provider/azurerm: Fix azurerm_network_security_group_rule

```
HTTP_PROXY=http://localhost:8888 make testacc TEST=./builtin/providers/azurerm TESTARGS="-run TestAccAzureRMNetworkSecurityRule_"
==> Checking that code complies with gofmt requirements...
/Users/James/Code/go/bin/stringer
go generate $(go list ./... | grep -v /vendor/)
2016/06/01 19:19:59 Generated command/internal_plugin_list.go
TF_ACC=1 go test ./builtin/providers/azurerm -v -run TestAccAzureRMNetworkSecurityRule_ -timeout 120m
=== RUN   TestAccAzureRMNetworkSecurityRule_basic
--- PASS: TestAccAzureRMNetworkSecurityRule_basic (105.61s)
=== RUN   TestAccAzureRMNetworkSecurityRule_addingRules
--- PASS: TestAccAzureRMNetworkSecurityRule_addingRules (141.59s)
PASS
ok      github.com/hashicorp/terraform/builtin/providers/azurerm    247.221s
```
This commit is contained in:
James Nugent 2016-06-01 19:25:19 -05:00
parent 2f66747e79
commit 8ecfddf507
3 changed files with 412 additions and 427 deletions

View File

@ -51,7 +51,7 @@ func Provider() terraform.ResourceProvider {
"azurerm_local_network_gateway": resourceArmLocalNetworkGateway(),
"azurerm_network_interface": resourceArmNetworkInterface(),
"azurerm_network_security_group": resourceArmNetworkSecurityGroup(),
//"azurerm_network_security_rule": resourceArmNetworkSecurityRule(),
"azurerm_network_security_rule": resourceArmNetworkSecurityRule(),
"azurerm_public_ip": resourceArmPublicIp(),
"azurerm_route": resourceArmRoute(),
"azurerm_route_table": resourceArmRouteTable(),

View File

@ -1,219 +1,204 @@
package azurerm
//import (
// "fmt"
// "log"
// "net/http"
// "time"
//
// "github.com/Azure/azure-sdk-for-go/arm/network"
// "github.com/hashicorp/terraform/helper/resource"
// "github.com/hashicorp/terraform/helper/schema"
//)
//
//func resourceArmNetworkSecurityRule() *schema.Resource {
// return &schema.Resource{
// Create: resourceArmNetworkSecurityRuleCreate,
// Read: resourceArmNetworkSecurityRuleRead,
// Update: resourceArmNetworkSecurityRuleCreate,
// Delete: resourceArmNetworkSecurityRuleDelete,
//
// Schema: map[string]*schema.Schema{
// "name": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// ForceNew: true,
// },
//
// "resource_group_name": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// ForceNew: true,
// },
//
// "network_security_group_name": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// },
//
// "description": &schema.Schema{
// Type: schema.TypeString,
// Optional: true,
// ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
// value := v.(string)
// if len(value) > 140 {
// errors = append(errors, fmt.Errorf(
// "The network security rule description can be no longer than 140 chars"))
// }
// return
// },
// },
//
// "protocol": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// ValidateFunc: validateNetworkSecurityRuleProtocol,
// },
//
// "source_port_range": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// },
//
// "destination_port_range": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// },
//
// "source_address_prefix": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// },
//
// "destination_address_prefix": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// },
//
// "access": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// ValidateFunc: validateNetworkSecurityRuleAccess,
// },
//
// "priority": &schema.Schema{
// Type: schema.TypeInt,
// Required: true,
// ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
// value := v.(int)
// if value < 100 || value > 4096 {
// errors = append(errors, fmt.Errorf(
// "The `priority` can only be between 100 and 4096"))
// }
// return
// },
// },
//
// "direction": &schema.Schema{
// Type: schema.TypeString,
// Required: true,
// ValidateFunc: validateNetworkSecurityRuleDirection,
// },
// },
// }
//}
//
//func resourceArmNetworkSecurityRuleCreate(d *schema.ResourceData, meta interface{}) error {
// client := meta.(*ArmClient)
// secClient := client.secRuleClient
//
// name := d.Get("name").(string)
// nsgName := d.Get("network_security_group_name").(string)
// resGroup := d.Get("resource_group_name").(string)
//
// source_port_range := d.Get("source_port_range").(string)
// destination_port_range := d.Get("destination_port_range").(string)
// source_address_prefix := d.Get("source_address_prefix").(string)
// destination_address_prefix := d.Get("destination_address_prefix").(string)
// priority := d.Get("priority").(int)
// access := d.Get("access").(string)
// direction := d.Get("direction").(string)
// protocol := d.Get("protocol").(string)
//
// armMutexKV.Lock(nsgName)
// defer armMutexKV.Unlock(nsgName)
//
// properties := network.SecurityRulePropertiesFormat{
// SourcePortRange: &source_port_range,
// DestinationPortRange: &destination_port_range,
// SourceAddressPrefix: &source_address_prefix,
// DestinationAddressPrefix: &destination_address_prefix,
// Priority: &priority,
// Access: network.SecurityRuleAccess(access),
// Direction: network.SecurityRuleDirection(direction),
// Protocol: network.SecurityRuleProtocol(protocol),
// }
//
// if v, ok := d.GetOk("description"); ok {
// description := v.(string)
// properties.Description = &description
// }
//
// sgr := network.SecurityRule{
// Name: &name,
// Properties: &properties,
// }
//
// resp, err := secClient.CreateOrUpdate(resGroup, nsgName, name, sgr)
// if err != nil {
// return err
// }
// d.SetId(*resp.ID)
//
// log.Printf("[DEBUG] Waiting for Network Security Rule (%s) to become available", name)
// stateConf := &resource.StateChangeConf{
// Pending: []string{"Accepted", "Updating"},
// Target: []string{"Succeeded"},
// Refresh: securityRuleStateRefreshFunc(client, resGroup, nsgName, name),
// Timeout: 10 * time.Minute,
// }
// if _, err := stateConf.WaitForState(); err != nil {
// return fmt.Errorf("Error waiting for Network Securty Rule (%s) to become available: %s", name, err)
// }
//
// return resourceArmNetworkSecurityRuleRead(d, meta)
//}
//
//func resourceArmNetworkSecurityRuleRead(d *schema.ResourceData, meta interface{}) error {
// secRuleClient := meta.(*ArmClient).secRuleClient
//
// id, err := parseAzureResourceID(d.Id())
// if err != nil {
// return err
// }
// resGroup := id.ResourceGroup
// networkSGName := id.Path["networkSecurityGroups"]
// sgRuleName := id.Path["securityRules"]
//
// resp, err := secRuleClient.Get(resGroup, networkSGName, sgRuleName)
// if resp.StatusCode == http.StatusNotFound {
// d.SetId("")
// return nil
// }
// if err != nil {
// return fmt.Errorf("Error making Read request on Azure Network Security Rule %s: %s", sgRuleName, err)
// }
//
// return nil
//}
//
//func resourceArmNetworkSecurityRuleDelete(d *schema.ResourceData, meta interface{}) error {
// client := meta.(*ArmClient)
// secRuleClient := client.secRuleClient
//
// id, err := parseAzureResourceID(d.Id())
// if err != nil {
// return err
// }
// resGroup := id.ResourceGroup
// nsgName := id.Path["networkSecurityGroups"]
// sgRuleName := id.Path["securityRules"]
//
// armMutexKV.Lock(nsgName)
// defer armMutexKV.Unlock(nsgName)
//
// _, err = secRuleClient.Delete(resGroup, nsgName, sgRuleName)
//
// return err
//}
//
//func securityRuleStateRefreshFunc(client *ArmClient, resourceGroupName string, networkSecurityGroupName string, securityRuleName string) resource.StateRefreshFunc {
// return func() (interface{}, string, error) {
// res, err := client.secRuleClient.Get(resourceGroupName, networkSecurityGroupName, securityRuleName)
// if err != nil {
// return nil, "", fmt.Errorf("Error issuing read request in securityGroupStateRefreshFunc to Azure ARM for network security rule '%s' (RG: '%s') (NSG: '%s'): %s", securityRuleName, resourceGroupName, networkSecurityGroupName, err)
// }
//
// return res, *res.Properties.ProvisioningState, nil
// }
//}
import (
"fmt"
"net/http"
"github.com/Azure/azure-sdk-for-go/arm/network"
"github.com/hashicorp/terraform/helper/schema"
)
func resourceArmNetworkSecurityRule() *schema.Resource {
return &schema.Resource{
Create: resourceArmNetworkSecurityRuleCreate,
Read: resourceArmNetworkSecurityRuleRead,
Update: resourceArmNetworkSecurityRuleCreate,
Delete: resourceArmNetworkSecurityRuleDelete,
Schema: map[string]*schema.Schema{
"name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"resource_group_name": {
Type: schema.TypeString,
Required: true,
ForceNew: true,
},
"network_security_group_name": {
Type: schema.TypeString,
Required: true,
},
"description": {
Type: schema.TypeString,
Optional: true,
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
value := v.(string)
if len(value) > 140 {
errors = append(errors, fmt.Errorf(
"The network security rule description can be no longer than 140 chars"))
}
return
},
},
"protocol": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validateNetworkSecurityRuleProtocol,
},
"source_port_range": {
Type: schema.TypeString,
Required: true,
},
"destination_port_range": {
Type: schema.TypeString,
Required: true,
},
"source_address_prefix": {
Type: schema.TypeString,
Required: true,
},
"destination_address_prefix": {
Type: schema.TypeString,
Required: true,
},
"access": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validateNetworkSecurityRuleAccess,
},
"priority": {
Type: schema.TypeInt,
Required: true,
ValidateFunc: func(v interface{}, k string) (ws []string, errors []error) {
value := v.(int)
if value < 100 || value > 4096 {
errors = append(errors, fmt.Errorf(
"The `priority` can only be between 100 and 4096"))
}
return
},
},
"direction": {
Type: schema.TypeString,
Required: true,
ValidateFunc: validateNetworkSecurityRuleDirection,
},
},
}
}
func resourceArmNetworkSecurityRuleCreate(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient)
secClient := client.secRuleClient
name := d.Get("name").(string)
nsgName := d.Get("network_security_group_name").(string)
resGroup := d.Get("resource_group_name").(string)
source_port_range := d.Get("source_port_range").(string)
destination_port_range := d.Get("destination_port_range").(string)
source_address_prefix := d.Get("source_address_prefix").(string)
destination_address_prefix := d.Get("destination_address_prefix").(string)
priority := int32(d.Get("priority").(int))
access := d.Get("access").(string)
direction := d.Get("direction").(string)
protocol := d.Get("protocol").(string)
armMutexKV.Lock(nsgName)
defer armMutexKV.Unlock(nsgName)
properties := network.SecurityRulePropertiesFormat{
SourcePortRange: &source_port_range,
DestinationPortRange: &destination_port_range,
SourceAddressPrefix: &source_address_prefix,
DestinationAddressPrefix: &destination_address_prefix,
Priority: &priority,
Access: network.SecurityRuleAccess(access),
Direction: network.SecurityRuleDirection(direction),
Protocol: network.SecurityRuleProtocol(protocol),
}
if v, ok := d.GetOk("description"); ok {
description := v.(string)
properties.Description = &description
}
sgr := network.SecurityRule{
Name: &name,
Properties: &properties,
}
_, err := secClient.CreateOrUpdate(resGroup, nsgName, name, sgr, make(chan struct{}))
if err != nil {
return err
}
read, err := secClient.Get(resGroup, nsgName, name)
if err != nil {
return err
}
if read.ID == nil {
return fmt.Errorf("Cannot read Security Group Rule %s/%s (resource group %s) ID",
nsgName, name, resGroup)
}
d.SetId(*read.ID)
return resourceArmNetworkSecurityRuleRead(d, meta)
}
func resourceArmNetworkSecurityRuleRead(d *schema.ResourceData, meta interface{}) error {
secRuleClient := meta.(*ArmClient).secRuleClient
id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}
resGroup := id.ResourceGroup
networkSGName := id.Path["networkSecurityGroups"]
sgRuleName := id.Path["securityRules"]
resp, err := secRuleClient.Get(resGroup, networkSGName, sgRuleName)
if resp.StatusCode == http.StatusNotFound {
d.SetId("")
return nil
}
if err != nil {
return fmt.Errorf("Error making Read request on Azure Network Security Rule %s: %s", sgRuleName, err)
}
return nil
}
func resourceArmNetworkSecurityRuleDelete(d *schema.ResourceData, meta interface{}) error {
client := meta.(*ArmClient)
secRuleClient := client.secRuleClient
id, err := parseAzureResourceID(d.Id())
if err != nil {
return err
}
resGroup := id.ResourceGroup
nsgName := id.Path["networkSecurityGroups"]
sgRuleName := id.Path["securityRules"]
armMutexKV.Lock(nsgName)
defer armMutexKV.Unlock(nsgName)
_, err = secRuleClient.Delete(resGroup, nsgName, sgRuleName, make(chan struct{}))
return err
}

View File

@ -1,203 +1,203 @@
package azurerm
//import (
// "fmt"
// "net/http"
// "testing"
//
// "github.com/hashicorp/terraform/helper/resource"
// "github.com/hashicorp/terraform/terraform"
//)
//
//func TestAccAzureRMNetworkSecurityRule_basic(t *testing.T) {
//
// resource.Test(t, resource.TestCase{
// PreCheck: func() { testAccPreCheck(t) },
// Providers: testAccProviders,
// CheckDestroy: testCheckAzureRMNetworkSecurityRuleDestroy,
// Steps: []resource.TestStep{
// resource.TestStep{
// Config: testAccAzureRMNetworkSecurityRule_basic,
// Check: resource.ComposeTestCheckFunc(
// testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test"),
// ),
// },
// },
// })
//}
//
//func TestAccAzureRMNetworkSecurityRule_addingRules(t *testing.T) {
//
// resource.Test(t, resource.TestCase{
// PreCheck: func() { testAccPreCheck(t) },
// Providers: testAccProviders,
// CheckDestroy: testCheckAzureRMNetworkSecurityRuleDestroy,
// Steps: []resource.TestStep{
// resource.TestStep{
// Config: testAccAzureRMNetworkSecurityRule_updateBasic,
// Check: resource.ComposeTestCheckFunc(
// testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test1"),
// ),
// },
//
// resource.TestStep{
// Config: testAccAzureRMNetworkSecurityRule_updateExtraRule,
// Check: resource.ComposeTestCheckFunc(
// testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test2"),
// ),
// },
// },
// })
//}
//
//func testCheckAzureRMNetworkSecurityRuleExists(name string) resource.TestCheckFunc {
// return func(s *terraform.State) error {
//
// rs, ok := s.RootModule().Resources[name]
// if !ok {
// return fmt.Errorf("Not found: %s", name)
// }
//
// sgName := rs.Primary.Attributes["network_security_group_name"]
// sgrName := rs.Primary.Attributes["name"]
// resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
// if !hasResourceGroup {
// return fmt.Errorf("Bad: no resource group found in state for network security rule: %s", sgName)
// }
//
// conn := testAccProvider.Meta().(*ArmClient).secRuleClient
//
// resp, err := conn.Get(resourceGroup, sgName, sgrName)
// if err != nil {
// return fmt.Errorf("Bad: Get on secRuleClient: %s", err)
// }
//
// if resp.StatusCode == http.StatusNotFound {
// return fmt.Errorf("Bad: Network Security Rule %q (resource group: %q) (network security group: %q) does not exist", sgrName, sgName, resourceGroup)
// }
//
// return nil
// }
//}
//
//func testCheckAzureRMNetworkSecurityRuleDestroy(s *terraform.State) error {
// conn := testAccProvider.Meta().(*ArmClient).secRuleClient
//
// for _, rs := range s.RootModule().Resources {
//
// if rs.Type != "azurerm_network_security_rule" {
// continue
// }
//
// sgName := rs.Primary.Attributes["network_security_group_name"]
// sgrName := rs.Primary.Attributes["name"]
// resourceGroup := rs.Primary.Attributes["resource_group_name"]
//
// resp, err := conn.Get(resourceGroup, sgName, sgrName)
//
// if err != nil {
// return nil
// }
//
// if resp.StatusCode != http.StatusNotFound {
// return fmt.Errorf("Network Security Rule still exists:\n%#v", resp.Properties)
// }
// }
//
// return nil
//}
//
//var testAccAzureRMNetworkSecurityRule_basic = `
//resource "azurerm_resource_group" "test" {
// name = "acceptanceTestResourceGroup1"
// location = "West US"
//}
//
//resource "azurerm_network_security_group" "test" {
// name = "acceptanceTestSecurityGroup1"
// location = "West US"
// resource_group_name = "${azurerm_resource_group.test.name}"
//}
//
//resource "azurerm_network_security_rule" "test" {
// name = "test123"
// priority = 100
// direction = "Outbound"
// access = "Allow"
// protocol = "Tcp"
// source_port_range = "*"
// destination_port_range = "*"
// source_address_prefix = "*"
// destination_address_prefix = "*"
// resource_group_name = "${azurerm_resource_group.test.name}"
// network_security_group_name = "${azurerm_network_security_group.test.name}"
//}
//`
//
//var testAccAzureRMNetworkSecurityRule_updateBasic = `
//resource "azurerm_resource_group" "test1" {
// name = "acceptanceTestResourceGroup2"
// location = "West US"
//}
//
//resource "azurerm_network_security_group" "test1" {
// name = "acceptanceTestSecurityGroup2"
// location = "West US"
// resource_group_name = "${azurerm_resource_group.test1.name}"
//}
//
//resource "azurerm_network_security_rule" "test1" {
// name = "test123"
// priority = 100
// direction = "Outbound"
// access = "Allow"
// protocol = "Tcp"
// source_port_range = "*"
// destination_port_range = "*"
// source_address_prefix = "*"
// destination_address_prefix = "*"
// resource_group_name = "${azurerm_resource_group.test1.name}"
// network_security_group_name = "${azurerm_network_security_group.test1.name}"
//}
//`
//
//var testAccAzureRMNetworkSecurityRule_updateExtraRule = `
//resource "azurerm_resource_group" "test1" {
// name = "acceptanceTestResourceGroup2"
// location = "West US"
//}
//
//resource "azurerm_network_security_group" "test1" {
// name = "acceptanceTestSecurityGroup2"
// location = "West US"
// resource_group_name = "${azurerm_resource_group.test1.name}"
//}
//
//resource "azurerm_network_security_rule" "test1" {
// name = "test123"
// priority = 100
// direction = "Outbound"
// access = "Allow"
// protocol = "Tcp"
// source_port_range = "*"
// destination_port_range = "*"
// source_address_prefix = "*"
// destination_address_prefix = "*"
// resource_group_name = "${azurerm_resource_group.test1.name}"
// network_security_group_name = "${azurerm_network_security_group.test1.name}"
//}
//
//resource "azurerm_network_security_rule" "test2" {
// name = "testing456"
// priority = 101
// direction = "Inbound"
// access = "Deny"
// protocol = "Tcp"
// source_port_range = "*"
// destination_port_range = "*"
// source_address_prefix = "*"
// destination_address_prefix = "*"
// resource_group_name = "${azurerm_resource_group.test1.name}"
// network_security_group_name = "${azurerm_network_security_group.test1.name}"
//}
//`
import (
"fmt"
"net/http"
"testing"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
)
func TestAccAzureRMNetworkSecurityRule_basic(t *testing.T) {
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMNetworkSecurityRuleDestroy,
Steps: []resource.TestStep{
{
Config: testAccAzureRMNetworkSecurityRule_basic,
Check: resource.ComposeTestCheckFunc(
testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test"),
),
},
},
})
}
func TestAccAzureRMNetworkSecurityRule_addingRules(t *testing.T) {
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testCheckAzureRMNetworkSecurityRuleDestroy,
Steps: []resource.TestStep{
{
Config: testAccAzureRMNetworkSecurityRule_updateBasic,
Check: resource.ComposeTestCheckFunc(
testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test1"),
),
},
{
Config: testAccAzureRMNetworkSecurityRule_updateExtraRule,
Check: resource.ComposeTestCheckFunc(
testCheckAzureRMNetworkSecurityRuleExists("azurerm_network_security_rule.test2"),
),
},
},
})
}
func testCheckAzureRMNetworkSecurityRuleExists(name string) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[name]
if !ok {
return fmt.Errorf("Not found: %s", name)
}
sgName := rs.Primary.Attributes["network_security_group_name"]
sgrName := rs.Primary.Attributes["name"]
resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
if !hasResourceGroup {
return fmt.Errorf("Bad: no resource group found in state for network security rule: %s", sgName)
}
conn := testAccProvider.Meta().(*ArmClient).secRuleClient
resp, err := conn.Get(resourceGroup, sgName, sgrName)
if err != nil {
return fmt.Errorf("Bad: Get on secRuleClient: %s", err)
}
if resp.StatusCode == http.StatusNotFound {
return fmt.Errorf("Bad: Network Security Rule %q (resource group: %q) (network security group: %q) does not exist", sgrName, sgName, resourceGroup)
}
return nil
}
}
func testCheckAzureRMNetworkSecurityRuleDestroy(s *terraform.State) error {
conn := testAccProvider.Meta().(*ArmClient).secRuleClient
for _, rs := range s.RootModule().Resources {
if rs.Type != "azurerm_network_security_rule" {
continue
}
sgName := rs.Primary.Attributes["network_security_group_name"]
sgrName := rs.Primary.Attributes["name"]
resourceGroup := rs.Primary.Attributes["resource_group_name"]
resp, err := conn.Get(resourceGroup, sgName, sgrName)
if err != nil {
return nil
}
if resp.StatusCode != http.StatusNotFound {
return fmt.Errorf("Network Security Rule still exists:\n%#v", resp.Properties)
}
}
return nil
}
var testAccAzureRMNetworkSecurityRule_basic = `
resource "azurerm_resource_group" "test" {
name = "acceptanceTestResourceGroup1"
location = "West US"
}
resource "azurerm_network_security_group" "test" {
name = "acceptanceTestSecurityGroup1"
location = "West US"
resource_group_name = "${azurerm_resource_group.test.name}"
}
resource "azurerm_network_security_rule" "test" {
name = "test123"
priority = 100
direction = "Outbound"
access = "Allow"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
resource_group_name = "${azurerm_resource_group.test.name}"
network_security_group_name = "${azurerm_network_security_group.test.name}"
}
`
var testAccAzureRMNetworkSecurityRule_updateBasic = `
resource "azurerm_resource_group" "test1" {
name = "acceptanceTestResourceGroup2"
location = "West US"
}
resource "azurerm_network_security_group" "test1" {
name = "acceptanceTestSecurityGroup2"
location = "West US"
resource_group_name = "${azurerm_resource_group.test1.name}"
}
resource "azurerm_network_security_rule" "test1" {
name = "test123"
priority = 100
direction = "Outbound"
access = "Allow"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
resource_group_name = "${azurerm_resource_group.test1.name}"
network_security_group_name = "${azurerm_network_security_group.test1.name}"
}
`
var testAccAzureRMNetworkSecurityRule_updateExtraRule = `
resource "azurerm_resource_group" "test1" {
name = "acceptanceTestResourceGroup2"
location = "West US"
}
resource "azurerm_network_security_group" "test1" {
name = "acceptanceTestSecurityGroup2"
location = "West US"
resource_group_name = "${azurerm_resource_group.test1.name}"
}
resource "azurerm_network_security_rule" "test1" {
name = "test123"
priority = 100
direction = "Outbound"
access = "Allow"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
resource_group_name = "${azurerm_resource_group.test1.name}"
network_security_group_name = "${azurerm_network_security_group.test1.name}"
}
resource "azurerm_network_security_rule" "test2" {
name = "testing456"
priority = 101
direction = "Inbound"
access = "Deny"
protocol = "Tcp"
source_port_range = "*"
destination_port_range = "*"
source_address_prefix = "*"
destination_address_prefix = "*"
resource_group_name = "${azurerm_resource_group.test1.name}"
network_security_group_name = "${azurerm_network_security_group.test1.name}"
}
`