provider/azurerm: Scaffolding the AzureRM Virtual Machine Test framework

This commit is contained in:
stack72 2016-03-07 23:23:25 +01:00 committed by James Nugent
parent cb109043f2
commit 4db3242c53
2 changed files with 468 additions and 59 deletions

View File

@ -5,9 +5,11 @@ import (
"fmt" "fmt"
"log" "log"
"net/http" "net/http"
"time"
"github.com/Azure/azure-sdk-for-go/arm/compute" "github.com/Azure/azure-sdk-for-go/arm/compute"
"github.com/hashicorp/terraform/helper/hashcode" "github.com/hashicorp/terraform/helper/hashcode"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/helper/schema" "github.com/hashicorp/terraform/helper/schema"
) )
@ -15,7 +17,7 @@ func resourceArmVirtualMachine() *schema.Resource {
return &schema.Resource{ return &schema.Resource{
Create: resourceArmVirtualMachineCreate, Create: resourceArmVirtualMachineCreate,
Read: resourceArmVirtualMachineRead, Read: resourceArmVirtualMachineRead,
Update: resourceArmVirtualMachineUpdate, Update: resourceArmVirtualMachineCreate,
Delete: resourceArmVirtualMachineDelete, Delete: resourceArmVirtualMachineDelete,
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
@ -103,7 +105,8 @@ func resourceArmVirtualMachine() *schema.Resource {
"version": &schema.Schema{ "version": &schema.Schema{
Type: schema.TypeString, Type: schema.TypeString,
Required: true, Optional: true,
Computed: true,
}, },
}, },
}, },
@ -261,6 +264,7 @@ func resourceArmVirtualMachine() *schema.Resource {
}, },
}, },
}, },
Set: resourceArmVirtualMachineStorageOsProfileWindowsConfigHash,
}, },
"os_profile_linux_config": &schema.Schema{ "os_profile_linux_config": &schema.Schema{
@ -269,12 +273,12 @@ func resourceArmVirtualMachine() *schema.Resource {
Elem: &schema.Resource{ Elem: &schema.Resource{
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
"disable_password_authentication": &schema.Schema{ "disable_password_authentication": &schema.Schema{
Type: schema.TypeString, Type: schema.TypeBool,
Required: true, Required: true,
}, },
"ssh_keys": &schema.Schema{ "ssh_keys": &schema.Schema{
Type: schema.TypeSet, Type: schema.TypeSet,
Required: true, Optional: true,
Elem: &schema.Resource{ Elem: &schema.Resource{
Schema: map[string]*schema.Schema{ Schema: map[string]*schema.Schema{
"path": &schema.Schema{ "path": &schema.Schema{
@ -287,9 +291,11 @@ func resourceArmVirtualMachine() *schema.Resource {
}, },
}, },
}, },
Set: resourceArmVirtualMachineStorageOsProfileLinuxConfigSshKeyHash,
}, },
}, },
}, },
Set: resourceArmVirtualMachineStorageOsProfileLinuxConfigHash,
}, },
"os_profile_secrets": &schema.Schema{ "os_profile_secrets": &schema.Schema{
@ -406,9 +412,22 @@ func resourceArmVirtualMachineCreate(d *schema.ResourceData, meta interface{}) e
vm.Plan = plan vm.Plan = plan
} }
_, err = vmClient.CreateOrUpdate(resGroup, name, vm) resp, vmErr := vmClient.CreateOrUpdate(resGroup, name, vm)
if err != nil { if vmErr != nil {
return err return vmErr
}
d.SetId(*resp.ID)
log.Printf("[DEBUG] Waiting for Virtual Machine (%s) to become available", name)
stateConf := &resource.StateChangeConf{
Pending: []string{"Creating", "Updating"},
Target: []string{"Succeeded"},
Refresh: virtualMachineStateRefreshFunc(client, resGroup, name),
Timeout: 10 * time.Minute,
}
if _, err := stateConf.WaitForState(); err != nil {
return fmt.Errorf("Error waiting for Virtual Machine (%s) to become available: %s", name, err)
} }
return resourceArmVirtualMachineRead(d, meta) return resourceArmVirtualMachineRead(d, meta)
@ -432,11 +451,64 @@ func resourceArmVirtualMachineRead(d *schema.ResourceData, meta interface{}) err
if err != nil { if err != nil {
return fmt.Errorf("Error making Read request on Azure Virtual Machine %s: %s", name, err) return fmt.Errorf("Error making Read request on Azure Virtual Machine %s: %s", name, err)
} }
return nil
}
func resourceArmVirtualMachineUpdate(d *schema.ResourceData, meta interface{}) error { if resp.Plan != nil {
return resourceArmVirtualMachineRead(d, meta) if err := d.Set("plan", flattenAzureRmVirtualMachinePlan(resp.Plan)); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Plan error: %#v", err)
}
}
if resp.Properties.AvailabilitySet != nil {
d.Set("availability_set_id", resp.Properties.AvailabilitySet.ID)
}
d.Set("vm_size", resp.Properties.HardwareProfile.VMSize)
if resp.Properties.StorageProfile.ImageReference != nil {
if err := d.Set("storage_image_reference", schema.NewSet(resourceArmVirtualMachineStorageImageReferenceHash, flattenAzureRmVirtualMachineImageReference(resp.Properties.StorageProfile.ImageReference))); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage Image Reference error: %#v", err)
}
}
if err := d.Set("storage_os_disk", schema.NewSet(resourceArmVirtualMachineStorageOsDiskHash, flattenAzureRmVirtualMachineOsDisk(resp.Properties.StorageProfile.OsDisk))); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage OS Disk error: %#v", err)
}
if resp.Properties.StorageProfile.DataDisks != nil {
if err := d.Set("storage_data_disk", flattenAzureRmVirtualMachineDataDisk(resp.Properties.StorageProfile.DataDisks)); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage Data Disks error: %#v", err)
}
}
if err := d.Set("os_profile", schema.NewSet(resourceArmVirtualMachineStorageOsProfileHash, flattenAzureRmVirtualMachineOsProfile(resp.Properties.OsProfile))); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage OS Profile: %#v", err)
}
if resp.Properties.OsProfile.WindowsConfiguration != nil {
if err := d.Set("os_profile_windows_config", schema.NewSet(resourceArmVirtualMachineStorageOsProfileWindowsConfigHash, flattenAzureRmVirtualMachineOsProfileWindowsConfiguration(resp.Properties.OsProfile.WindowsConfiguration))); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage OS Profile Windows Configuration: %#v", err)
}
}
if resp.Properties.OsProfile.LinuxConfiguration != nil {
if err := d.Set("os_profile_linux_config", schema.NewSet(resourceArmVirtualMachineStorageOsProfileLinuxConfigHash, flattenAzureRmVirtualMachineOsProfileLinuxConfiguration(resp.Properties.OsProfile.LinuxConfiguration))); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage OS Profile Linux Configuration: %#v", err)
}
}
if resp.Properties.OsProfile.Secrets != nil {
if err := d.Set("os_profile_secrets", flattenAzureRmVirtualMachineOsProfileSecrets(resp.Properties.OsProfile.Secrets)); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage OS Profile Secrets: %#v", err)
}
}
if resp.Properties.NetworkProfile != nil {
if err := d.Set("network_interface_ids", flattenAzureRmVirtualMachineNetworkInterfaces(resp.Properties.NetworkProfile)); err != nil {
return fmt.Errorf("[DEBUG] Error setting Virtual Machine Storage Network Interfaces: %#v", err)
}
}
return nil
} }
func resourceArmVirtualMachineDelete(d *schema.ResourceData, meta interface{}) error { func resourceArmVirtualMachineDelete(d *schema.ResourceData, meta interface{}) error {
@ -454,6 +526,17 @@ func resourceArmVirtualMachineDelete(d *schema.ResourceData, meta interface{}) e
return err return err
} }
func virtualMachineStateRefreshFunc(client *ArmClient, resourceGroupName string, vmName string) resource.StateRefreshFunc {
return func() (interface{}, string, error) {
res, err := client.vmClient.Get(resourceGroupName, vmName, "")
if err != nil {
return nil, "", fmt.Errorf("Error issuing read request in virtualMachineStateRefreshFunc to Azure ARM for Virtual Machine '%s' (RG: '%s'): %s", vmName, resourceGroupName, err)
}
return res, *res.Properties.ProvisioningState, nil
}
}
func resourceArmVirtualMachinePlanHash(v interface{}) int { func resourceArmVirtualMachinePlanHash(v interface{}) int {
var buf bytes.Buffer var buf bytes.Buffer
m := v.(map[string]interface{}) m := v.(map[string]interface{})
@ -470,7 +553,6 @@ func resourceArmVirtualMachineStorageImageReferenceHash(v interface{}) int {
buf.WriteString(fmt.Sprintf("%s-", m["publisher"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["publisher"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["offer"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["offer"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["sku"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["sku"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["version"].(string)))
return hashcode.String(buf.String()) return hashcode.String(buf.String())
} }
@ -479,7 +561,7 @@ func resourceArmVirtualMachineStorageOsProfileHash(v interface{}) int {
var buf bytes.Buffer var buf bytes.Buffer
m := v.(map[string]interface{}) m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%s-", m["admin_username"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["admin_username"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["admin_password"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["computer_name"].(string)))
return hashcode.String(buf.String()) return hashcode.String(buf.String())
} }
@ -500,11 +582,204 @@ func resourceArmVirtualMachineStorageOsDiskHash(v interface{}) int {
m := v.(map[string]interface{}) m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%s-", m["name"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["name"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["vhd_uri"].(string))) buf.WriteString(fmt.Sprintf("%s-", m["vhd_uri"].(string)))
buf.WriteString(fmt.Sprintf("%s-", m["create_option"].(string)))
return hashcode.String(buf.String()) return hashcode.String(buf.String())
} }
func resourceArmVirtualMachineStorageOsProfileLinuxConfigSshKeyHash(v interface{}) int {
var buf bytes.Buffer
m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%s-", m["path"].(string)))
if m["key_data"] != nil {
buf.WriteString(fmt.Sprintf("%s-", m["key_data"].(string)))
}
return hashcode.String(buf.String())
}
func resourceArmVirtualMachineStorageOsProfileLinuxConfigHash(v interface{}) int {
var buf bytes.Buffer
m := v.(map[string]interface{})
buf.WriteString(fmt.Sprintf("%t-", m["disable_password_authentication"].(bool)))
return hashcode.String(buf.String())
}
func resourceArmVirtualMachineStorageOsProfileWindowsConfigHash(v interface{}) int {
var buf bytes.Buffer
m := v.(map[string]interface{})
if m["provision_vm_agent"] != nil {
buf.WriteString(fmt.Sprintf("%t-", m["provision_vm_agent"].(bool)))
}
if m["enable_automatic_upgrades"] != nil {
buf.WriteString(fmt.Sprintf("%t-", m["enable_automatic_upgrades"].(bool)))
}
return hashcode.String(buf.String())
}
func flattenAzureRmVirtualMachinePlan(plan *compute.Plan) map[string]interface{} {
result := make(map[string]interface{})
result["name"] = *plan.Name
result["publisher"] = *plan.Publisher
result["product"] = *plan.Product
return result
}
func flattenAzureRmVirtualMachineImageReference(image *compute.ImageReference) []interface{} {
result := make(map[string]interface{})
result["offer"] = *image.Offer
result["publisher"] = *image.Publisher
result["sku"] = *image.Sku
if image.Version != nil {
result["version"] = *image.Version
}
return []interface{}{result}
}
func flattenAzureRmVirtualMachineNetworkInterfaces(profile *compute.NetworkProfile) []string {
result := make([]string, 0, len(*profile.NetworkInterfaces))
for _, nic := range *profile.NetworkInterfaces {
result = append(result, *nic.ID)
}
return result
}
func flattenAzureRmVirtualMachineOsProfileSecrets(secrets *[]compute.VaultSecretGroup) []map[string]interface{} {
result := make([]map[string]interface{}, 0, len(*secrets))
for _, secret := range *secrets {
s := map[string]interface{}{
"source_vault_id": *secret.SourceVault.ID,
}
if secret.VaultCertificates != nil {
certs := make([]map[string]interface{}, 0, len(*secret.VaultCertificates))
for _, cert := range *secret.VaultCertificates {
vaultCert := make(map[string]interface{})
vaultCert["certificate_url"] = *cert.CertificateURL
if cert.CertificateStore != nil {
vaultCert["certificate_store"] = *cert.CertificateStore
}
certs = append(certs, vaultCert)
}
s["vault_certificates"] = certs
}
result = append(result, s)
}
return result
}
func flattenAzureRmVirtualMachineDataDisk(disks *[]compute.DataDisk) []map[string]interface{} {
result := make([]map[string]interface{}, 0, len(*disks))
for _, i := range *disks {
l := make(map[string]interface{})
l["name"] = *i.Name
l["vhd_url"] = *i.Vhd.URI
l["create_option"] = i.CreateOption
l["disk_size_gb"] = *i.DiskSizeGB
l["lun"] = *i.Lun
result = append(result, l)
}
return result
}
func flattenAzureRmVirtualMachineOsProfile(osProfile *compute.OSProfile) []interface{} {
result := make(map[string]interface{})
result["computer_name"] = *osProfile.ComputerName
result["admin_username"] = *osProfile.AdminUsername
if osProfile.CustomData != nil {
result["custom_data"] = *osProfile.CustomData
}
return []interface{}{result}
}
func flattenAzureRmVirtualMachineOsProfileWindowsConfiguration(config *compute.WindowsConfiguration) []interface{} {
result := make(map[string]interface{})
if config.ProvisionVMAgent != nil {
result["provision_vm_agent"] = *config.ProvisionVMAgent
}
if config.EnableAutomaticUpdates != nil {
result["enable_automatic_upgrades"] = *config.EnableAutomaticUpdates
}
if config.WinRM != nil {
listeners := make([]map[string]interface{}, 0, len(*config.WinRM.Listeners))
for _, i := range *config.WinRM.Listeners {
listener := make(map[string]interface{})
listener["protocol"] = i.Protocol
if i.CertificateURL != nil {
listener["certificate_url"] = *i.CertificateURL
}
listeners = append(listeners, listener)
}
result["winrm"] = listeners
}
if config.AdditionalUnattendContent != nil {
content := make([]map[string]interface{}, 0, len(*config.AdditionalUnattendContent))
for _, i := range *config.AdditionalUnattendContent {
c := make(map[string]interface{})
c["pass"] = i.PassName
c["component"] = i.ComponentName
c["setting_name"] = i.SettingName
c["content"] = *i.Content
content = append(content, c)
}
result["additional_unattend_config"] = content
}
return []interface{}{result}
}
func flattenAzureRmVirtualMachineOsProfileLinuxConfiguration(config *compute.LinuxConfiguration) []interface{} {
result := map[string]interface{}{
"disable_password_authentication": *config.DisablePasswordAuthentication,
}
if config.SSH != nil && len(*config.SSH.PublicKeys) > 0 {
ssh_keys := make([]map[string]interface{}, 0, len(*config.SSH.PublicKeys))
for _, i := range *config.SSH.PublicKeys {
key := make(map[string]interface{})
key["name"] = *i.Path
if i.KeyData != nil {
key["key_data"] = *i.KeyData
}
ssh_keys = append(ssh_keys, key)
}
result["ssh_keys"] = ssh_keys
}
return []interface{}{result}
}
func flattenAzureRmVirtualMachineOsDisk(disk *compute.OSDisk) []interface{} {
result := make(map[string]interface{})
result["name"] = *disk.Name
result["vhd_uri"] = *disk.Vhd.URI
result["create_option"] = disk.CreateOption
result["caching"] = disk.Caching
return []interface{}{result}
}
func expandAzureRmVirtualMachinePlan(d *schema.ResourceData) (*compute.Plan, error) { func expandAzureRmVirtualMachinePlan(d *schema.ResourceData) (*compute.Plan, error) {
planConfigs := d.Get("plan").(*schema.Set).List() planConfigs := d.Get("plan").(*schema.Set).List()
@ -538,10 +813,8 @@ func expandAzureRmVirtualMachineOsProfile(d *schema.ResourceData) (*compute.OSPr
adminPassword := osProfile["admin_password"].(string) adminPassword := osProfile["admin_password"].(string)
profile := &compute.OSProfile{ profile := &compute.OSProfile{
AdminUsername: &adminUsername, AdminUsername: &adminUsername,
AdminPassword: &adminPassword, AdminPassword: &adminPassword,
WindowsConfiguration: &compute.WindowsConfiguration{},
LinuxConfiguration: &compute.LinuxConfiguration{},
} }
if _, ok := d.GetOk("os_profile_windows_config"); ok { if _, ok := d.GetOk("os_profile_windows_config"); ok {
@ -678,45 +951,48 @@ func expandAzureRmVirtualMachineOsProfileWindowsConfig(d *schema.ResourceData) (
if v := osProfileConfig["winrm"]; v != nil { if v := osProfileConfig["winrm"]; v != nil {
winRm := v.(*schema.Set).List() winRm := v.(*schema.Set).List()
winRmListners := make([]compute.WinRMListener, 0, len(winRm)) if len(winRm) > 0 {
for _, winRmConfig := range winRm { winRmListners := make([]compute.WinRMListener, 0, len(winRm))
config := winRmConfig.(map[string]interface{}) for _, winRmConfig := range winRm {
config := winRmConfig.(map[string]interface{})
protocol := config["protocol"].(string) protocol := config["protocol"].(string)
winRmListner := compute.WinRMListener{ winRmListner := compute.WinRMListener{
Protocol: compute.ProtocolTypes(protocol), Protocol: compute.ProtocolTypes(protocol),
} }
if v := config["certificate_url"].(string); v != "" { if v := config["certificate_url"].(string); v != "" {
winRmListner.CertificateURL = &v winRmListner.CertificateURL = &v
} }
winRmListners = append(winRmListners, winRmListner) winRmListners = append(winRmListners, winRmListner)
} }
config.WinRM = &compute.WinRMConfiguration{ config.WinRM = &compute.WinRMConfiguration{
Listeners: &winRmListners, Listeners: &winRmListners,
}
} }
} }
if v := osProfileConfig["additional_unattend_config"]; v != nil { if v := osProfileConfig["additional_unattend_config"]; v != nil {
additionalConfig := v.(*schema.Set).List() additionalConfig := v.(*schema.Set).List()
additionalConfigContent := make([]compute.AdditionalUnattendContent, 0, len(additionalConfig)) if len(additionalConfig) > 0 {
for _, addConfig := range additionalConfig { additionalConfigContent := make([]compute.AdditionalUnattendContent, 0, len(additionalConfig))
config := addConfig.(map[string]interface{}) for _, addConfig := range additionalConfig {
pass := config["pass"].(string) config := addConfig.(map[string]interface{})
component := config["component"].(string) pass := config["pass"].(string)
settingName := config["setting_name"].(string) component := config["component"].(string)
content := config["content"].(string) settingName := config["setting_name"].(string)
content := config["content"].(string)
addContent := compute.AdditionalUnattendContent{ addContent := compute.AdditionalUnattendContent{
PassName: compute.PassNames(pass), PassName: compute.PassNames(pass),
ComponentName: compute.ComponentNames(component), ComponentName: compute.ComponentNames(component),
SettingName: compute.SettingNames(settingName), SettingName: compute.SettingNames(settingName),
Content: &content, Content: &content,
}
additionalConfigContent = append(additionalConfigContent, addContent)
} }
config.AdditionalUnattendContent = &additionalConfigContent
additionalConfigContent = append(additionalConfigContent, addContent)
} }
config.AdditionalUnattendContent = &additionalConfigContent
} }
return config, nil return config, nil
} }

View File

@ -5,19 +5,39 @@ import (
"net/http" "net/http"
"testing" "testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform" "github.com/hashicorp/terraform/terraform"
) )
func TestAccAzureRMVirtualMachine_basic(t *testing.T) { func TestAccAzureRMVirtualMachine_basicLinuxMachine(t *testing.T) {
ri := acctest.RandInt()
config := fmt.Sprintf(testAccAzureRMVirtualMachine_basicLinuxMachine, ri, ri, ri, ri, ri, ri, ri)
resource.Test(t, resource.TestCase{ resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) }, PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders, Providers: testAccProviders,
CheckDestroy: testCheckAzureRMVirtualMachineDestroy, CheckDestroy: testCheckAzureRMVirtualMachineDestroy,
Steps: []resource.TestStep{ Steps: []resource.TestStep{
resource.TestStep{ resource.TestStep{
Config: testAccAzureRMVirtualMachine_basic, Config: config,
Check: resource.ComposeTestCheckFunc(
testCheckAzureRMVirtualMachineExists("azurerm_virtual_machine.test"),
),
},
},
})
}
func TestAccAzureRMVirtualMachine_basicWindowsMachine(t *testing.T) {
ri := acctest.RandInt()
config := fmt.Sprintf(testAccAzureRMVirtualMachine_basicWindowsMachine, ri, ri, ri, ri, ri, ri)
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMVirtualMachineDestroy,
Steps: []resource.TestStep{
resource.TestStep{
Config: config,
Check: resource.ComposeTestCheckFunc( Check: resource.ComposeTestCheckFunc(
testCheckAzureRMVirtualMachineExists("azurerm_virtual_machine.test"), testCheckAzureRMVirtualMachineExists("azurerm_virtual_machine.test"),
), ),
@ -80,28 +100,28 @@ func testCheckAzureRMVirtualMachineDestroy(s *terraform.State) error {
return nil return nil
} }
var testAccAzureRMVirtualMachine_basic = ` var testAccAzureRMVirtualMachine_basicLinuxMachine = `
resource "azurerm_resource_group" "test" { resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1" name = "acctestrg-%d"
location = "West US" location = "West US"
} }
resource "azurerm_virtual_network" "test" { resource "azurerm_virtual_network" "test" {
name = "acceptanceTestVirtualNetwork1" name = "acctvn-%d"
address_space = ["10.0.0.0/16"] address_space = ["10.0.0.0/16"]
location = "West US" location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}" resource_group_name = "${azurerm_resource_group.test.name}"
} }
resource "azurerm_subnet" "test" { resource "azurerm_subnet" "test" {
name = "testsubnet" name = "acctsub-%d"
resource_group_name = "${azurerm_resource_group.test.name}" resource_group_name = "${azurerm_resource_group.test.name}"
virtual_network_name = "${azurerm_virtual_network.test.name}" virtual_network_name = "${azurerm_virtual_network.test.name}"
address_prefix = "10.0.2.0/24" address_prefix = "10.0.2.0/24"
} }
resource "azurerm_network_interface" "test" { resource "azurerm_network_interface" "test" {
name = "acceptanceTestNetworkInterface1" name = "acctni-%d"
location = "West US" location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}" resource_group_name = "${azurerm_resource_group.test.name}"
@ -112,24 +132,137 @@ resource "azurerm_network_interface" "test" {
} }
} }
resource "azurerm_storage_account" "test" {
name = "accsa%d"
resource_group_name = "${azurerm_resource_group.test.name}"
location = "westus"
account_type = "Standard_LRS"
tags {
environment = "staging"
}
}
resource "azurerm_storage_container" "test" {
name = "vhds"
resource_group_name = "${azurerm_resource_group.test.name}"
storage_account_name = "${azurerm_storage_account.test.name}"
container_access_type = "private"
}
resource "azurerm_virtual_machine" "test" { resource "azurerm_virtual_machine" "test" {
name = "acceptanceTestVirtualMachine1" name = "acctvm-%d"
location = "West US" location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}" resource_group_name = "${azurerm_resource_group.test.name}"
network_interface_ids = ["${azurerm_network_interface.test.id}"] network_interface_ids = ["${azurerm_network_interface.test.id}"]
vm_size = "Standard_A0" vm_size = "Standard_A0"
storage_image_reference {
publisher = "Canonical"
offer = "UbuntuServer"
sku = "14.04.2-LTS"
version = "latest"
}
storage_os_disk { storage_os_disk {
name = "myosdisk1" name = "myosdisk1"
vhd_uri = "http://mystorage1.blob.core.windows.net/vhds/myosdisk1.vhd" vhd_uri = "${azurerm_storage_account.test.primary_blob_endpoint}${azurerm_storage_container.test.name}/myosdisk1.vhd"
caching = "ReadWrite" caching = "ReadWrite"
create_option = "FromImage" create_option = "FromImage"
} }
os_profile { os_profile {
computer_name = "my_computer" computer_name = "hostname%d"
admin_username = "testadmin" admin_username = "testadmin"
admin_password = "Password1234!" admin_password = "Password1234!"
} }
os_profile_linux_config {
disable_password_authentication = false
}
}
`
var testAccAzureRMVirtualMachine_basicWindowsMachine = `
resource "azurerm_resource_group" "test" {
name = "acctestrg-%d"
location = "West US"
}
resource "azurerm_virtual_network" "test" {
name = "acctvn-%d"
address_space = ["10.0.0.0/16"]
location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}"
}
resource "azurerm_subnet" "test" {
name = "acctsub-%d"
resource_group_name = "${azurerm_resource_group.test.name}"
virtual_network_name = "${azurerm_virtual_network.test.name}"
address_prefix = "10.0.2.0/24"
}
resource "azurerm_network_interface" "test" {
name = "acctni-%d"
location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}"
ip_configuration {
name = "testconfiguration1"
subnet_id = "${azurerm_subnet.test.id}"
private_ip_address_allocation = "dynamic"
}
}
resource "azurerm_storage_account" "test" {
name = "accsa%d"
resource_group_name = "${azurerm_resource_group.test.name}"
location = "westus"
account_type = "Standard_LRS"
tags {
environment = "staging"
}
}
resource "azurerm_storage_container" "test" {
name = "vhds"
resource_group_name = "${azurerm_resource_group.test.name}"
storage_account_name = "${azurerm_storage_account.test.name}"
container_access_type = "private"
}
resource "azurerm_virtual_machine" "test" {
name = "acctvm-%d"
location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}"
network_interface_ids = ["${azurerm_network_interface.test.id}"]
vm_size = "Standard_A0"
storage_image_reference {
publisher = "MicrosoftWindowsServer"
offer = "WindowsServer"
sku = "2012-Datacenter"
version = "latest"
}
storage_os_disk {
name = "myosdisk1"
vhd_uri = "${azurerm_storage_account.test.primary_blob_endpoint}${azurerm_storage_container.test.name}/myosdisk1.vhd"
caching = "ReadWrite"
create_option = "FromImage"
}
os_profile {
computer_name = "winhost01"
admin_username = "testadmin"
admin_password = "Password1234!"
}
os_profile_windows_config {
enable_automatic_upgrades = false
provision_vm_agent = true
}
} }
` `