package aws import ( "fmt" "log" "sort" "testing" "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/helper/schema" "github.com/hashicorp/terraform/terraform" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/route53" ) func TestCleanPrefix(t *testing.T) { cases := []struct { Input, Prefix, Output string }{ {"/hostedzone/foo", "/hostedzone/", "foo"}, {"/change/foo", "/change/", "foo"}, {"/bar", "/test", "/bar"}, } for _, tc := range cases { actual := cleanPrefix(tc.Input, tc.Prefix) if actual != tc.Output { t.Fatalf("input: %s\noutput: %s", tc.Input, actual) } } } func TestCleanZoneID(t *testing.T) { cases := []struct { Input, Output string }{ {"/hostedzone/foo", "foo"}, {"/change/foo", "/change/foo"}, {"/bar", "/bar"}, } for _, tc := range cases { actual := cleanZoneID(tc.Input) if actual != tc.Output { t.Fatalf("input: %s\noutput: %s", tc.Input, actual) } } } func TestCleanChangeID(t *testing.T) { cases := []struct { Input, Output string }{ {"/hostedzone/foo", "/hostedzone/foo"}, {"/change/foo", "foo"}, {"/bar", "/bar"}, } for _, tc := range cases { actual := cleanChangeID(tc.Input) if actual != tc.Output { t.Fatalf("input: %s\noutput: %s", tc.Input, actual) } } } func TestAccAWSRoute53Zone_basic(t *testing.T) { var zone route53.GetHostedZoneOutput var td route53.ResourceTagSet resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_route53_zone.main", Providers: testAccProviders, CheckDestroy: testAccCheckRoute53ZoneDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRoute53ZoneConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExists("aws_route53_zone.main", &zone), testAccLoadTagsR53(&zone, &td), testAccCheckTagsR53(&td.Tags, "foo", "bar"), ), }, }, }) } func TestAccAWSRoute53Zone_forceDestroy(t *testing.T) { var zone route53.GetHostedZoneOutput // record the initialized providers so that we can use them to // check for the instances in each region var providers []*schema.Provider providerFactories := map[string]terraform.ResourceProviderFactory{ "aws": func() (terraform.ResourceProvider, error) { p := Provider() providers = append(providers, p.(*schema.Provider)) return p, nil }, } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_route53_zone.destroyable", ProviderFactories: providerFactories, CheckDestroy: testAccCheckRoute53ZoneDestroyWithProviders(&providers), Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRoute53ZoneConfig_forceDestroy, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExistsWithProviders("aws_route53_zone.destroyable", &zone, &providers), // Add >100 records to verify pagination works ok testAccCreateRandomRoute53RecordsInZoneIdWithProviders(&providers, &zone, 100), testAccCreateRandomRoute53RecordsInZoneIdWithProviders(&providers, &zone, 5), ), }, }, }) } func TestAccAWSRoute53Zone_updateComment(t *testing.T) { var zone route53.GetHostedZoneOutput var td route53.ResourceTagSet resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_route53_zone.main", Providers: testAccProviders, CheckDestroy: testAccCheckRoute53ZoneDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRoute53ZoneConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExists("aws_route53_zone.main", &zone), testAccLoadTagsR53(&zone, &td), testAccCheckTagsR53(&td.Tags, "foo", "bar"), resource.TestCheckResourceAttr( "aws_route53_zone.main", "comment", "Custom comment"), ), }, resource.TestStep{ Config: testAccRoute53ZoneConfigUpdateComment, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExists("aws_route53_zone.main", &zone), testAccLoadTagsR53(&zone, &td), resource.TestCheckResourceAttr( "aws_route53_zone.main", "comment", "Change Custom Comment"), ), }, }, }) } func TestAccAWSRoute53Zone_private_basic(t *testing.T) { var zone route53.GetHostedZoneOutput resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_route53_zone.main", Providers: testAccProviders, CheckDestroy: testAccCheckRoute53ZoneDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRoute53PrivateZoneConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExists("aws_route53_zone.main", &zone), testAccCheckRoute53ZoneAssociatesWithVpc("aws_vpc.main", &zone), ), }, }, }) } func TestAccAWSRoute53Zone_private_region(t *testing.T) { var zone route53.GetHostedZoneOutput // record the initialized providers so that we can use them to // check for the instances in each region var providers []*schema.Provider providerFactories := map[string]terraform.ResourceProviderFactory{ "aws": func() (terraform.ResourceProvider, error) { p := Provider() providers = append(providers, p.(*schema.Provider)) return p, nil }, } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, IDRefreshName: "aws_route53_zone.main", ProviderFactories: providerFactories, CheckDestroy: testAccCheckRoute53ZoneDestroyWithProviders(&providers), Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRoute53PrivateZoneRegionConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRoute53ZoneExistsWithProviders("aws_route53_zone.main", &zone, &providers), testAccCheckRoute53ZoneAssociatesWithVpc("aws_vpc.main", &zone), ), }, }, }) } func testAccCheckRoute53ZoneDestroy(s *terraform.State) error { return testAccCheckRoute53ZoneDestroyWithProvider(s, testAccProvider) } func testAccCheckRoute53ZoneDestroyWithProviders(providers *[]*schema.Provider) resource.TestCheckFunc { return func(s *terraform.State) error { for _, provider := range *providers { if provider.Meta() == nil { continue } if err := testAccCheckRoute53ZoneDestroyWithProvider(s, provider); err != nil { return err } } return nil } } func testAccCheckRoute53ZoneDestroyWithProvider(s *terraform.State, provider *schema.Provider) error { conn := provider.Meta().(*AWSClient).r53conn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_route53_zone" { continue } _, err := conn.GetHostedZone(&route53.GetHostedZoneInput{Id: aws.String(rs.Primary.ID)}) if err == nil { return fmt.Errorf("Hosted zone still exists") } } return nil } func testAccCreateRandomRoute53RecordsInZoneIdWithProviders(providers *[]*schema.Provider, zone *route53.GetHostedZoneOutput, recordsCount int) resource.TestCheckFunc { return func(s *terraform.State) error { for _, provider := range *providers { if provider.Meta() == nil { continue } if err := testAccCreateRandomRoute53RecordsInZoneId(provider, zone, recordsCount); err != nil { return err } } return nil } } func testAccCreateRandomRoute53RecordsInZoneId(provider *schema.Provider, zone *route53.GetHostedZoneOutput, recordsCount int) error { conn := provider.Meta().(*AWSClient).r53conn var changes []*route53.Change if recordsCount > 100 { return fmt.Errorf("Route53 API only allows 100 record sets in a single batch") } for i := 0; i < recordsCount; i++ { changes = append(changes, &route53.Change{ Action: aws.String("UPSERT"), ResourceRecordSet: &route53.ResourceRecordSet{ Name: aws.String(fmt.Sprintf("%d-tf-acc-random.%s", acctest.RandInt(), *zone.HostedZone.Name)), Type: aws.String("CNAME"), ResourceRecords: []*route53.ResourceRecord{ &route53.ResourceRecord{Value: aws.String(fmt.Sprintf("random.%s", *zone.HostedZone.Name))}, }, TTL: aws.Int64(int64(30)), }, }) } req := &route53.ChangeResourceRecordSetsInput{ HostedZoneId: zone.HostedZone.Id, ChangeBatch: &route53.ChangeBatch{ Comment: aws.String("Generated by Terraform"), Changes: changes, }, } log.Printf("[DEBUG] Change set: %s\n", *req) resp, err := changeRoute53RecordSet(conn, req) if err != nil { return err } changeInfo := resp.(*route53.ChangeResourceRecordSetsOutput).ChangeInfo err = waitForRoute53RecordSetToSync(conn, cleanChangeID(*changeInfo.Id)) return err } func testAccCheckRoute53ZoneExists(n string, zone *route53.GetHostedZoneOutput) resource.TestCheckFunc { return func(s *terraform.State) error { return testAccCheckRoute53ZoneExistsWithProvider(s, n, zone, testAccProvider) } } func testAccCheckRoute53ZoneExistsWithProviders(n string, zone *route53.GetHostedZoneOutput, providers *[]*schema.Provider) resource.TestCheckFunc { return func(s *terraform.State) error { for _, provider := range *providers { if provider.Meta() == nil { continue } if err := testAccCheckRoute53ZoneExistsWithProvider(s, n, zone, provider); err != nil { return err } } return nil } } func testAccCheckRoute53ZoneExistsWithProvider(s *terraform.State, n string, zone *route53.GetHostedZoneOutput, provider *schema.Provider) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No hosted zone ID is set") } conn := provider.Meta().(*AWSClient).r53conn resp, err := conn.GetHostedZone(&route53.GetHostedZoneInput{Id: aws.String(rs.Primary.ID)}) if err != nil { return fmt.Errorf("Hosted zone err: %v", err) } aws_comment := *resp.HostedZone.Config.Comment rs_comment := rs.Primary.Attributes["comment"] if rs_comment != "" && rs_comment != aws_comment { return fmt.Errorf("Hosted zone with comment '%s' found but does not match '%s'", aws_comment, rs_comment) } if !*resp.HostedZone.Config.PrivateZone { sorted_ns := make([]string, len(resp.DelegationSet.NameServers)) for i, ns := range resp.DelegationSet.NameServers { sorted_ns[i] = *ns } sort.Strings(sorted_ns) for idx, ns := range sorted_ns { attribute := fmt.Sprintf("name_servers.%d", idx) dsns := rs.Primary.Attributes[attribute] if dsns != ns { return fmt.Errorf("Got: %v for %v, Expected: %v", dsns, attribute, ns) } } } *zone = *resp return nil } func testAccCheckRoute53ZoneAssociatesWithVpc(n string, zone *route53.GetHostedZoneOutput) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No VPC ID is set") } var associatedVPC *route53.VPC for _, vpc := range zone.VPCs { if *vpc.VPCId == rs.Primary.ID { associatedVPC = vpc } } if associatedVPC == nil { return fmt.Errorf("VPC: %v is not associated to Zone: %v", n, cleanZoneID(*zone.HostedZone.Id)) } return nil } } func testAccLoadTagsR53(zone *route53.GetHostedZoneOutput, td *route53.ResourceTagSet) resource.TestCheckFunc { return func(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).r53conn zone := cleanZoneID(*zone.HostedZone.Id) req := &route53.ListTagsForResourceInput{ ResourceId: aws.String(zone), ResourceType: aws.String("hostedzone"), } resp, err := conn.ListTagsForResource(req) if err != nil { return err } if resp.ResourceTagSet != nil { *td = *resp.ResourceTagSet } return nil } } const testAccRoute53ZoneConfig = ` resource "aws_route53_zone" "main" { name = "hashicorp.com." comment = "Custom comment" tags { foo = "bar" Name = "tf-route53-tag-test" } } ` const testAccRoute53ZoneConfig_forceDestroy = ` resource "aws_route53_zone" "destroyable" { name = "terraform.io." force_destroy = true } ` const testAccRoute53ZoneConfigUpdateComment = ` resource "aws_route53_zone" "main" { name = "hashicorp.com." comment = "Change Custom Comment" tags { foo = "bar" Name = "tf-route53-tag-test" } } ` const testAccRoute53PrivateZoneConfig = ` resource "aws_vpc" "main" { cidr_block = "172.29.0.0/24" instance_tenancy = "default" enable_dns_support = true enable_dns_hostnames = true } resource "aws_route53_zone" "main" { name = "hashicorp.com." vpc_id = "${aws_vpc.main.id}" } ` const testAccRoute53PrivateZoneRegionConfig = ` provider "aws" { alias = "west" region = "us-west-2" } provider "aws" { alias = "east" region = "us-east-1" } resource "aws_vpc" "main" { provider = "aws.east" cidr_block = "172.29.0.0/24" instance_tenancy = "default" enable_dns_support = true enable_dns_hostnames = true } resource "aws_route53_zone" "main" { provider = "aws.west" name = "hashicorp.com." vpc_id = "${aws_vpc.main.id}" vpc_region = "us-east-1" } `