125 lines
3.0 KiB
Go
125 lines
3.0 KiB
Go
|
package rabbitmq
|
||
|
|
||
|
import (
|
||
|
"fmt"
|
||
|
"strings"
|
||
|
"testing"
|
||
|
|
||
|
"github.com/michaelklishin/rabbit-hole"
|
||
|
|
||
|
"github.com/hashicorp/terraform/helper/resource"
|
||
|
"github.com/hashicorp/terraform/terraform"
|
||
|
)
|
||
|
|
||
|
func TestAccPermissions(t *testing.T) {
|
||
|
var permissionInfo rabbithole.PermissionInfo
|
||
|
resource.Test(t, resource.TestCase{
|
||
|
PreCheck: func() { testAccPreCheck(t) },
|
||
|
Providers: testAccProviders,
|
||
|
CheckDestroy: testAccPermissionsCheckDestroy(&permissionInfo),
|
||
|
Steps: []resource.TestStep{
|
||
|
resource.TestStep{
|
||
|
Config: testAccPermissionsConfig_basic,
|
||
|
Check: testAccPermissionsCheck(
|
||
|
"rabbitmq_permissions.test", &permissionInfo,
|
||
|
),
|
||
|
},
|
||
|
resource.TestStep{
|
||
|
Config: testAccPermissionsConfig_update,
|
||
|
Check: testAccPermissionsCheck(
|
||
|
"rabbitmq_permissions.test", &permissionInfo,
|
||
|
),
|
||
|
},
|
||
|
},
|
||
|
})
|
||
|
}
|
||
|
|
||
|
func testAccPermissionsCheck(rn string, permissionInfo *rabbithole.PermissionInfo) resource.TestCheckFunc {
|
||
|
return func(s *terraform.State) error {
|
||
|
rs, ok := s.RootModule().Resources[rn]
|
||
|
if !ok {
|
||
|
return fmt.Errorf("resource not found: %s", rn)
|
||
|
}
|
||
|
|
||
|
if rs.Primary.ID == "" {
|
||
|
return fmt.Errorf("permission id not set")
|
||
|
}
|
||
|
|
||
|
rmqc := testAccProvider.Meta().(*rabbithole.Client)
|
||
|
perms, err := rmqc.ListPermissions()
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("Error retrieving permissions: %s", err)
|
||
|
}
|
||
|
|
||
|
userParts := strings.Split(rs.Primary.ID, "@")
|
||
|
for _, perm := range perms {
|
||
|
if perm.User == userParts[0] && perm.Vhost == userParts[1] {
|
||
|
permissionInfo = &perm
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return fmt.Errorf("Unable to find permissions for user %s", rn)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
func testAccPermissionsCheckDestroy(permissionInfo *rabbithole.PermissionInfo) resource.TestCheckFunc {
|
||
|
return func(s *terraform.State) error {
|
||
|
rmqc := testAccProvider.Meta().(*rabbithole.Client)
|
||
|
perms, err := rmqc.ListPermissions()
|
||
|
if err != nil {
|
||
|
return fmt.Errorf("Error retrieving permissions: %s", err)
|
||
|
}
|
||
|
|
||
|
for _, perm := range perms {
|
||
|
if perm.User == permissionInfo.User && perm.Vhost == permissionInfo.Vhost {
|
||
|
return fmt.Errorf("Permissions still exist for user %s@%s", permissionInfo.User, permissionInfo.Vhost)
|
||
|
}
|
||
|
}
|
||
|
|
||
|
return nil
|
||
|
}
|
||
|
}
|
||
|
|
||
|
const testAccPermissionsConfig_basic = `
|
||
|
resource "rabbitmq_vhost" "test" {
|
||
|
name = "test"
|
||
|
}
|
||
|
|
||
|
resource "rabbitmq_user" "test" {
|
||
|
name = "mctest"
|
||
|
password = "foobar"
|
||
|
tags = ["administrator"]
|
||
|
}
|
||
|
|
||
|
resource "rabbitmq_permissions" "test" {
|
||
|
user = "${rabbitmq_user.test.name}"
|
||
|
vhost = "${rabbitmq_vhost.test.name}"
|
||
|
permissions {
|
||
|
configure = ".*"
|
||
|
write = ".*"
|
||
|
read = ".*"
|
||
|
}
|
||
|
}`
|
||
|
|
||
|
const testAccPermissionsConfig_update = `
|
||
|
resource "rabbitmq_vhost" "test" {
|
||
|
name = "test"
|
||
|
}
|
||
|
|
||
|
resource "rabbitmq_user" "test" {
|
||
|
name = "mctest"
|
||
|
password = "foobar"
|
||
|
tags = ["administrator"]
|
||
|
}
|
||
|
|
||
|
resource "rabbitmq_permissions" "test" {
|
||
|
user = "${rabbitmq_user.test.name}"
|
||
|
vhost = "${rabbitmq_vhost.test.name}"
|
||
|
permissions {
|
||
|
configure = ".*"
|
||
|
write = ".*"
|
||
|
read = ""
|
||
|
}
|
||
|
}`
|