core: fix diff mismatch when RequiresNew field and list both change
fixes #1752 Includes AccTest reproducing example from the issue as well as a bunch of explanatory comments in the tests and impls.
This commit is contained in:
parent
ead4865b7f
commit
4af2c5f5dd
|
@ -513,6 +513,41 @@ func TestAccAWSInstance_rootBlockDeviceMismatch(t *testing.T) {
|
||||||
})
|
})
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// This test reproduces the bug here:
|
||||||
|
// https://github.com/hashicorp/terraform/issues/1752
|
||||||
|
//
|
||||||
|
// I wish there were a way to exercise resources built with helper.Schema in a
|
||||||
|
// unit context, in which case this test could be moved there, but for now this
|
||||||
|
// will cover the bugfix.
|
||||||
|
//
|
||||||
|
// The following triggers "diffs didn't match during apply" without the fix in to
|
||||||
|
// set NewRemoved on the .# field when it changes to 0.
|
||||||
|
func TestAccAWSInstance_forceNewAndTagsDrift(t *testing.T) {
|
||||||
|
var v ec2.Instance
|
||||||
|
|
||||||
|
resource.Test(t, resource.TestCase{
|
||||||
|
PreCheck: func() { testAccPreCheck(t) },
|
||||||
|
Providers: testAccProviders,
|
||||||
|
CheckDestroy: testAccCheckInstanceDestroy,
|
||||||
|
Steps: []resource.TestStep{
|
||||||
|
resource.TestStep{
|
||||||
|
Config: testAccInstanceConfigForceNewAndTagsDrift,
|
||||||
|
Check: resource.ComposeTestCheckFunc(
|
||||||
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
||||||
|
driftTags(&v),
|
||||||
|
),
|
||||||
|
ExpectNonEmptyPlan: true,
|
||||||
|
},
|
||||||
|
resource.TestStep{
|
||||||
|
Config: testAccInstanceConfigForceNewAndTagsDrift_Update,
|
||||||
|
Check: resource.ComposeTestCheckFunc(
|
||||||
|
testAccCheckInstanceExists("aws_instance.foo", &v),
|
||||||
|
),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func testAccCheckInstanceDestroy(s *terraform.State) error {
|
func testAccCheckInstanceDestroy(s *terraform.State) error {
|
||||||
return testAccCheckInstanceDestroyWithProvider(s, testAccProvider)
|
return testAccCheckInstanceDestroyWithProvider(s, testAccProvider)
|
||||||
}
|
}
|
||||||
|
@ -622,6 +657,22 @@ func TestInstanceTenancySchema(t *testing.T) {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func driftTags(instance *ec2.Instance) resource.TestCheckFunc {
|
||||||
|
return func(s *terraform.State) error {
|
||||||
|
conn := testAccProvider.Meta().(*AWSClient).ec2conn
|
||||||
|
_, err := conn.CreateTags(&ec2.CreateTagsInput{
|
||||||
|
Resources: []*string{instance.InstanceId},
|
||||||
|
Tags: []*ec2.Tag{
|
||||||
|
&ec2.Tag{
|
||||||
|
Key: aws.String("Drift"),
|
||||||
|
Value: aws.String("Happens"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
})
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
const testAccInstanceConfig_pre = `
|
const testAccInstanceConfig_pre = `
|
||||||
resource "aws_security_group" "tf_test_foo" {
|
resource "aws_security_group" "tf_test_foo" {
|
||||||
name = "tf_test_foo"
|
name = "tf_test_foo"
|
||||||
|
@ -988,3 +1039,37 @@ resource "aws_instance" "foo" {
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
`
|
`
|
||||||
|
|
||||||
|
const testAccInstanceConfigForceNewAndTagsDrift = `
|
||||||
|
resource "aws_vpc" "foo" {
|
||||||
|
cidr_block = "10.1.0.0/16"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_subnet" "foo" {
|
||||||
|
cidr_block = "10.1.1.0/24"
|
||||||
|
vpc_id = "${aws_vpc.foo.id}"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_instance" "foo" {
|
||||||
|
ami = "ami-22b9a343"
|
||||||
|
instance_type = "t2.nano"
|
||||||
|
subnet_id = "${aws_subnet.foo.id}"
|
||||||
|
}
|
||||||
|
`
|
||||||
|
|
||||||
|
const testAccInstanceConfigForceNewAndTagsDrift_Update = `
|
||||||
|
resource "aws_vpc" "foo" {
|
||||||
|
cidr_block = "10.1.0.0/16"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_subnet" "foo" {
|
||||||
|
cidr_block = "10.1.1.0/24"
|
||||||
|
vpc_id = "${aws_vpc.foo.id}"
|
||||||
|
}
|
||||||
|
|
||||||
|
resource "aws_instance" "foo" {
|
||||||
|
ami = "ami-22b9a343"
|
||||||
|
instance_type = "t2.micro"
|
||||||
|
subnet_id = "${aws_subnet.foo.id}"
|
||||||
|
}
|
||||||
|
`
|
||||||
|
|
|
@ -466,6 +466,13 @@ func (d *InstanceDiff) Same(d2 *InstanceDiff) (bool, string) {
|
||||||
ok = true
|
ok = true
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Similarly, in a RequiresNew scenario, a list that shows up in the plan
|
||||||
|
// diff can disappear from the apply diff, which is calculated from an
|
||||||
|
// empty state.
|
||||||
|
if d.RequiresNew() && strings.HasSuffix(k, ".#") {
|
||||||
|
ok = true
|
||||||
|
}
|
||||||
|
|
||||||
if !ok {
|
if !ok {
|
||||||
return false, fmt.Sprintf("attribute mismatch: %s", k)
|
return false, fmt.Sprintf("attribute mismatch: %s", k)
|
||||||
}
|
}
|
||||||
|
|
|
@ -553,6 +553,43 @@ func TestInstanceDiffSame(t *testing.T) {
|
||||||
true,
|
true,
|
||||||
"",
|
"",
|
||||||
},
|
},
|
||||||
|
|
||||||
|
// Another thing that can occur in DESTROY/CREATE scenarios is that list
|
||||||
|
// values that are going to zero have diffs that show up at plan time but
|
||||||
|
// are gone at apply time. The NewRemoved handling catches the fields and
|
||||||
|
// treats them as OK, but it also needs to treat the .# field itself as
|
||||||
|
// okay to be present in the old diff but not in the new one.
|
||||||
|
{
|
||||||
|
&InstanceDiff{
|
||||||
|
Attributes: map[string]*ResourceAttrDiff{
|
||||||
|
"reqnew": &ResourceAttrDiff{
|
||||||
|
Old: "old",
|
||||||
|
New: "new",
|
||||||
|
RequiresNew: true,
|
||||||
|
},
|
||||||
|
"somemap.#": &ResourceAttrDiff{
|
||||||
|
Old: "1",
|
||||||
|
New: "0",
|
||||||
|
},
|
||||||
|
"somemap.oldkey": &ResourceAttrDiff{
|
||||||
|
Old: "long ago",
|
||||||
|
New: "",
|
||||||
|
NewRemoved: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
&InstanceDiff{
|
||||||
|
Attributes: map[string]*ResourceAttrDiff{
|
||||||
|
"reqnew": &ResourceAttrDiff{
|
||||||
|
Old: "",
|
||||||
|
New: "new",
|
||||||
|
RequiresNew: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
true,
|
||||||
|
"",
|
||||||
|
},
|
||||||
}
|
}
|
||||||
|
|
||||||
for i, tc := range cases {
|
for i, tc := range cases {
|
||||||
|
|
Loading…
Reference in New Issue