2016-08-10 14:14:25 +02:00
|
|
|
package validation
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2017-03-23 09:57:11 +01:00
|
|
|
"net"
|
2016-08-10 14:14:25 +02:00
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2017-03-27 16:35:40 +02:00
|
|
|
"github.com/hashicorp/terraform/helper/structure"
|
2016-08-10 14:14:25 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// IntBetween returns a SchemaValidateFunc which tests if the provided value
|
|
|
|
// is of type int and is between min and max (inclusive)
|
|
|
|
func IntBetween(min, max int) schema.SchemaValidateFunc {
|
|
|
|
return func(i interface{}, k string) (s []string, es []error) {
|
|
|
|
v, ok := i.(int)
|
|
|
|
if !ok {
|
|
|
|
es = append(es, fmt.Errorf("expected type of %s to be int", k))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if v < min || v > max {
|
|
|
|
es = append(es, fmt.Errorf("expected %s to be in the range (%d - %d), got %d", k, min, max, v))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// StringInSlice returns a SchemaValidateFunc which tests if the provided value
|
|
|
|
// is of type string and matches the value of an element in the valid slice
|
|
|
|
// will test with in lower case if ignoreCase is true
|
|
|
|
func StringInSlice(valid []string, ignoreCase bool) schema.SchemaValidateFunc {
|
|
|
|
return func(i interface{}, k string) (s []string, es []error) {
|
|
|
|
v, ok := i.(string)
|
|
|
|
if !ok {
|
|
|
|
es = append(es, fmt.Errorf("expected type of %s to be string", k))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, str := range valid {
|
|
|
|
if v == str || (ignoreCase && strings.ToLower(v) == strings.ToLower(str)) {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
es = append(es, fmt.Errorf("expected %s to be one of %v, got %s", k, valid, v))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2017-03-23 09:57:11 +01:00
|
|
|
|
|
|
|
// StringLenBetween returns a SchemaValidateFunc which tests if the provided value
|
|
|
|
// is of type string and has length between min and max (inclusive)
|
|
|
|
func StringLenBetween(min, max int) schema.SchemaValidateFunc {
|
|
|
|
return func(i interface{}, k string) (s []string, es []error) {
|
|
|
|
v, ok := i.(string)
|
|
|
|
if !ok {
|
|
|
|
es = append(es, fmt.Errorf("expected type of %s to be string", k))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
if len(v) < min || len(v) > max {
|
|
|
|
es = append(es, fmt.Errorf("expected length of %s to be in the range (%d - %d), got %s", k, min, max, v))
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// CIDRNetwork returns a SchemaValidateFunc which tests if the provided value
|
|
|
|
// is of type string, is in valid CIDR network notation, and has significant bits between min and max (inclusive)
|
|
|
|
func CIDRNetwork(min, max int) schema.SchemaValidateFunc {
|
|
|
|
return func(i interface{}, k string) (s []string, es []error) {
|
|
|
|
v, ok := i.(string)
|
|
|
|
if !ok {
|
|
|
|
es = append(es, fmt.Errorf("expected type of %s to be string", k))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
_, ipnet, err := net.ParseCIDR(v)
|
|
|
|
if err != nil {
|
|
|
|
es = append(es, fmt.Errorf(
|
|
|
|
"expected %s to contain a valid CIDR, got: %s with err: %s", k, v, err))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
if ipnet == nil || v != ipnet.String() {
|
|
|
|
es = append(es, fmt.Errorf(
|
|
|
|
"expected %s to contain a valid network CIDR, expected %s, got %s",
|
|
|
|
k, ipnet, v))
|
|
|
|
}
|
|
|
|
|
|
|
|
sigbits, _ := ipnet.Mask.Size()
|
|
|
|
if sigbits < min || sigbits > max {
|
|
|
|
es = append(es, fmt.Errorf(
|
|
|
|
"expected %q to contain a network CIDR with between %d and %d significant bits, got: %d",
|
|
|
|
k, min, max, sigbits))
|
|
|
|
}
|
|
|
|
|
|
|
|
return
|
|
|
|
}
|
|
|
|
}
|
2017-03-27 16:35:40 +02:00
|
|
|
|
|
|
|
func ValidateJsonString(v interface{}, k string) (ws []string, errors []error) {
|
|
|
|
if _, err := structure.NormalizeJsonString(v); err != nil {
|
|
|
|
errors = append(errors, fmt.Errorf("%q contains an invalid JSON: %s", k, err))
|
|
|
|
}
|
|
|
|
return
|
|
|
|
}
|