diff --git a/builtin/providers/aws/resource_aws_cloudtrail_test.go b/builtin/providers/aws/resource_aws_cloudtrail_test.go new file mode 100644 index 000000000..10ed17a5b --- /dev/null +++ b/builtin/providers/aws/resource_aws_cloudtrail_test.go @@ -0,0 +1,169 @@ +package aws + +import ( + "fmt" + "math/rand" + "testing" + "time" + + "github.com/aws/aws-sdk-go/aws" + "github.com/aws/aws-sdk-go/service/cloudtrail" + "github.com/hashicorp/terraform/helper/resource" + "github.com/hashicorp/terraform/terraform" +) + +func TestAccAWSCloudTrail_basic(t *testing.T) { + var trail cloudtrail.Trail + + resource.Test(t, resource.TestCase{ + PreCheck: func() { testAccPreCheck(t) }, + Providers: testAccProviders, + CheckDestroy: testAccCheckAWSCloudTrailDestroy, + Steps: []resource.TestStep{ + resource.TestStep{ + Config: testAccAWSCloudTrailConfig, + Check: resource.ComposeTestCheckFunc( + testAccCheckCloudTrailExists("aws_cloudtrail.foobar", &trail), + resource.TestCheckResourceAttr("aws_cloudtrail.foobar", "include_global_service_events", "true"), + ), + }, + resource.TestStep{ + Config: testAccAWSCloudTrailConfigModified, + Check: resource.ComposeTestCheckFunc( + testAccCheckCloudTrailExists("aws_cloudtrail.foobar", &trail), + resource.TestCheckResourceAttr("aws_cloudtrail.foobar", "s3_key_prefix", "/prefix"), + resource.TestCheckResourceAttr("aws_cloudtrail.foobar", "include_global_service_events", "false"), + ), + }, + }, + }) +} + +func testAccCheckCloudTrailExists(n string, trail *cloudtrail.Trail) resource.TestCheckFunc { + return func(s *terraform.State) error { + rs, ok := s.RootModule().Resources[n] + if !ok { + return fmt.Errorf("Not found: %s", n) + } + + conn := testAccProvider.Meta().(*AWSClient).cloudtrailconn + params := cloudtrail.DescribeTrailsInput{ + TrailNameList: []*string{aws.String(rs.Primary.ID)}, + } + resp, err := conn.DescribeTrails(¶ms) + if err != nil { + return err + } + if len(resp.TrailList) == 0 { + return fmt.Errorf("Trail not found") + } + *trail = *resp.TrailList[0] + + return nil + } +} + +func testAccCheckAWSCloudTrailDestroy(s *terraform.State) error { + conn := testAccProvider.Meta().(*AWSClient).cloudtrailconn + + for _, rs := range s.RootModule().Resources { + if rs.Type != "aws_cloudtrail" { + continue + } + + params := cloudtrail.DescribeTrailsInput{ + TrailNameList: []*string{aws.String(rs.Primary.ID)}, + } + + resp, err := conn.DescribeTrails(¶ms) + + if err == nil { + if len(resp.TrailList) != 0 && + *resp.TrailList[0].Name == rs.Primary.ID { + return fmt.Errorf("CloudTrail still exists: %s", rs.Primary.ID) + } + } + } + + return nil +} + +var cloudTrailRandInt = rand.New(rand.NewSource(time.Now().UnixNano())).Int() + +var testAccAWSCloudTrailConfig = fmt.Sprintf(` +resource "aws_cloudtrail" "foobar" { + name = "tf-trail-foobar" + s3_bucket_name = "${aws_s3_bucket.foo.id}" +} + +resource "aws_s3_bucket" "foo" { + bucket = "tf-test-trail-%d" + force_destroy = true + policy = <