package azure import ( "io" "io/ioutil" "os" "strings" "testing" "github.com/hashicorp/terraform/config" "github.com/hashicorp/terraform/helper/schema" "github.com/hashicorp/terraform/terraform" "github.com/mitchellh/go-homedir" ) var testAccProviders map[string]terraform.ResourceProvider var testAccProvider *schema.Provider const ( testAccSecurityGroupName = "terraform-security-group" testAccHostedServiceName = "terraform-testing-service" ) // testAccStorageServiceName is used as the name for the Storage Service // created in all storage-related tests. // It is much more convenient to provide a Storage Service which // has been created beforehand as the creation of one takes a lot // and would greatly impede the multitude of tests which rely on one. // NOTE: the storage container should be located in `West US`. var testAccStorageServiceName = os.Getenv("AZURE_STORAGE") const testAccStorageContainerName = "terraform-testing-container" func init() { testAccProvider = Provider().(*schema.Provider) testAccProviders = map[string]terraform.ResourceProvider{ "azure": testAccProvider, } } func TestProvider(t *testing.T) { if err := Provider().(*schema.Provider).InternalValidate(); err != nil { t.Fatalf("err: %s", err) } } func TestProvider_impl(t *testing.T) { var _ terraform.ResourceProvider = Provider() } func testAccPreCheck(t *testing.T) { sf := os.Getenv("PUBLISH_SETTINGS_FILE") if sf != "" { publishSettings, err := ioutil.ReadFile(sf) if err != nil { t.Fatalf("Error reading AZURE_SETTINGS_FILE path: %s", err) } os.Setenv("AZURE_PUBLISH_SETTINGS", string(publishSettings)) } if v := os.Getenv("AZURE_PUBLISH_SETTINGS"); v == "" { subscriptionID := os.Getenv("AZURE_SUBSCRIPTION_ID") certificate := os.Getenv("AZURE_CERTIFICATE") if subscriptionID == "" || certificate == "" { t.Fatal("either AZURE_PUBLISH_SETTINGS, PUBLISH_SETTINGS_FILE, or AZURE_SUBSCRIPTION_ID " + "and AZURE_CERTIFICATE must be set for acceptance tests") } } if v := os.Getenv("AZURE_STORAGE"); v == "" { t.Fatal("AZURE_STORAGE must be set for acceptance tests") } } func TestAzure_validateSettingsFile(t *testing.T) { f, err := ioutil.TempFile("", "tf-test") if err != nil { t.Fatalf("Error creating temporary file in TestAzure_validateSettingsFile: %s", err) } defer os.Remove(f.Name()) fx, err := ioutil.TempFile("", "tf-test-xml") if err != nil { t.Fatalf("Error creating temporary file with XML in TestAzure_validateSettingsFile: %s", err) } defer os.Remove(fx.Name()) _, err = io.WriteString(fx, "") if err != nil { t.Fatalf("Error writing XML File: %s", err) } fx.Close() home, err := homedir.Dir() if err != nil { t.Fatalf("Error fetching homedir: %s", err) } fh, err := ioutil.TempFile(home, "tf-test-home") if err != nil { t.Fatalf("Error creating homedir-based temporary file: %s", err) } defer os.Remove(fh.Name()) _, err = io.WriteString(fh, "") if err != nil { t.Fatalf("Error writing XML File: %s", err) } fh.Close() r := strings.NewReplacer(home, "~") homePath := r.Replace(fh.Name()) cases := []struct { Input string // String of XML or a path to an XML file W int // expected count of warnings E int // expected count of errors }{ {"test", 0, 1}, {f.Name(), 1, 1}, {fx.Name(), 1, 0}, {homePath, 1, 0}, {"", 0, 0}, } for _, tc := range cases { w, e := validateSettingsFile(tc.Input, "") if len(w) != tc.W { t.Errorf("Error in TestAzureValidateSettingsFile: input: %s , warnings: %v, errors: %v", tc.Input, w, e) } if len(e) != tc.E { t.Errorf("Error in TestAzureValidateSettingsFile: input: %s , warnings: %v, errors: %v", tc.Input, w, e) } } } func TestAzure_providerConfigure(t *testing.T) { rp := Provider() raw := map[string]interface{}{ "publish_settings": testAzurePublishSettingsStr, } rawConfig, err := config.NewRawConfig(raw) if err != nil { t.Fatalf("err: %s", err) } err = rp.Configure(terraform.NewResourceConfig(rawConfig)) meta := rp.(*schema.Provider).Meta() if meta == nil { t.Fatalf("Expected metadata, got nil: err: %s", err) } } // testAzurePublishSettingsStr is a revoked publishsettings file const testAzurePublishSettingsStr = ` `