2014-07-10 19:20:21 +02:00
|
|
|
package resource
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
2014-07-10 20:31:07 +02:00
|
|
|
"log"
|
2014-07-10 19:20:21 +02:00
|
|
|
"os"
|
2014-09-24 23:23:29 +02:00
|
|
|
"path/filepath"
|
2015-07-12 15:31:09 +02:00
|
|
|
"regexp"
|
2014-07-10 19:20:21 +02:00
|
|
|
"strings"
|
|
|
|
"testing"
|
|
|
|
|
2015-10-15 22:48:58 +02:00
|
|
|
"github.com/hashicorp/go-getter"
|
2014-09-24 23:23:29 +02:00
|
|
|
"github.com/hashicorp/terraform/config/module"
|
2015-12-08 01:10:30 +01:00
|
|
|
"github.com/hashicorp/terraform/helper/logging"
|
2014-07-10 19:20:21 +02:00
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
)
|
|
|
|
|
|
|
|
const TestEnvVar = "TF_ACC"
|
|
|
|
|
|
|
|
// TestCheckFunc is the callback type used with acceptance tests to check
|
|
|
|
// the state of a resource. The state passed in is the latest state known,
|
|
|
|
// or in the case of being after a destroy, it is the last known state when
|
|
|
|
// it was created.
|
|
|
|
type TestCheckFunc func(*terraform.State) error
|
|
|
|
|
|
|
|
// TestCase is a single acceptance test case used to test the apply/destroy
|
|
|
|
// lifecycle of a resource in a specific configuration.
|
2014-07-10 19:30:41 +02:00
|
|
|
//
|
|
|
|
// When the destroy plan is executed, the config from the last TestStep
|
|
|
|
// is used to plan it.
|
2014-07-10 19:20:21 +02:00
|
|
|
type TestCase struct {
|
2014-07-10 22:12:47 +02:00
|
|
|
// PreCheck, if non-nil, will be called before any test steps are
|
|
|
|
// executed. It will only be executed in the case that the steps
|
|
|
|
// would run, so it can be used for some validation before running
|
|
|
|
// acceptance tests, such as verifying that keys are setup.
|
|
|
|
PreCheck func()
|
|
|
|
|
2015-04-20 23:08:28 +02:00
|
|
|
// Providers is the ResourceProvider that will be under test.
|
|
|
|
//
|
|
|
|
// Alternately, ProviderFactories can be specified for the providers
|
|
|
|
// that are valid. This takes priority over Providers.
|
|
|
|
//
|
|
|
|
// The end effect of each is the same: specifying the providers that
|
|
|
|
// are used within the tests.
|
2015-03-23 23:36:53 +01:00
|
|
|
Providers map[string]terraform.ResourceProvider
|
|
|
|
ProviderFactories map[string]terraform.ResourceProviderFactory
|
2014-07-10 19:20:21 +02:00
|
|
|
|
|
|
|
// CheckDestroy is called after the resource is finally destroyed
|
|
|
|
// to allow the tester to test that the resource is truly gone.
|
|
|
|
CheckDestroy TestCheckFunc
|
|
|
|
|
|
|
|
// Steps are the apply sequences done within the context of the
|
|
|
|
// same state. Each step can have its own check to verify correctness.
|
|
|
|
Steps []TestStep
|
|
|
|
}
|
|
|
|
|
|
|
|
// TestStep is a single apply sequence of a test, done within the
|
|
|
|
// context of a state.
|
|
|
|
//
|
|
|
|
// Multiple TestSteps can be sequenced in a Test to allow testing
|
|
|
|
// potentially complex update logic. In general, simply create/destroy
|
|
|
|
// tests will only need one step.
|
|
|
|
type TestStep struct {
|
2015-06-17 20:58:01 +02:00
|
|
|
// PreConfig is called before the Config is applied to perform any per-step
|
|
|
|
// setup that needs to happen
|
|
|
|
PreConfig func()
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// Config a string of the configuration to give to Terraform.
|
|
|
|
Config string
|
|
|
|
|
|
|
|
// Check is called after the Config is applied. Use this step to
|
|
|
|
// make your own API calls to check the status of things, and to
|
|
|
|
// inspect the format of the ResourceState itself.
|
|
|
|
//
|
|
|
|
// If an error is returned, the test will fail. In this case, a
|
|
|
|
// destroy plan will still be attempted.
|
|
|
|
//
|
|
|
|
// If this is nil, no check is done on this step.
|
|
|
|
Check TestCheckFunc
|
|
|
|
|
|
|
|
// Destroy will create a destroy plan if set to true.
|
|
|
|
Destroy bool
|
|
|
|
}
|
|
|
|
|
|
|
|
// Test performs an acceptance test on a resource.
|
|
|
|
//
|
|
|
|
// Tests are not run unless an environmental variable "TF_ACC" is
|
|
|
|
// set to some non-empty value. This is to avoid test cases surprising
|
|
|
|
// a user by creating real resources.
|
|
|
|
//
|
|
|
|
// Tests will fail unless the verbose flag (`go test -v`, or explicitly
|
|
|
|
// the "-test.v" flag) is set. Because some acceptance tests take quite
|
|
|
|
// long, we require the verbose flag so users are able to see progress
|
|
|
|
// output.
|
|
|
|
func Test(t TestT, c TestCase) {
|
|
|
|
// We only run acceptance tests if an env var is set because they're
|
|
|
|
// slow and generally require some outside configuration.
|
|
|
|
if os.Getenv(TestEnvVar) == "" {
|
|
|
|
t.Skip(fmt.Sprintf(
|
|
|
|
"Acceptance tests skipped unless env '%s' set",
|
|
|
|
TestEnvVar))
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2015-12-08 01:10:30 +01:00
|
|
|
logWriter, err := logging.LogOutput()
|
|
|
|
if err != nil {
|
|
|
|
t.Error(fmt.Errorf("error setting up logging: %s", err))
|
|
|
|
}
|
|
|
|
log.SetOutput(logWriter)
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// We require verbose mode so that the user knows what is going on.
|
|
|
|
if !testTesting && !testing.Verbose() {
|
|
|
|
t.Fatal("Acceptance tests must be run with the -v flag on tests")
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
2014-07-10 22:12:47 +02:00
|
|
|
// Run the PreCheck if we have it
|
|
|
|
if c.PreCheck != nil {
|
|
|
|
c.PreCheck()
|
|
|
|
}
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// Build our context options that we can
|
2015-03-23 23:36:53 +01:00
|
|
|
ctxProviders := c.ProviderFactories
|
|
|
|
if ctxProviders == nil {
|
|
|
|
ctxProviders = make(map[string]terraform.ResourceProviderFactory)
|
|
|
|
for k, p := range c.Providers {
|
|
|
|
ctxProviders[k] = terraform.ResourceProviderFactoryFixed(p)
|
|
|
|
}
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
opts := terraform.ContextOpts{Providers: ctxProviders}
|
|
|
|
|
|
|
|
// A single state variable to track the lifecycle, starting with no state
|
|
|
|
var state *terraform.State
|
|
|
|
|
|
|
|
// Go through each step and run it
|
|
|
|
for i, step := range c.Steps {
|
|
|
|
var err error
|
2014-07-10 20:31:07 +02:00
|
|
|
log.Printf("[WARN] Test: Executing step %d", i)
|
2014-07-10 19:20:21 +02:00
|
|
|
state, err = testStep(opts, state, step)
|
|
|
|
if err != nil {
|
|
|
|
t.Error(fmt.Sprintf(
|
|
|
|
"Step %d error: %s", i, err))
|
|
|
|
break
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// If we have a state, then run the destroy
|
|
|
|
if state != nil {
|
|
|
|
destroyStep := TestStep{
|
|
|
|
Config: c.Steps[len(c.Steps)-1].Config,
|
|
|
|
Check: c.CheckDestroy,
|
|
|
|
Destroy: true,
|
|
|
|
}
|
|
|
|
|
2014-07-10 20:31:07 +02:00
|
|
|
log.Printf("[WARN] Test: Executing destroy step")
|
2014-07-10 19:20:21 +02:00
|
|
|
state, err := testStep(opts, state, destroyStep)
|
|
|
|
if err != nil {
|
|
|
|
t.Error(fmt.Sprintf(
|
|
|
|
"Error destroying resource! WARNING: Dangling resources\n"+
|
|
|
|
"may exist. The full state and error is shown below.\n\n"+
|
|
|
|
"Error: %s\n\nState: %s",
|
|
|
|
err,
|
|
|
|
state))
|
|
|
|
}
|
2014-07-10 20:31:07 +02:00
|
|
|
} else {
|
|
|
|
log.Printf("[WARN] Skipping destroy test since there is no state.")
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testStep(
|
|
|
|
opts terraform.ContextOpts,
|
|
|
|
state *terraform.State,
|
|
|
|
step TestStep) (*terraform.State, error) {
|
2015-06-17 20:58:01 +02:00
|
|
|
if step.PreConfig != nil {
|
|
|
|
step.PreConfig()
|
|
|
|
}
|
|
|
|
|
2014-09-24 23:23:29 +02:00
|
|
|
cfgPath, err := ioutil.TempDir("", "tf-test")
|
2014-07-10 19:20:21 +02:00
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
2014-09-24 23:23:29 +02:00
|
|
|
"Error creating temporary directory for config: %s", err)
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
2014-09-24 23:23:29 +02:00
|
|
|
defer os.RemoveAll(cfgPath)
|
2014-07-10 19:20:21 +02:00
|
|
|
|
2014-09-24 23:23:29 +02:00
|
|
|
// Write the configuration
|
|
|
|
cfgF, err := os.Create(filepath.Join(cfgPath, "main.tf"))
|
2014-07-10 19:20:21 +02:00
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Error creating temporary file for config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = io.Copy(cfgF, strings.NewReader(step.Config))
|
|
|
|
cfgF.Close()
|
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Error creating temporary file for config: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Parse the configuration
|
2014-09-24 23:23:29 +02:00
|
|
|
mod, err := module.NewTreeModule("", cfgPath)
|
2014-07-10 19:20:21 +02:00
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
2014-09-24 23:23:29 +02:00
|
|
|
"Error loading configuration: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Load the modules
|
2015-10-15 22:48:58 +02:00
|
|
|
modStorage := &getter.FolderStorage{
|
2014-09-24 23:23:29 +02:00
|
|
|
StorageDir: filepath.Join(cfgPath, ".tfmodules"),
|
|
|
|
}
|
|
|
|
err = mod.Load(modStorage, module.GetModeGet)
|
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf("Error downloading modules: %s", err)
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Build the context
|
2014-09-24 23:23:29 +02:00
|
|
|
opts.Module = mod
|
2014-07-10 20:31:07 +02:00
|
|
|
opts.State = state
|
2015-03-24 17:18:15 +01:00
|
|
|
opts.Destroy = step.Destroy
|
2014-07-10 19:20:21 +02:00
|
|
|
ctx := terraform.NewContext(&opts)
|
|
|
|
if ws, es := ctx.Validate(); len(ws) > 0 || len(es) > 0 {
|
2015-05-06 20:16:48 +02:00
|
|
|
if len(es) > 0 {
|
|
|
|
estrs := make([]string, len(es))
|
|
|
|
for i, e := range es {
|
|
|
|
estrs[i] = e.Error()
|
|
|
|
}
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Configuration is invalid.\n\nWarnings: %#v\n\nErrors: %#v",
|
|
|
|
ws, estrs)
|
2014-07-11 02:01:21 +02:00
|
|
|
}
|
2015-05-06 20:16:48 +02:00
|
|
|
log.Printf("[WARN] Config warnings: %#v", ws)
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
|
2014-07-10 22:21:34 +02:00
|
|
|
// Refresh!
|
|
|
|
state, err = ctx.Refresh()
|
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Error refreshing: %s", err)
|
|
|
|
}
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// Plan!
|
2015-03-24 17:18:15 +01:00
|
|
|
if p, err := ctx.Plan(); err != nil {
|
2014-07-10 19:20:21 +02:00
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Error planning: %s", err)
|
2014-07-11 20:20:18 +02:00
|
|
|
} else {
|
|
|
|
log.Printf("[WARN] Test: Step plan: %s", p)
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
|
2015-12-10 19:09:57 +01:00
|
|
|
// We need to keep a copy of the state prior to destroying
|
|
|
|
// such that destroy steps can verify their behaviour in the check
|
|
|
|
// function
|
|
|
|
stateBeforeApplication := state.DeepCopy()
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// Apply!
|
|
|
|
state, err = ctx.Apply()
|
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf("Error applying: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Check! Excitement!
|
|
|
|
if step.Check != nil {
|
2015-12-10 19:09:57 +01:00
|
|
|
if step.Destroy {
|
|
|
|
if err := step.Check(stateBeforeApplication); err != nil {
|
|
|
|
return state, fmt.Errorf("Check failed: %s", err)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if err := step.Check(state); err != nil {
|
|
|
|
return state, fmt.Errorf("Check failed: %s", err)
|
|
|
|
}
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-30 17:13:32 +02:00
|
|
|
// Now, verify that Plan is now empty and we don't have a perpetual diff issue
|
|
|
|
// We do this with TWO plans. One without a refresh.
|
2015-04-09 15:21:24 +02:00
|
|
|
if p, err := ctx.Plan(); err != nil {
|
|
|
|
return state, fmt.Errorf("Error on follow-up plan: %s", err)
|
|
|
|
} else {
|
|
|
|
if p.Diff != nil && !p.Diff.Empty() {
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"After applying this step, the plan was not empty:\n\n%s", p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-04-30 17:13:32 +02:00
|
|
|
// And another after a Refresh.
|
|
|
|
state, err = ctx.Refresh()
|
|
|
|
if err != nil {
|
|
|
|
return state, fmt.Errorf(
|
|
|
|
"Error on follow-up refresh: %s", err)
|
|
|
|
}
|
|
|
|
if p, err := ctx.Plan(); err != nil {
|
|
|
|
return state, fmt.Errorf("Error on second follow-up plan: %s", err)
|
|
|
|
} else {
|
2015-05-09 00:46:37 +02:00
|
|
|
if p.Diff != nil && !p.Diff.Empty() {
|
2015-04-30 17:13:32 +02:00
|
|
|
return state, fmt.Errorf(
|
|
|
|
"After applying this step and refreshing, the plan was not empty:\n\n%s", p)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-05-01 18:22:06 +02:00
|
|
|
// Made it here? Good job test step!
|
|
|
|
return state, nil
|
2014-07-10 19:20:21 +02:00
|
|
|
}
|
|
|
|
|
2014-07-10 22:29:38 +02:00
|
|
|
// ComposeTestCheckFunc lets you compose multiple TestCheckFuncs into
|
|
|
|
// a single TestCheckFunc.
|
|
|
|
//
|
|
|
|
// As a user testing their provider, this lets you decompose your checks
|
|
|
|
// into smaller pieces more easily.
|
|
|
|
func ComposeTestCheckFunc(fs ...TestCheckFunc) TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
|
|
|
for _, f := range fs {
|
|
|
|
if err := f(s); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-10 23:00:20 +02:00
|
|
|
func TestCheckResourceAttr(name, key, value string) TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
2014-09-17 02:02:05 +02:00
|
|
|
ms := s.RootModule()
|
|
|
|
rs, ok := ms.Resources[name]
|
2014-07-10 23:00:20 +02:00
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("Not found: %s", name)
|
|
|
|
}
|
|
|
|
|
2014-09-17 02:02:05 +02:00
|
|
|
is := rs.Primary
|
|
|
|
if is == nil {
|
|
|
|
return fmt.Errorf("No primary instance: %s", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if is.Attributes[key] != value {
|
2014-07-10 23:00:20 +02:00
|
|
|
return fmt.Errorf(
|
|
|
|
"%s: Attribute '%s' expected %#v, got %#v",
|
|
|
|
name,
|
|
|
|
key,
|
|
|
|
value,
|
2014-09-17 02:02:05 +02:00
|
|
|
is.Attributes[key])
|
2014-07-10 23:00:20 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-12 15:31:09 +02:00
|
|
|
func TestMatchResourceAttr(name, key string, r *regexp.Regexp) TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
|
|
|
ms := s.RootModule()
|
|
|
|
rs, ok := ms.Resources[name]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("Not found: %s", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
is := rs.Primary
|
|
|
|
if is == nil {
|
|
|
|
return fmt.Errorf("No primary instance: %s", name)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !r.MatchString(is.Attributes[key]) {
|
|
|
|
return fmt.Errorf(
|
|
|
|
"%s: Attribute '%s' didn't match %q, got %#v",
|
|
|
|
name,
|
|
|
|
key,
|
|
|
|
r.String(),
|
|
|
|
is.Attributes[key])
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-02-18 01:12:02 +01:00
|
|
|
// TestCheckResourceAttrPtr is like TestCheckResourceAttr except the
|
|
|
|
// value is a pointer so that it can be updated while the test is running.
|
|
|
|
// It will only be dereferenced at the point this step is run.
|
|
|
|
func TestCheckResourceAttrPtr(name string, key string, value *string) TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
|
|
|
return TestCheckResourceAttr(name, key, *value)(s)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-07-10 19:20:21 +02:00
|
|
|
// TestT is the interface used to handle the test lifecycle of a test.
|
|
|
|
//
|
|
|
|
// Users should just use a *testing.T object, which implements this.
|
|
|
|
type TestT interface {
|
|
|
|
Error(args ...interface{})
|
|
|
|
Fatal(args ...interface{})
|
|
|
|
Skip(args ...interface{})
|
|
|
|
}
|
|
|
|
|
|
|
|
// This is set to true by unit tests to alter some behavior
|
|
|
|
var testTesting = false
|