/dev/sdc"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sdc") } // Check if the secondary block device exists. if _, ok := blockDevices["/dev/sdb"]; !ok { return fmt.Errorf("block device doesn't exist: /dev/sdb") } return nil } } func testAccCheckAWSLaunchConfigurationExists(n string, res *autoscaling.LaunchConfiguration) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No Launch Configuration ID is set") } conn := testAccProvider.Meta().(*AWSClient).autoscalingconn describeOpts := autoscaling.DescribeLaunchConfigurationsInput{ LaunchConfigurationNames: []*string{aws.String(rs.Primary.ID)}, } describe, err := conn.DescribeLaunchConfigurations(&describeOpts) if err != nil { return err } if len(describe.LaunchConfigurations) != 1 || *describe.LaunchConfigurations[0].LaunchConfigurationName != rs.Primary.ID { return fmt.Errorf("Launch Configuration Group not found") } *res = *describe.LaunchConfigurations[0] return nil } } var testAccAWSLaunchConfigurationConfig = fmt.Sprintf(` resource "aws_launch_configuration" "bar" { name = "terraform-test-%d" image_id = "ami-21f78e11" instance_type = "m1.small" user_data = "foobar-user-data" associate_public_ip_address = true root_block_device { volume_type = "gp2" volume_size = 11 } ebs_block_device { device_name = "/dev/sdb" volume_size = 9 } ebs_block_device { device_name = "/dev/sdc" volume_size = 10 volume_type = "io1" iops = 100 } ephemeral_block_device { device_name = "/dev/sde" virtual_name = "ephemeral0" } } `, rand.New(rand.NewSource(time.Now().UnixNano())).Int()) var testAccAWSLaunchConfigurationWithSpotPriceConfig = fmt.Sprintf(` resource "aws_launch_configuration" "bar" { name = "terraform-test-%d" image_id = "ami-21f78e11" instance_type = "t1.micro" spot_price = "0.01" } `, rand.New(rand.NewSource(time.Now().UnixNano())).Int()) const testAccAWSLaunchConfigurationNoNameConfig = ` resource "aws_launch_configuration" "bar" { image_id = "ami-21f78e11" instance_type = "t1.micro" user_data = "foobar-user-data-change" associate_public_ip_address = false } ` const testAccAWSLaunchConfigurationPrefixNameConfig = ` resource "aws_launch_configuration" "baz" { name_prefix = "baz-" image_id = "ami-21f78e11" instance_type = "t1.micro" user_data = "foobar-user-data-change" associate_public_ip_address = false } ` const testAccAWSLaunchConfigurationWithEncryption = ` resource "aws_launch_configuration" "baz" { image_id = "ami-5189a661" instance_type = "t2.micro" associate_public_ip_address = false root_block_device { volume_type = "gp2" volume_size = 11 } ebs_block_device { device_name = "/dev/sdb" volume_size = 9 encrypted = true } } `