101 lines
2.4 KiB
Go
101 lines
2.4 KiB
Go
|
package cloudstack
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/hashicorp/terraform/helper/resource"
|
||
|
"github.com/hashicorp/terraform/terraform"
|
||
|
"github.com/xanzy/go-cloudstack/cloudstack"
|
||
|
)
|
||
|
|
||
|
func TestAccCloudStackSecurityGroup_basic(t *testing.T) {
|
||
|
var sg cloudstack.SecurityGroup
|
||
|
resource.Test(t, resource.TestCase{
|
||
|
PreCheck: func() { testAccPreCheck(t) },
|
||
|
Providers: testAccProviders,
|
||
|
CheckDestroy: testAccCheckCloudStackSecurityGroupDestroy,
|
||
|
Steps: []resource.TestStep{
|
||
|
resource.TestStep{
|
||
|
Config: testAccCloudStackSecurityGroup_basic,
|
||
|
Check: resource.ComposeTestCheckFunc(
|
||
|
testAccCheckCloudStackSecurityGroupExists(
|
||
|
"cloudstack_security_group.foo", &sg),
|
||
|
testAccCheckCloudStackSecurityGroupBasicAttributes(&sg),
|
||
|
),
|
||
|
},
|
||
|
},
|
||
|
})
|
||
|
}
|
||
|
|
||
|
func testAccCheckCloudStackSecurityGroupExists(
|
||
|
n string, sg *cloudstack.SecurityGroup) resource.TestCheckFunc {
|
||
|
return func(s *terraform.State) error {
|
||
|
rs, ok := s.RootModule().Resources[n]
|
||
|
if !ok {
|
||
|
return fmt.Errorf("Not found: %s", n)
|
||
|
}
|
||
|
|
||
|
if rs.Primary.ID == "" {
|
||
|
return fmt.Errorf("No security group ID is set")
|
||
|
}
|
||
|
|
||
|
cs := testAccProvider.Meta().(*cloudstack.CloudStackClient)
|
||
|
resp, _, err := cs.SecurityGroup.GetSecurityGroupByID(rs.Primary.ID)
|
||
|
if err != nil {
|
||
|
return err
|
||
|
}
|
||
|
|
||
|
if resp.Id != rs.Primary.ID {
|
||
|
return fmt.Errorf("Network ACL not found")
|
||
|
}
|
||
|
|
||
|
*sg = *resp
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func testAccCheckCloudStackSecurityGroupBasicAttributes(
|
||
|
sg *cloudstack.SecurityGroup) resource.TestCheckFunc {
|
||
|
return func(s *terraform.State) error {
|
||
|
|
||
|
if sg.Name != "terraform-security-group" {
|
||
|
return fmt.Errorf("Bad name: %s", sg.Name)
|
||
|
}
|
||
|
|
||
|
if sg.Description != "terraform-security-group-text" {
|
||
|
return fmt.Errorf("Bad description: %s", sg.Description)
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func testAccCheckCloudStackSecurityGroupDestroy(s *terraform.State) error {
|
||
|
cs := testAccProvider.Meta().(*cloudstack.CloudStackClient)
|
||
|
|
||
|
for _, rs := range s.RootModule().Resources {
|
||
|
if rs.Type != "cloudstack_security_group" {
|
||
|
continue
|
||
|
}
|
||
|
|
||
|
if rs.Primary.ID == "" {
|
||
|
return fmt.Errorf("No security group ID is set")
|
||
|
}
|
||
|
|
||
|
_, _, err := cs.SecurityGroup.GetSecurityGroupByID(rs.Primary.ID)
|
||
|
if err == nil {
|
||
|
return fmt.Errorf("Security group list %s still exists", rs.Primary.ID)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
|
||
|
var testAccCloudStackSecurityGroup_basic = fmt.Sprintf(`
|
||
|
resource "cloudstack_security_group" "foo" {
|
||
|
name = "terraform-security-group"
|
||
|
description = "terraform-security-group-text"
|
||
|
}`)
|