terraform/builtin/providers/postgresql/resource_postgresql_schema_...

419 lines
17 KiB
Go
Raw Normal View History

2016-12-12 16:35:41 +01:00
package postgresql
import (
"database/sql"
"fmt"
"testing"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
)
func TestAccPostgresqlSchema_Basic(t *testing.T) {
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckPostgresqlSchemaDestroy,
Steps: []resource.TestStep{
{
Config: testAccPostgresqlSchemaConfig,
Check: resource.ComposeTestCheckFunc(
testAccCheckPostgresqlSchemaExists("postgresql_schema.test1", "foo"),
resource.TestCheckResourceAttr("postgresql_role.role_all_without_grant", "name", "role_all_without_grant"),
resource.TestCheckResourceAttr("postgresql_role.role_all_without_grant", "login", "true"),
resource.TestCheckResourceAttr("postgresql_role.role_all_with_grant", "name", "role_all_with_grant"),
resource.TestCheckResourceAttr("postgresql_schema.test1", "name", "foo"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "name", "bar"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "owner", "role_all_without_grant"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "if_not_exists", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.#", "1"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.1948480595.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.1948480595.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.1948480595.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.1948480595.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test2", "policy.1948480595.role", "role_all_without_grant"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "name", "baz"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "owner", "role_all_without_grant"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "if_not_exists", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.#", "2"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1013320538.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1013320538.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1013320538.role", "role_all_with_grant"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1948480595.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1948480595.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test3", "policy.1948480595.role", "role_all_without_grant"),
),
},
},
})
}
func TestAccPostgresqlSchema_AddPolicy(t *testing.T) {
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckPostgresqlSchemaDestroy,
Steps: []resource.TestStep{
{
Config: testAccPostgresqlSchemaGrant1,
Check: resource.ComposeTestCheckFunc(
testAccCheckPostgresqlSchemaExists("postgresql_schema.test4", "test4"),
resource.TestCheckResourceAttr("postgresql_role.all_without_grant_stay", "name", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_role.all_without_grant_drop", "name", "all_without_grant_drop"),
resource.TestCheckResourceAttr("postgresql_role.policy_compose", "name", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_role.policy_move", "name", "policy_move"),
resource.TestCheckResourceAttr("postgresql_role.all_with_grantstay", "name", "all_with_grantstay"),
// resource.TestCheckResourceAttr("postgresql_role.all_with_grantdrop", "name", "all_with_grantdrop"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "name", "test4"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "owner", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.#", "6"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.create", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.role", "all_with_grantstay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.usage", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1417738359.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1417738359.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1417738359.role", "policy_move"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1417738359.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1417738359.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1762357194.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1762357194.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1762357194.role", "all_without_grant_drop"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1762357194.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.1762357194.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.role", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.create", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.role", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.usage", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.usage_with_grant", "true"),
// resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.4178211897.create", "false"),
// resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.4178211897.create_with_grant", "true"),
// resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.4178211897.role", "all_with_grantdrop"),
// resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.4178211897.usage", "false"),
// resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.4178211897.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.role", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.usage_with_grant", "false"),
),
},
{
Config: testAccPostgresqlSchemaGrant2,
Check: resource.ComposeTestCheckFunc(
testAccCheckPostgresqlSchemaExists("postgresql_schema.test4", "test4"),
resource.TestCheckResourceAttr("postgresql_role.all_without_grant_stay", "name", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_role.all_without_grant_drop", "name", "all_without_grant_drop"),
resource.TestCheckResourceAttr("postgresql_role.policy_compose", "name", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_role.policy_move", "name", "policy_move"),
resource.TestCheckResourceAttr("postgresql_role.all_with_grantstay", "name", "all_with_grantstay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "name", "test4"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "owner", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.#", "6"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.create", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.role", "all_with_grantstay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.usage", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.108605972.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.role", "all_without_grant_stay"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.2524457447.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3831594020.create", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3831594020.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3831594020.role", "policy_move"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3831594020.usage", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3831594020.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.create", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.create_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.role", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.usage", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.3959936977.usage_with_grant", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.468685299.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.468685299.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.468685299.role", "policy_new"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.468685299.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.468685299.usage_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.create", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.create_with_grant", "false"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.role", "policy_compose"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.usage", "true"),
resource.TestCheckResourceAttr("postgresql_schema.test4", "policy.815478369.usage_with_grant", "false"),
2016-12-12 16:35:41 +01:00
),
},
},
})
}
func testAccCheckPostgresqlSchemaDestroy(s *terraform.State) error {
client := testAccProvider.Meta().(*Client)
for _, rs := range s.RootModule().Resources {
if rs.Type != "postgresql_schema" {
continue
}
exists, err := checkSchemaExists(client, rs.Primary.ID)
if err != nil {
return fmt.Errorf("Error checking schema %s", err)
}
if exists {
return fmt.Errorf("Schema still exists after destroy")
}
}
return nil
}
func testAccCheckPostgresqlSchemaExists(n string, schemaName string) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Resource not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No ID is set")
}
actualSchemaName := rs.Primary.Attributes["name"]
if actualSchemaName != schemaName {
return fmt.Errorf("Wrong value for schema name expected %s got %s", schemaName, actualSchemaName)
}
client := testAccProvider.Meta().(*Client)
exists, err := checkSchemaExists(client, rs.Primary.ID)
if err != nil {
return fmt.Errorf("Error checking schema %s", err)
}
if !exists {
return fmt.Errorf("Schema not found")
}
return nil
}
}
func checkSchemaExists(client *Client, schemaName string) (bool, error) {
conn, err := client.Connect()
if err != nil {
return false, err
}
defer conn.Close()
var _rez string
err = conn.QueryRow("SELECT nspname FROM pg_catalog.pg_namespace WHERE nspname=$1", schemaName).Scan(&_rez)
switch {
case err == sql.ErrNoRows:
return false, nil
case err != nil:
return false, fmt.Errorf("Error reading info about schema: %s", err)
default:
return true, nil
}
}
const testAccPostgresqlSchemaConfig = `
resource "postgresql_role" "role_all_without_grant" {
name = "role_all_without_grant"
2016-12-12 16:35:41 +01:00
login = true
}
resource "postgresql_role" "role_all_with_grant" {
name = "role_all_with_grant"
}
2016-12-12 16:35:41 +01:00
resource "postgresql_schema" "test1" {
name = "foo"
}
resource "postgresql_schema" "test2" {
name = "bar"
owner = "${postgresql_role.role_all_without_grant.name}"
if_not_exists = false
policy {
create = true
usage = true
role = "${postgresql_role.role_all_without_grant.name}"
}
}
resource "postgresql_schema" "test3" {
name = "baz"
owner = "${postgresql_role.role_all_without_grant.name}"
if_not_exists = true
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.role_all_with_grant.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.role_all_without_grant.name}"
}
}
`
const testAccPostgresqlSchemaGrant1 = `
resource "postgresql_role" "all_without_grant_stay" {
name = "all_without_grant_stay"
}
resource "postgresql_role" "all_without_grant_drop" {
name = "all_without_grant_drop"
}
resource "postgresql_role" "policy_compose" {
name = "policy_compose"
}
resource "postgresql_role" "policy_move" {
name = "policy_move"
}
resource "postgresql_role" "all_with_grantstay" {
name = "all_with_grantstay"
}
// resource "postgresql_role" "all_with_grantdrop" {
// name = "all_with_grantdrop"
// }
resource "postgresql_schema" "test4" {
name = "test4"
owner = "${postgresql_role.all_without_grant_stay.name}"
policy {
create = true
usage = true
role = "${postgresql_role.all_without_grant_stay.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.all_without_grant_drop.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.policy_compose.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.policy_move.name}"
}
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.all_with_grantstay.name}"
}
// policy {
// create_with_grant = true
// usage_with_grant = true
// role = "${postgresql_role.all_with_grantdrop.name}"
// }
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.policy_compose.name}"
}
}
`
const testAccPostgresqlSchemaGrant2 = `
resource "postgresql_role" "all_without_grant_stay" {
name = "all_without_grant_stay"
}
resource "postgresql_role" "all_without_grant_drop" {
name = "all_without_grant_drop"
}
resource "postgresql_role" "policy_compose" {
name = "policy_compose"
}
resource "postgresql_role" "policy_move" {
name = "policy_move"
}
resource "postgresql_role" "all_with_grantstay" {
name = "all_with_grantstay"
}
resource "postgresql_role" "policy_new" {
name = "policy_new"
}
resource "postgresql_schema" "test4" {
name = "test4"
owner = "${postgresql_role.all_without_grant_stay.name}"
policy {
create = true
usage = true
role = "${postgresql_role.all_without_grant_stay.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.policy_compose.name}"
}
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.all_with_grantstay.name}"
}
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.policy_compose.name}"
}
policy {
create_with_grant = true
usage_with_grant = true
role = "${postgresql_role.policy_move.name}"
}
policy {
create = true
usage = true
role = "${postgresql_role.policy_new.name}"
}
}
2016-12-12 16:35:41 +01:00
`