package aws import ( "fmt" "reflect" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/glacier" "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSGlacierVault_basic(t *testing.T) { resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckGlacierVaultDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccGlacierVault_basic, Check: resource.ComposeTestCheckFunc( testAccCheckGlacierVaultExists("aws_glacier_vault.test"), ), }, }, }) } func TestAccAWSGlacierVault_full(t *testing.T) { rInt := acctest.RandInt() resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckGlacierVaultDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccGlacierVault_full(rInt), Check: resource.ComposeTestCheckFunc( testAccCheckGlacierVaultExists("aws_glacier_vault.full"), ), }, }, }) } func TestAccAWSGlacierVault_RemoveNotifications(t *testing.T) { rInt := acctest.RandInt() resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckGlacierVaultDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccGlacierVault_full(rInt), Check: resource.ComposeTestCheckFunc( testAccCheckGlacierVaultExists("aws_glacier_vault.full"), ), }, resource.TestStep{ Config: testAccGlacierVault_withoutNotification(rInt), Check: resource.ComposeTestCheckFunc( testAccCheckGlacierVaultExists("aws_glacier_vault.full"), testAccCheckVaultNotificationsMissing("aws_glacier_vault.full"), ), }, }, }) } func TestDiffGlacierVaultTags(t *testing.T) { cases := []struct { Old, New map[string]interface{} Create map[string]string Remove []string }{ // Basic add/remove { Old: map[string]interface{}{ "foo": "bar", }, New: map[string]interface{}{ "bar": "baz", }, Create: map[string]string{ "bar": "baz", }, Remove: []string{ "foo", }, }, // Modify { Old: map[string]interface{}{ "foo": "bar", }, New: map[string]interface{}{ "foo": "baz", }, Create: map[string]string{ "foo": "baz", }, Remove: []string{ "foo", }, }, } for i, tc := range cases { c, r := diffGlacierVaultTags(mapGlacierVaultTags(tc.Old), mapGlacierVaultTags(tc.New)) if !reflect.DeepEqual(c, tc.Create) { t.Fatalf("%d: bad create: %#v", i, c) } if !reflect.DeepEqual(r, tc.Remove) { t.Fatalf("%d: bad remove: %#v", i, r) } } } func testAccCheckGlacierVaultExists(name string) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[name] if !ok { return fmt.Errorf("Not found: %s", name) } if rs.Primary.ID == "" { return fmt.Errorf("No ID is set") } glacierconn := testAccProvider.Meta().(*AWSClient).glacierconn out, err := glacierconn.DescribeVault(&glacier.DescribeVaultInput{ VaultName: aws.String(rs.Primary.ID), }) if err != nil { return err } if out.VaultARN == nil { return fmt.Errorf("No Glacier Vault Found") } if *out.VaultName != rs.Primary.ID { return fmt.Errorf("Glacier Vault Mismatch - existing: %q, state: %q", *out.VaultName, rs.Primary.ID) } return nil } } func testAccCheckVaultNotificationsMissing(name string) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[name] if !ok { return fmt.Errorf("Not found: %s", name) } if rs.Primary.ID == "" { return fmt.Errorf("No ID is set") } glacierconn := testAccProvider.Meta().(*AWSClient).glacierconn out, err := glacierconn.GetVaultNotifications(&glacier.GetVaultNotificationsInput{ VaultName: aws.String(rs.Primary.ID), }) if awserr, ok := err.(awserr.Error); ok && awserr.Code() != "ResourceNotFoundException" { return fmt.Errorf("Expected ResourceNotFoundException for Vault %s Notification Block but got %s", rs.Primary.ID, awserr.Code()) } if out.VaultNotificationConfig != nil { return fmt.Errorf("Vault Notification Block has been found for %s", rs.Primary.ID) } return nil } } func testAccCheckGlacierVaultDestroy(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).glacierconn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_glacier_vault" { continue } input := &glacier.DescribeVaultInput{ VaultName: aws.String(rs.Primary.ID), } if _, err := conn.DescribeVault(input); err != nil { // Verify the error is what we want if ae, ok := err.(awserr.Error); ok && ae.Code() == "ResourceNotFoundException" { continue } return err } return fmt.Errorf("still exists") } return nil } const testAccGlacierVault_basic = ` resource "aws_glacier_vault" "test" { name = "my_test_vault" } ` func testAccGlacierVault_full(rInt int) string { return fmt.Sprintf(` resource "aws_sns_topic" "aws_sns_topic" { name = "glacier-sns-topic-%d" } resource "aws_glacier_vault" "full" { name = "my_test_vault_%d" notification { sns_topic = "${aws_sns_topic.aws_sns_topic.arn}" events = ["ArchiveRetrievalCompleted","InventoryRetrievalCompleted"] } tags { Test="Test1" } } `, rInt, rInt) } func testAccGlacierVault_withoutNotification(rInt int) string { return fmt.Sprintf(` resource "aws_sns_topic" "aws_sns_topic" { name = "glacier-sns-topic-%d" } resource "aws_glacier_vault" "full" { name = "my_test_vault_%d" tags { Test="Test1" } } `, rInt, rInt) }