package aws import ( "fmt" "testing" "github.com/hashicorp/terraform/helper/acctest" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/aws/awserr" "github.com/aws/aws-sdk-go/service/opsworks" ) /////////////////////////////// //// Tests for the No-VPC case /////////////////////////////// func TestAccAWSOpsworksStackNoVpc(t *testing.T) { stackName := fmt.Sprintf("tf-opsworks-acc-%d", acctest.RandInt()) var opsstack opsworks.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAwsOpsworksStackDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAwsOpsworksStackConfigNoVpcCreate(stackName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSOpsworksStackExists( "aws_opsworks_stack.tf-acc", false, &opsstack), testAccCheckAWSOpsworksCreateStackAttributes( &opsstack, "us-east-1a", stackName), testAccAwsOpsworksStackCheckResourceAttrsCreate( "us-east-1a", stackName), ), }, // resource.TestStep{ // Config: testAccAWSOpsworksStackConfigNoVpcUpdate(stackName), // Check: testAccAwsOpsworksStackCheckResourceAttrsUpdate("us-east-1c", stackName), // }, }, }) } func TestAccAWSOpsworksStackVpc(t *testing.T) { stackName := fmt.Sprintf("tf-opsworks-acc-%d", acctest.RandInt()) var opsstack opsworks.Stack resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckAwsOpsworksStackDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccAwsOpsworksStackConfigVpcCreate(stackName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSOpsworksStackExists( "aws_opsworks_stack.tf-acc", true, &opsstack), testAccCheckAWSOpsworksCreateStackAttributes( &opsstack, "us-west-2a", stackName), testAccAwsOpsworksStackCheckResourceAttrsCreate( "us-west-2a", stackName), ), }, resource.TestStep{ Config: testAccAWSOpsworksStackConfigVpcUpdate(stackName), Check: resource.ComposeTestCheckFunc( testAccCheckAWSOpsworksStackExists( "aws_opsworks_stack.tf-acc", true, &opsstack), testAccCheckAWSOpsworksUpdateStackAttributes( &opsstack, "us-west-2a", stackName), testAccAwsOpsworksStackCheckResourceAttrsUpdate( "us-west-2a", stackName), ), }, }, }) } //////////////////////////// //// Checkers and Utilities //////////////////////////// func testAccAwsOpsworksStackCheckResourceAttrsCreate(zone, stackName string) resource.TestCheckFunc { return resource.ComposeTestCheckFunc( resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "name", stackName, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_availability_zone", zone, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_os", "Amazon Linux 2014.09", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_root_device_type", "ebs", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "custom_json", `{"key": "value"}`, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "configuration_manager_version", "11.10", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "use_opsworks_security_groups", "false", ), ) } func testAccAwsOpsworksStackCheckResourceAttrsUpdate(zone, stackName string) resource.TestCheckFunc { return resource.ComposeTestCheckFunc( resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "name", stackName, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_availability_zone", zone, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_os", "Amazon Linux 2014.09", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "default_root_device_type", "ebs", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "custom_json", `{"key": "value"}`, ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "configuration_manager_version", "11.10", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "use_opsworks_security_groups", "false", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "use_custom_cookbooks", "true", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "manage_berkshelf", "true", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "custom_cookbooks_source.0.type", "git", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "custom_cookbooks_source.0.revision", "master", ), resource.TestCheckResourceAttr( "aws_opsworks_stack.tf-acc", "custom_cookbooks_source.0.url", "https://github.com/aws/opsworks-example-cookbooks.git", ), ) } func testAccCheckAWSOpsworksStackExists( n string, vpc bool, opsstack *opsworks.Stack) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No ID is set") } conn := testAccProvider.Meta().(*AWSClient).opsworksconn params := &opsworks.DescribeStacksInput{ StackIds: []*string{aws.String(rs.Primary.ID)}, } resp, err := conn.DescribeStacks(params) if err != nil { return err } if v := len(resp.Stacks); v != 1 { return fmt.Errorf("Expected 1 response returned, got %d", v) } *opsstack = *resp.Stacks[0] if vpc { if rs.Primary.Attributes["vpc_id"] != *opsstack.VpcId { return fmt.Errorf("VPCID Got %s, expected %s", *opsstack.VpcId, rs.Primary.Attributes["vpc_id"]) } if rs.Primary.Attributes["default_subnet_id"] != *opsstack.DefaultSubnetId { return fmt.Errorf("Default subnet Id Got %s, expected %s", *opsstack.DefaultSubnetId, rs.Primary.Attributes["default_subnet_id"]) } } return nil } } func testAccCheckAWSOpsworksCreateStackAttributes( opsstack *opsworks.Stack, zone, stackName string) resource.TestCheckFunc { return func(s *terraform.State) error { if *opsstack.Name != stackName { return fmt.Errorf("Unnexpected stackName: %s", *opsstack.Name) } if *opsstack.DefaultAvailabilityZone != zone { return fmt.Errorf("Unnexpected DefaultAvailabilityZone: %s", *opsstack.DefaultAvailabilityZone) } if *opsstack.DefaultOs != "Amazon Linux 2014.09" { return fmt.Errorf("Unnexpected stackName: %s", *opsstack.DefaultOs) } if *opsstack.DefaultRootDeviceType != "ebs" { return fmt.Errorf("Unnexpected DefaultRootDeviceType: %s", *opsstack.DefaultRootDeviceType) } if *opsstack.CustomJson != `{"key": "value"}` { return fmt.Errorf("Unnexpected CustomJson: %s", *opsstack.CustomJson) } if *opsstack.ConfigurationManager.Version != "11.10" { return fmt.Errorf("Unnexpected Version: %s", *opsstack.ConfigurationManager.Version) } if *opsstack.UseOpsworksSecurityGroups { return fmt.Errorf("Unnexpected UseOpsworksSecurityGroups: %s", *opsstack.UseOpsworksSecurityGroups) } return nil } } func testAccCheckAWSOpsworksUpdateStackAttributes( opsstack *opsworks.Stack, zone, stackName string) resource.TestCheckFunc { return func(s *terraform.State) error { if *opsstack.Name != stackName { return fmt.Errorf("Unnexpected stackName: %s", *opsstack.Name) } if *opsstack.DefaultAvailabilityZone != zone { return fmt.Errorf("Unnexpected DefaultAvailabilityZone: %s", *opsstack.DefaultAvailabilityZone) } if *opsstack.DefaultOs != "Amazon Linux 2014.09" { return fmt.Errorf("Unnexpected stackName: %s", *opsstack.DefaultOs) } if *opsstack.DefaultRootDeviceType != "ebs" { return fmt.Errorf("Unnexpected DefaultRootDeviceType: %s", *opsstack.DefaultRootDeviceType) } if *opsstack.CustomJson != `{"key": "value"}` { return fmt.Errorf("Unnexpected CustomJson: %s", *opsstack.CustomJson) } if *opsstack.ConfigurationManager.Version != "11.10" { return fmt.Errorf("Unnexpected Version: %s", *opsstack.ConfigurationManager.Version) } if !*opsstack.UseCustomCookbooks { return fmt.Errorf("Unnexpected UseCustomCookbooks: %s", *opsstack.UseCustomCookbooks) } if !*opsstack.ChefConfiguration.ManageBerkshelf { return fmt.Errorf("Unnexpected ManageBerkshelf: %s", *opsstack.ChefConfiguration.ManageBerkshelf) } if *opsstack.CustomCookbooksSource.Type != "git" { return fmt.Errorf("Unnexpected *opsstack.CustomCookbooksSource.Type: %s", *opsstack.CustomCookbooksSource.Type) } if *opsstack.CustomCookbooksSource.Revision != "master" { return fmt.Errorf("Unnexpected *opsstack.CustomCookbooksSource.Type: %s", *opsstack.CustomCookbooksSource.Revision) } if *opsstack.CustomCookbooksSource.Url != "https://github.com/aws/opsworks-example-cookbooks.git" { return fmt.Errorf("Unnexpected *opsstack.CustomCookbooksSource.Type: %s", *opsstack.CustomCookbooksSource.Url) } return nil } } func testAccCheckAwsOpsworksStackDestroy(s *terraform.State) error { opsworksconn := testAccProvider.Meta().(*AWSClient).opsworksconn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_opsworks_stack" { continue } req := &opsworks.DescribeStacksInput{ StackIds: []*string{ aws.String(rs.Primary.ID), }, } _, err := opsworksconn.DescribeStacks(req) if err != nil { if awserr, ok := err.(awserr.Error); ok { if awserr.Code() == "ResourceNotFoundException" { // not found, all good return nil } } return err } } return fmt.Errorf("Fall through error for OpsWorks stack test") } ////////////////////////////////////////////////// //// Helper configs for the necessary IAM objects ////////////////////////////////////////////////// func testAccAwsOpsworksStackConfigNoVpcCreate(name string) string { return fmt.Sprintf(` resource "aws_opsworks_stack" "tf-acc" { name = "%s" region = "us-east-1" service_role_arn = "${aws_iam_role.opsworks_service.arn}" default_instance_profile_arn = "${aws_iam_instance_profile.opsworks_instance.arn}" default_availability_zone = "us-east-1a" default_os = "Amazon Linux 2014.09" default_root_device_type = "ebs" custom_json = "{\"key\": \"value\"}" configuration_manager_version = "11.10" use_opsworks_security_groups = false } resource "aws_iam_role" "opsworks_service" { name = "%s_opsworks_service" assume_role_policy = <