2016-01-26 18:06:33 -06:00
|
|
|
package azurerm
|
|
|
|
|
2016-06-01 15:17:21 -05:00
|
|
|
//import (
|
|
|
|
// "fmt"
|
|
|
|
// "log"
|
|
|
|
// "strings"
|
|
|
|
// "testing"
|
|
|
|
//
|
|
|
|
// "github.com/Azure/azure-sdk-for-go/storage"
|
|
|
|
// "github.com/hashicorp/terraform/helper/acctest"
|
|
|
|
// "github.com/hashicorp/terraform/helper/resource"
|
|
|
|
// "github.com/hashicorp/terraform/terraform"
|
|
|
|
//)
|
|
|
|
//
|
|
|
|
//func TestAccAzureRMStorageContainer_basic(t *testing.T) {
|
|
|
|
// var c storage.Container
|
|
|
|
//
|
|
|
|
// ri := acctest.RandInt()
|
|
|
|
// rs := strings.ToLower(acctest.RandString(11))
|
|
|
|
// config := fmt.Sprintf(testAccAzureRMStorageContainer_basic, ri, rs)
|
|
|
|
//
|
|
|
|
// resource.Test(t, resource.TestCase{
|
|
|
|
// PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
// Providers: testAccProviders,
|
|
|
|
// CheckDestroy: testCheckAzureRMStorageContainerDestroy,
|
|
|
|
// Steps: []resource.TestStep{
|
|
|
|
// resource.TestStep{
|
|
|
|
// Config: config,
|
|
|
|
// Check: resource.ComposeTestCheckFunc(
|
|
|
|
// testCheckAzureRMStorageContainerExists("azurerm_storage_container.test", &c),
|
|
|
|
// ),
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// })
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//func TestAccAzureRMStorageContainer_disappears(t *testing.T) {
|
|
|
|
// var c storage.Container
|
|
|
|
//
|
|
|
|
// ri := acctest.RandInt()
|
|
|
|
// rs := strings.ToLower(acctest.RandString(11))
|
|
|
|
// config := fmt.Sprintf(testAccAzureRMStorageContainer_basic, ri, rs)
|
|
|
|
//
|
|
|
|
// resource.Test(t, resource.TestCase{
|
|
|
|
// PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
// Providers: testAccProviders,
|
|
|
|
// CheckDestroy: testCheckAzureRMStorageContainerDestroy,
|
|
|
|
// Steps: []resource.TestStep{
|
|
|
|
// resource.TestStep{
|
|
|
|
// Config: config,
|
|
|
|
// Check: resource.ComposeTestCheckFunc(
|
|
|
|
// testCheckAzureRMStorageContainerExists("azurerm_storage_container.test", &c),
|
|
|
|
// testAccARMStorageContainerDisappears("azurerm_storage_container.test", &c),
|
|
|
|
// ),
|
|
|
|
// ExpectNonEmptyPlan: true,
|
|
|
|
// },
|
|
|
|
// },
|
|
|
|
// })
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//func testCheckAzureRMStorageContainerExists(name string, c *storage.Container) resource.TestCheckFunc {
|
|
|
|
// return func(s *terraform.State) error {
|
|
|
|
//
|
|
|
|
// rs, ok := s.RootModule().Resources[name]
|
|
|
|
// if !ok {
|
|
|
|
// return fmt.Errorf("Not found: %s", name)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// name := rs.Primary.Attributes["name"]
|
|
|
|
// storageAccountName := rs.Primary.Attributes["storage_account_name"]
|
|
|
|
// resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
|
|
|
|
// if !hasResourceGroup {
|
|
|
|
// return fmt.Errorf("Bad: no resource group found in state for storage container: %s", name)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// armClient := testAccProvider.Meta().(*ArmClient)
|
|
|
|
// blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName)
|
|
|
|
// if err != nil {
|
|
|
|
// return err
|
|
|
|
// }
|
|
|
|
// if !accountExists {
|
|
|
|
// return fmt.Errorf("Bad: Storage Account %q does not exist", storageAccountName)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// containers, err := blobClient.ListContainers(storage.ListContainersParameters{
|
|
|
|
// Prefix: name,
|
|
|
|
// Timeout: 90,
|
|
|
|
// })
|
|
|
|
//
|
|
|
|
// if len(containers.Containers) == 0 {
|
|
|
|
// return fmt.Errorf("Bad: Storage Container %q (storage account: %q) does not exist", name, storageAccountName)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// var found bool
|
|
|
|
// for _, container := range containers.Containers {
|
|
|
|
// if container.Name == name {
|
|
|
|
// found = true
|
|
|
|
// *c = container
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// if !found {
|
|
|
|
// return fmt.Errorf("Bad: Storage Container %q (storage account: %q) does not exist", name, storageAccountName)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//func testAccARMStorageContainerDisappears(name string, c *storage.Container) resource.TestCheckFunc {
|
|
|
|
// return func(s *terraform.State) error {
|
|
|
|
// rs, ok := s.RootModule().Resources[name]
|
|
|
|
// if !ok {
|
|
|
|
// return fmt.Errorf("Not found: %s", name)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// armClient := testAccProvider.Meta().(*ArmClient)
|
|
|
|
//
|
|
|
|
// storageAccountName := rs.Primary.Attributes["storage_account_name"]
|
|
|
|
// resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
|
|
|
|
// if !hasResourceGroup {
|
|
|
|
// return fmt.Errorf("Bad: no resource group found in state for storage container: %s", c.Name)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName)
|
|
|
|
// if err != nil {
|
|
|
|
// return err
|
|
|
|
// }
|
|
|
|
// if !accountExists {
|
|
|
|
// log.Printf("[INFO]Storage Account %q doesn't exist so the container won't exist", storageAccountName)
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// _, err = blobClient.DeleteContainerIfExists(c.Name)
|
|
|
|
// if err != nil {
|
|
|
|
// return err
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//func testCheckAzureRMStorageContainerDestroy(s *terraform.State) error {
|
|
|
|
// for _, rs := range s.RootModule().Resources {
|
|
|
|
// if rs.Type != "azurerm_storage_container" {
|
|
|
|
// continue
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// name := rs.Primary.Attributes["name"]
|
|
|
|
// storageAccountName := rs.Primary.Attributes["storage_account_name"]
|
|
|
|
// resourceGroup, hasResourceGroup := rs.Primary.Attributes["resource_group_name"]
|
|
|
|
// if !hasResourceGroup {
|
|
|
|
// return fmt.Errorf("Bad: no resource group found in state for storage container: %s", name)
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// armClient := testAccProvider.Meta().(*ArmClient)
|
|
|
|
// blobClient, accountExists, err := armClient.getBlobStorageClientForStorageAccount(resourceGroup, storageAccountName)
|
|
|
|
// if err != nil {
|
|
|
|
// //If we can't get keys then the blob can't exist
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
// if !accountExists {
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// containers, err := blobClient.ListContainers(storage.ListContainersParameters{
|
|
|
|
// Prefix: name,
|
|
|
|
// Timeout: 90,
|
|
|
|
// })
|
|
|
|
//
|
|
|
|
// if err != nil {
|
|
|
|
// return nil
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// var found bool
|
|
|
|
// for _, container := range containers.Containers {
|
|
|
|
// if container.Name == name {
|
|
|
|
// found = true
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// if found {
|
|
|
|
// return fmt.Errorf("Bad: Storage Container %q (storage account: %q) still exist", name, storageAccountName)
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// return nil
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//func TestValidateArmStorageContainerName(t *testing.T) {
|
|
|
|
// validNames := []string{
|
|
|
|
// "valid-name",
|
|
|
|
// "valid02-name",
|
|
|
|
// }
|
|
|
|
// for _, v := range validNames {
|
|
|
|
// _, errors := validateArmStorageContainerName(v, "name")
|
|
|
|
// if len(errors) != 0 {
|
|
|
|
// t.Fatalf("%q should be a valid Storage Container Name: %q", v, errors)
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// invalidNames := []string{
|
|
|
|
// "InvalidName1",
|
|
|
|
// "-invalidname1",
|
|
|
|
// "invalid_name",
|
|
|
|
// "invalid!",
|
|
|
|
// "ww",
|
|
|
|
// strings.Repeat("w", 65),
|
|
|
|
// }
|
|
|
|
// for _, v := range invalidNames {
|
|
|
|
// _, errors := validateArmStorageContainerName(v, "name")
|
|
|
|
// if len(errors) == 0 {
|
|
|
|
// t.Fatalf("%q should be an invalid Storage Container Name", v)
|
|
|
|
// }
|
|
|
|
// }
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//var testAccAzureRMStorageContainer_basic = `
|
|
|
|
//resource "azurerm_resource_group" "test" {
|
|
|
|
// name = "acctestrg-%d"
|
|
|
|
// location = "westus"
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//resource "azurerm_storage_account" "test" {
|
|
|
|
// name = "acctestacc%s"
|
|
|
|
// resource_group_name = "${azurerm_resource_group.test.name}"
|
|
|
|
// location = "westus"
|
|
|
|
// account_type = "Standard_LRS"
|
|
|
|
//
|
|
|
|
// tags {
|
|
|
|
// environment = "staging"
|
|
|
|
// }
|
|
|
|
//}
|
|
|
|
//
|
|
|
|
//resource "azurerm_storage_container" "test" {
|
|
|
|
// name = "vhds"
|
|
|
|
// resource_group_name = "${azurerm_resource_group.test.name}"
|
|
|
|
// storage_account_name = "${azurerm_storage_account.test.name}"
|
|
|
|
// container_access_type = "private"
|
|
|
|
//}
|
|
|
|
//`
|