terraform/builtin/providers/heroku/resource_heroku_cert_test.go

208 lines
6.0 KiB
Go

package heroku
import (
"context"
"fmt"
"io/ioutil"
"os"
"regexp"
"strings"
"testing"
"github.com/cyberdelia/heroku-go/v3"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
)
// We break apart testing for EU and US because at present, Heroku deals with
// each a bit differently and the setup/teardown of separate tests seems to
// help them to perform more consistently.
// https://devcenter.heroku.com/articles/ssl-endpoint#add-certificate-and-intermediaries
func TestAccHerokuCert_EU(t *testing.T) {
var endpoint heroku.SSLEndpointInfoResult
appName := fmt.Sprintf("tftest-%s", acctest.RandString(10))
wd, _ := os.Getwd()
certFile := wd + "/test-fixtures/terraform.cert"
certFile2 := wd + "/test-fixtures/terraform2.cert"
keyFile := wd + "/test-fixtures/terraform.key"
keyFile2 := wd + "/test-fixtures/terraform2.key"
certificateChainBytes, _ := ioutil.ReadFile(certFile)
certificateChain := string(certificateChainBytes)
certificateChain2Bytes, _ := ioutil.ReadFile(certFile2)
certificateChain2 := string(certificateChain2Bytes)
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckHerokuCertDestroy,
Steps: []resource.TestStep{
{
Config: testAccCheckHerokuCertEUConfig(appName, certFile, keyFile),
Check: resource.ComposeTestCheckFunc(
testAccCheckHerokuCertExists("heroku_cert.ssl_certificate", &endpoint),
testAccCheckHerokuCertificateChain(&endpoint, certificateChain),
resource.TestCheckResourceAttr(
"heroku_cert.ssl_certificate",
"cname", fmt.Sprintf("%s.herokuapp.com", appName)),
),
},
{
Config: testAccCheckHerokuCertEUConfig(appName, certFile2, keyFile2),
Check: resource.ComposeTestCheckFunc(
testAccCheckHerokuCertExists("heroku_cert.ssl_certificate", &endpoint),
testAccCheckHerokuCertificateChain(&endpoint, certificateChain2),
resource.TestCheckResourceAttr(
"heroku_cert.ssl_certificate",
"cname", fmt.Sprintf("%s.herokuapp.com", appName)),
),
},
},
})
}
func TestAccHerokuCert_US(t *testing.T) {
var endpoint heroku.SSLEndpointInfoResult
appName := fmt.Sprintf("tftest-%s", acctest.RandString(10))
wd, _ := os.Getwd()
certFile := wd + "/test-fixtures/terraform.cert"
certFile2 := wd + "/test-fixtures/terraform2.cert"
keyFile := wd + "/test-fixtures/terraform.key"
keyFile2 := wd + "/test-fixtures/terraform2.key"
certificateChainBytes, _ := ioutil.ReadFile(certFile)
certificateChain := string(certificateChainBytes)
certificateChain2Bytes, _ := ioutil.ReadFile(certFile2)
certificateChain2 := string(certificateChain2Bytes)
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckHerokuCertDestroy,
Steps: []resource.TestStep{
{
Config: testAccCheckHerokuCertUSConfig(appName, certFile2, keyFile2),
Check: resource.ComposeTestCheckFunc(
testAccCheckHerokuCertExists("heroku_cert.ssl_certificate", &endpoint),
testAccCheckHerokuCertificateChain(&endpoint, certificateChain2),
resource.TestMatchResourceAttr(
"heroku_cert.ssl_certificate",
"cname", regexp.MustCompile(`herokussl`)),
),
},
{
Config: testAccCheckHerokuCertUSConfig(appName, certFile, keyFile),
Check: resource.ComposeTestCheckFunc(
testAccCheckHerokuCertExists("heroku_cert.ssl_certificate", &endpoint),
testAccCheckHerokuCertificateChain(&endpoint, certificateChain),
resource.TestMatchResourceAttr(
"heroku_cert.ssl_certificate",
"cname", regexp.MustCompile(`herokussl`)),
),
},
},
})
}
func testAccCheckHerokuCertEUConfig(appName, certFile, keyFile string) string {
return strings.TrimSpace(fmt.Sprintf(`
resource "heroku_app" "foobar" {
name = "%s"
region = "eu"
}
resource "heroku_addon" "ssl" {
app = "${heroku_app.foobar.name}"
plan = "ssl:endpoint"
}
resource "heroku_cert" "ssl_certificate" {
app = "${heroku_app.foobar.name}"
depends_on = ["heroku_addon.ssl"]
certificate_chain="${file("%s")}"
private_key="${file("%s")}"
}`, appName, certFile, keyFile))
}
func testAccCheckHerokuCertUSConfig(appName, certFile, keyFile string) string {
return strings.TrimSpace(fmt.Sprintf(`
resource "heroku_app" "foobar" {
name = "%s"
region = "us"
}
resource "heroku_addon" "ssl" {
app = "${heroku_app.foobar.name}"
plan = "ssl:endpoint"
}
resource "heroku_cert" "ssl_certificate" {
app = "${heroku_app.foobar.name}"
depends_on = ["heroku_addon.ssl"]
certificate_chain="${file("%s")}"
private_key="${file("%s")}"
}`, appName, certFile, keyFile))
}
func testAccCheckHerokuCertDestroy(s *terraform.State) error {
client := testAccProvider.Meta().(*heroku.Service)
for _, rs := range s.RootModule().Resources {
if rs.Type != "heroku_cert" {
continue
}
_, err := client.SSLEndpointInfo(context.TODO(), rs.Primary.Attributes["app"], rs.Primary.ID)
if err == nil {
return fmt.Errorf("Cerfificate still exists")
}
}
return nil
}
func testAccCheckHerokuCertificateChain(endpoint *heroku.SSLEndpointInfoResult, chain string) resource.TestCheckFunc {
return func(s *terraform.State) error {
if endpoint.CertificateChain != chain {
return fmt.Errorf("Bad certificate chain: %s", endpoint.CertificateChain)
}
return nil
}
}
func testAccCheckHerokuCertExists(n string, endpoint *heroku.SSLEndpointInfoResult) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No SSL endpoint ID is set")
}
client := testAccProvider.Meta().(*heroku.Service)
foundEndpoint, err := client.SSLEndpointInfo(context.TODO(), rs.Primary.Attributes["app"], rs.Primary.ID)
if err != nil {
return err
}
if foundEndpoint.ID != rs.Primary.ID {
return fmt.Errorf("SSL endpoint not found")
}
*endpoint = *foundEndpoint
return nil
}
}