2014-07-14 22:28:00 +02:00
|
|
|
package aws
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2014-12-03 11:28:51 +01:00
|
|
|
"reflect"
|
2014-12-20 20:47:50 +01:00
|
|
|
"testing"
|
2014-07-14 22:28:00 +02:00
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
2014-12-03 11:28:51 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/schema"
|
2014-07-14 22:28:00 +02:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
"github.com/mitchellh/goamz/ec2"
|
|
|
|
)
|
|
|
|
|
2014-07-15 06:56:37 +02:00
|
|
|
func TestAccAWSInstance_normal(t *testing.T) {
|
2014-07-14 22:28:00 +02:00
|
|
|
var v ec2.Instance
|
|
|
|
|
2014-07-15 06:56:37 +02:00
|
|
|
testCheck := func(*terraform.State) error {
|
2014-08-01 02:35:31 +02:00
|
|
|
if v.AvailZone != "us-west-2a" {
|
|
|
|
return fmt.Errorf("bad availability zone: %#v", v.AvailZone)
|
|
|
|
}
|
|
|
|
|
2014-07-15 06:56:37 +02:00
|
|
|
if len(v.SecurityGroups) == 0 {
|
|
|
|
return fmt.Errorf("no security groups: %#v", v.SecurityGroups)
|
|
|
|
}
|
|
|
|
if v.SecurityGroups[0].Name != "tf_test_foo" {
|
|
|
|
return fmt.Errorf("no security groups: %#v", v.SecurityGroups)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2014-07-14 22:28:00 +02:00
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfig,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists(
|
|
|
|
"aws_instance.foo", &v),
|
2014-07-15 06:56:37 +02:00
|
|
|
testCheck,
|
2014-07-16 18:01:56 +02:00
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo",
|
2014-07-17 01:41:01 +02:00
|
|
|
"user_data",
|
|
|
|
"0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33"),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
|
|
|
|
// We repeat the exact same test so that we can be sure
|
|
|
|
// that the user data hash stuff is working without generating
|
|
|
|
// an incorrect diff.
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfig,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists(
|
|
|
|
"aws_instance.foo", &v),
|
|
|
|
testCheck,
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo",
|
|
|
|
"user_data",
|
2014-07-16 18:01:56 +02:00
|
|
|
"0beec7b5ea3f0fdbc95d0dd47f3c5bc275da8a33"),
|
2014-07-14 22:28:00 +02:00
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
func TestAccAWSInstance_blockDevices(t *testing.T) {
|
2014-10-31 21:25:16 +01:00
|
|
|
var v ec2.Instance
|
|
|
|
|
|
|
|
testCheck := func() resource.TestCheckFunc {
|
|
|
|
return func(*terraform.State) error {
|
|
|
|
|
|
|
|
// Map out the block devices by name, which should be unique.
|
|
|
|
blockDevices := make(map[string]ec2.BlockDevice)
|
|
|
|
for _, blockDevice := range v.BlockDevices {
|
|
|
|
blockDevices[blockDevice.DeviceName] = blockDevice
|
|
|
|
}
|
|
|
|
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
// Check if the root block device exists.
|
|
|
|
if _, ok := blockDevices["/dev/sda1"]; !ok {
|
|
|
|
fmt.Errorf("block device doesn't exist: /dev/sda1")
|
|
|
|
}
|
|
|
|
|
2014-10-31 21:25:16 +01:00
|
|
|
// Check if the secondary block device exists.
|
|
|
|
if _, ok := blockDevices["/dev/sdb"]; !ok {
|
|
|
|
fmt.Errorf("block device doesn't exist: /dev/sdb")
|
|
|
|
}
|
|
|
|
|
2015-03-03 07:07:36 +01:00
|
|
|
// Check if the third block device exists.
|
|
|
|
if _, ok := blockDevices["/dev/sdc"]; !ok {
|
|
|
|
fmt.Errorf("block device doesn't exist: /dev/sdc")
|
|
|
|
}
|
|
|
|
|
2014-10-31 21:25:16 +01:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigBlockDevices,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists(
|
|
|
|
"aws_instance.foo", &v),
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "root_block_device.#", "1"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "root_block_device.0.device_name", "/dev/sda1"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "root_block_device.0.volume_size", "11"),
|
2015-02-19 00:24:46 +01:00
|
|
|
// this one is important because it's the only root_block_device
|
|
|
|
// attribute that comes back from the API. so checking it verifies
|
|
|
|
// that we set state properly
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "root_block_device.0.volume_type", "gp2"),
|
2015-01-28 12:00:05 +01:00
|
|
|
resource.TestCheckResourceAttr(
|
2015-03-03 07:07:36 +01:00
|
|
|
"aws_instance.foo", "block_device.#", "2"),
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.172787947.device_name", "/dev/sdb"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.172787947.volume_size", "9"),
|
2015-03-03 07:07:36 +01:00
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.172787947.iops", "0"),
|
|
|
|
// Check provisioned SSD device
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.3336996981.volume_type", "io1"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.3336996981.device_name", "/dev/sdc"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.3336996981.volume_size", "10"),
|
|
|
|
resource.TestCheckResourceAttr(
|
|
|
|
"aws_instance.foo", "block_device.3336996981.iops", "100"),
|
2014-10-31 21:25:16 +01:00
|
|
|
testCheck(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-07-14 23:16:59 +02:00
|
|
|
func TestAccAWSInstance_sourceDestCheck(t *testing.T) {
|
|
|
|
var v ec2.Instance
|
|
|
|
|
2014-07-15 02:38:39 +02:00
|
|
|
testCheck := func(enabled bool) resource.TestCheckFunc {
|
|
|
|
return func(*terraform.State) error {
|
|
|
|
if v.SourceDestCheck != enabled {
|
|
|
|
return fmt.Errorf("bad source_dest_check: %#v", v.SourceDestCheck)
|
|
|
|
}
|
2014-07-14 23:16:59 +02:00
|
|
|
|
2014-07-15 02:38:39 +02:00
|
|
|
return nil
|
|
|
|
}
|
2014-07-14 23:16:59 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
2015-02-21 21:26:46 +01:00
|
|
|
Config: testAccInstanceConfigSourceDestDisable,
|
2014-07-14 23:16:59 +02:00
|
|
|
Check: resource.ComposeTestCheckFunc(
|
2015-02-21 21:26:46 +01:00
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
|
|
|
testCheck(false),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigSourceDestEnable,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
2014-07-15 02:38:39 +02:00
|
|
|
testCheck(true),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigSourceDestDisable,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
2015-02-21 21:26:46 +01:00
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
2014-07-15 02:38:39 +02:00
|
|
|
testCheck(false),
|
2014-07-14 23:16:59 +02:00
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-07-14 22:46:32 +02:00
|
|
|
func TestAccAWSInstance_vpc(t *testing.T) {
|
|
|
|
var v ec2.Instance
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigVPC,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists(
|
|
|
|
"aws_instance.foo", &v),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-10-13 22:55:59 +02:00
|
|
|
func TestAccInstance_tags(t *testing.T) {
|
|
|
|
var v ec2.Instance
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccCheckInstanceConfigTags,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
|
|
|
testAccCheckTags(&v.Tags, "foo", "bar"),
|
2015-02-04 02:48:25 +01:00
|
|
|
// Guard against regression of https://github.com/hashicorp/terraform/issues/914
|
|
|
|
testAccCheckTags(&v.Tags, "#", ""),
|
2014-10-13 22:55:59 +02:00
|
|
|
),
|
|
|
|
},
|
|
|
|
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccCheckInstanceConfigTagsUpdate,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
|
|
|
testAccCheckTags(&v.Tags, "foo", ""),
|
|
|
|
testAccCheckTags(&v.Tags, "bar", "baz"),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-12-20 20:47:50 +01:00
|
|
|
func TestAccInstance_privateIP(t *testing.T) {
|
|
|
|
var v ec2.Instance
|
|
|
|
|
|
|
|
testCheckPrivateIP := func() resource.TestCheckFunc {
|
|
|
|
return func(*terraform.State) error {
|
|
|
|
if v.PrivateIpAddress != "10.1.1.42" {
|
|
|
|
return fmt.Errorf("bad private IP: %s", v.PrivateIpAddress)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigPrivateIP,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
|
|
|
testCheckPrivateIP(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccInstance_associatePublicIPAndPrivateIP(t *testing.T) {
|
|
|
|
var v ec2.Instance
|
|
|
|
|
|
|
|
testCheckPrivateIP := func() resource.TestCheckFunc {
|
|
|
|
return func(*terraform.State) error {
|
|
|
|
if v.PrivateIpAddress != "10.1.1.42" {
|
|
|
|
return fmt.Errorf("bad private IP: %s", v.PrivateIpAddress)
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckInstanceDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
|
|
|
Config: testAccInstanceConfigAssociatePublicIPAndPrivateIP,
|
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
|
|
|
testCheckPrivateIP(),
|
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2014-07-14 22:28:00 +02:00
|
|
|
func testAccCheckInstanceDestroy(s *terraform.State) error {
|
2014-11-21 17:58:34 +01:00
|
|
|
conn := testAccProvider.Meta().(*AWSClient).ec2conn
|
2014-07-14 22:28:00 +02:00
|
|
|
|
2014-09-17 02:44:42 +02:00
|
|
|
for _, rs := range s.RootModule().Resources {
|
2014-07-14 22:28:00 +02:00
|
|
|
if rs.Type != "aws_instance" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
// Try to find the resource
|
|
|
|
resp, err := conn.Instances(
|
2014-09-17 02:44:42 +02:00
|
|
|
[]string{rs.Primary.ID}, ec2.NewFilter())
|
2014-07-14 22:28:00 +02:00
|
|
|
if err == nil {
|
|
|
|
if len(resp.Reservations) > 0 {
|
|
|
|
return fmt.Errorf("still exist.")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// Verify the error is what we want
|
|
|
|
ec2err, ok := err.(*ec2.Error)
|
|
|
|
if !ok {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if ec2err.Code != "InvalidInstanceID.NotFound" {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAccCheckInstanceExists(n string, i *ec2.Instance) resource.TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
2014-09-17 02:44:42 +02:00
|
|
|
rs, ok := s.RootModule().Resources[n]
|
2014-07-14 22:28:00 +02:00
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("Not found: %s", n)
|
|
|
|
}
|
|
|
|
|
2014-09-17 02:44:42 +02:00
|
|
|
if rs.Primary.ID == "" {
|
2014-07-14 22:28:00 +02:00
|
|
|
return fmt.Errorf("No ID is set")
|
|
|
|
}
|
|
|
|
|
2014-11-21 17:58:34 +01:00
|
|
|
conn := testAccProvider.Meta().(*AWSClient).ec2conn
|
2014-07-14 22:28:00 +02:00
|
|
|
resp, err := conn.Instances(
|
2014-09-17 02:44:42 +02:00
|
|
|
[]string{rs.Primary.ID}, ec2.NewFilter())
|
2014-07-14 22:28:00 +02:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if len(resp.Reservations) == 0 {
|
|
|
|
return fmt.Errorf("Instance not found")
|
|
|
|
}
|
|
|
|
|
|
|
|
*i = resp.Reservations[0].Instances[0]
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-12-03 11:28:51 +01:00
|
|
|
func TestInstanceTenancySchema(t *testing.T) {
|
|
|
|
actualSchema := resourceAwsInstance().Schema["tenancy"]
|
|
|
|
expectedSchema := &schema.Schema{
|
2014-12-20 20:47:50 +01:00
|
|
|
Type: schema.TypeString,
|
|
|
|
Optional: true,
|
|
|
|
Computed: true,
|
|
|
|
ForceNew: true,
|
|
|
|
}
|
|
|
|
if !reflect.DeepEqual(actualSchema, expectedSchema) {
|
2014-12-03 11:28:51 +01:00
|
|
|
t.Fatalf(
|
|
|
|
"Got:\n\n%#v\n\nExpected:\n\n%#v\n",
|
|
|
|
actualSchema,
|
|
|
|
expectedSchema)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-14 22:28:00 +02:00
|
|
|
const testAccInstanceConfig = `
|
2014-07-15 06:56:37 +02:00
|
|
|
resource "aws_security_group" "tf_test_foo" {
|
|
|
|
name = "tf_test_foo"
|
|
|
|
description = "foo"
|
2014-07-16 18:01:56 +02:00
|
|
|
|
|
|
|
ingress {
|
|
|
|
protocol = "icmp"
|
|
|
|
from_port = -1
|
|
|
|
to_port = -1
|
|
|
|
cidr_blocks = ["0.0.0.0/0"]
|
|
|
|
}
|
2014-07-15 06:56:37 +02:00
|
|
|
}
|
|
|
|
|
2014-07-14 22:28:00 +02:00
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
# us-west-2
|
|
|
|
ami = "ami-4fccb37f"
|
2014-08-01 02:35:31 +02:00
|
|
|
availability_zone = "us-west-2a"
|
|
|
|
|
2014-07-14 22:28:00 +02:00
|
|
|
instance_type = "m1.small"
|
2014-07-15 06:56:37 +02:00
|
|
|
security_groups = ["${aws_security_group.tf_test_foo.name}"]
|
2014-07-16 18:01:56 +02:00
|
|
|
user_data = "foo"
|
2014-07-14 22:28:00 +02:00
|
|
|
}
|
|
|
|
`
|
2014-07-14 22:46:32 +02:00
|
|
|
|
2014-10-31 21:25:16 +01:00
|
|
|
const testAccInstanceConfigBlockDevices = `
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
# us-west-2
|
|
|
|
ami = "ami-55a7ea65"
|
|
|
|
instance_type = "m1.small"
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
root_block_device {
|
|
|
|
device_name = "/dev/sda1"
|
|
|
|
volume_type = "gp2"
|
|
|
|
volume_size = 11
|
|
|
|
}
|
2014-10-31 21:25:16 +01:00
|
|
|
block_device {
|
2015-01-28 12:16:04 +01:00
|
|
|
device_name = "/dev/sdb"
|
providers/aws: add root_block_device to aws_instance
AWS provides a single `BlockDeviceMapping` to manage three different
kinds of block devices:
(a) The root volume
(b) Ephemeral storage
(c) Additional EBS volumes
Each of these types has slightly different semantics [1].
(a) The root volume is defined by the AMI; it can only be customized
with `volume_size`, `volume_type`, and `delete_on_termination`.
(b) Ephemeral storage is made available based on instance type [2]. It's
attached automatically if _no_ block device mappings are specified, and
must otherwise be defined with block device mapping entries that contain
only DeviceName set to a device like "/dev/sdX" and VirtualName set to
"ephemeralN".
(c) Additional EBS volumes are controlled by mappings that omit
`virtual_name` and can specify `volume_size`, `volume_type`,
`delete_on_termination`, `snapshot_id`, and `encryption`.
After deciding to ignore root block devices to fix #859, we had users
with configurations that were attempting to manage the root block device chime
in on #913.
Terraform does not have the primitives to be able to properly handle a
single collection of resources that is partially managed and partially
computed, so our strategy here is to break out logical sub-resources for
Terraform and hide the BlockDeviceMapping inside the provider
implementation.
Now (a) is supported by the `root_block_device` sub-resource, and (b)
and (c) are still both merged together under `block_device`, though I
have yet to see ephemeral block devices working properly.
Looking into possibly separating out `ephemeral_block_device` and
`ebs_block_device` sub-resources as well, which seem like the logical
next step. We'll wait until the next big release for this, though, since
it will break backcompat.
[1] http://bit.ly/ec2bdmap
[2] http://bit.ly/instancestorebytype
Fixes #913
Refs #858
2015-02-18 18:45:30 +01:00
|
|
|
volume_size = 9
|
2014-10-31 21:25:16 +01:00
|
|
|
}
|
2015-03-03 07:07:36 +01:00
|
|
|
block_device {
|
|
|
|
device_name = "/dev/sdc"
|
|
|
|
volume_size = 10
|
|
|
|
volume_type = "io1"
|
|
|
|
iops = 100
|
|
|
|
}
|
2014-10-31 21:25:16 +01:00
|
|
|
}
|
|
|
|
`
|
|
|
|
|
2015-02-21 21:26:46 +01:00
|
|
|
const testAccInstanceConfigSourceDestEnable = `
|
2014-07-14 23:16:59 +02:00
|
|
|
resource "aws_vpc" "foo" {
|
|
|
|
cidr_block = "10.1.0.0/16"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_subnet" "foo" {
|
|
|
|
cidr_block = "10.1.1.0/24"
|
|
|
|
vpc_id = "${aws_vpc.foo.id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
# us-west-2
|
|
|
|
ami = "ami-4fccb37f"
|
|
|
|
instance_type = "m1.small"
|
|
|
|
subnet_id = "${aws_subnet.foo.id}"
|
|
|
|
source_dest_check = true
|
|
|
|
}
|
|
|
|
`
|
|
|
|
|
2014-07-15 02:38:39 +02:00
|
|
|
const testAccInstanceConfigSourceDestDisable = `
|
|
|
|
resource "aws_vpc" "foo" {
|
|
|
|
cidr_block = "10.1.0.0/16"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_subnet" "foo" {
|
|
|
|
cidr_block = "10.1.1.0/24"
|
|
|
|
vpc_id = "${aws_vpc.foo.id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
# us-west-2
|
|
|
|
ami = "ami-4fccb37f"
|
|
|
|
instance_type = "m1.small"
|
|
|
|
subnet_id = "${aws_subnet.foo.id}"
|
|
|
|
source_dest_check = false
|
|
|
|
}
|
|
|
|
`
|
|
|
|
|
2014-07-14 22:46:32 +02:00
|
|
|
const testAccInstanceConfigVPC = `
|
|
|
|
resource "aws_vpc" "foo" {
|
|
|
|
cidr_block = "10.1.0.0/16"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_subnet" "foo" {
|
|
|
|
cidr_block = "10.1.1.0/24"
|
|
|
|
vpc_id = "${aws_vpc.foo.id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
# us-west-2
|
|
|
|
ami = "ami-4fccb37f"
|
|
|
|
instance_type = "m1.small"
|
|
|
|
subnet_id = "${aws_subnet.foo.id}"
|
2014-07-29 14:06:53 +02:00
|
|
|
associate_public_ip_address = true
|
2014-11-04 12:08:30 +01:00
|
|
|
tenancy = "dedicated"
|
2014-07-14 22:46:32 +02:00
|
|
|
}
|
|
|
|
`
|
2014-10-13 22:55:59 +02:00
|
|
|
|
|
|
|
const testAccCheckInstanceConfigTags = `
|
|
|
|
resource "aws_instance" "foo" {
|
2014-11-24 21:22:18 +01:00
|
|
|
ami = "ami-4fccb37f"
|
|
|
|
instance_type = "m1.small"
|
2014-10-13 22:55:59 +02:00
|
|
|
tags {
|
|
|
|
foo = "bar"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
`
|
|
|
|
|
|
|
|
const testAccCheckInstanceConfigTagsUpdate = `
|
2014-10-14 21:15:46 +02:00
|
|
|
resource "aws_instance" "foo" {
|
2014-11-24 21:22:18 +01:00
|
|
|
ami = "ami-4fccb37f"
|
|
|
|
instance_type = "m1.small"
|
2014-10-13 22:55:59 +02:00
|
|
|
tags {
|
|
|
|
bar = "baz"
|
|
|
|
}
|
|
|
|
}
|
2014-10-14 21:20:39 +02:00
|
|
|
`
|
2014-12-20 20:47:50 +01:00
|
|
|
|
|
|
|
const testAccInstanceConfigPrivateIP = `
|
|
|
|
resource "aws_vpc" "foo" {
|
|
|
|
cidr_block = "10.1.0.0/16"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_subnet" "foo" {
|
|
|
|
cidr_block = "10.1.1.0/24"
|
|
|
|
vpc_id = "${aws_vpc.foo.id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
ami = "ami-c5eabbf5"
|
|
|
|
instance_type = "t2.micro"
|
|
|
|
subnet_id = "${aws_subnet.foo.id}"
|
|
|
|
private_ip = "10.1.1.42"
|
|
|
|
}
|
|
|
|
`
|
|
|
|
|
|
|
|
const testAccInstanceConfigAssociatePublicIPAndPrivateIP = `
|
|
|
|
resource "aws_vpc" "foo" {
|
|
|
|
cidr_block = "10.1.0.0/16"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_subnet" "foo" {
|
|
|
|
cidr_block = "10.1.1.0/24"
|
|
|
|
vpc_id = "${aws_vpc.foo.id}"
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "aws_instance" "foo" {
|
|
|
|
ami = "ami-c5eabbf5"
|
|
|
|
instance_type = "t2.micro"
|
|
|
|
subnet_id = "${aws_subnet.foo.id}"
|
|
|
|
associate_public_ip_address = true
|
|
|
|
private_ip = "10.1.1.42"
|
|
|
|
}
|
|
|
|
`
|