mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-08 15:13:56 -06:00
ed403882e2
Adds computed `arn` to security group data source ``` $ make testacc TEST=./builtin/providers/aws TESTARGS="-run=TestAccDataSourceAwsSecurityGroup" ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/05/05 10:17:35 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccDataSourceAwsSecurityGroup -timeout 120m === RUN TestAccDataSourceAwsSecurityGroup --- PASS: TestAccDataSourceAwsSecurityGroup (56.72s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 56.725s ```
152 lines
3.6 KiB
Go
152 lines
3.6 KiB
Go
package aws
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"strings"
|
|
|
|
"github.com/hashicorp/terraform/helper/acctest"
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
)
|
|
|
|
func TestAccDataSourceAwsSecurityGroup(t *testing.T) {
|
|
rInt := acctest.RandInt()
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: testAccDataSourceAwsSecurityGroupConfig(rInt),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccDataSourceAwsSecurityGroupCheck("data.aws_security_group.by_id"),
|
|
testAccDataSourceAwsSecurityGroupCheck("data.aws_security_group.by_tag"),
|
|
testAccDataSourceAwsSecurityGroupCheck("data.aws_security_group.by_filter"),
|
|
testAccDataSourceAwsSecurityGroupCheck("data.aws_security_group.by_name"),
|
|
testAccDataSourceAwsSecurityGroupCheckDefault("data.aws_security_group.default_by_name"),
|
|
),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccDataSourceAwsSecurityGroupCheck(name string) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
rs, ok := s.RootModule().Resources[name]
|
|
if !ok {
|
|
return fmt.Errorf("root module has no resource called %s", name)
|
|
}
|
|
|
|
SGRs, ok := s.RootModule().Resources["aws_security_group.test"]
|
|
if !ok {
|
|
return fmt.Errorf("can't find aws_security_group.test in state")
|
|
}
|
|
vpcRs, ok := s.RootModule().Resources["aws_vpc.test"]
|
|
if !ok {
|
|
return fmt.Errorf("can't find aws_vpc.test in state")
|
|
}
|
|
attr := rs.Primary.Attributes
|
|
|
|
if attr["id"] != SGRs.Primary.Attributes["id"] {
|
|
return fmt.Errorf(
|
|
"id is %s; want %s",
|
|
attr["id"],
|
|
SGRs.Primary.Attributes["id"],
|
|
)
|
|
}
|
|
|
|
if attr["vpc_id"] != vpcRs.Primary.Attributes["id"] {
|
|
return fmt.Errorf(
|
|
"vpc_id is %s; want %s",
|
|
attr["vpc_id"],
|
|
vpcRs.Primary.Attributes["id"],
|
|
)
|
|
}
|
|
|
|
if attr["tags.Name"] != "tf-acctest" {
|
|
return fmt.Errorf("bad Name tag %s", attr["tags.Name"])
|
|
}
|
|
|
|
if !strings.Contains(attr["arn"], attr["id"]) {
|
|
return fmt.Errorf("bad ARN %s", attr["arn"])
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccDataSourceAwsSecurityGroupCheckDefault(name string) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
rs, ok := s.RootModule().Resources[name]
|
|
if !ok {
|
|
return fmt.Errorf("root module has no resource called %s", name)
|
|
}
|
|
|
|
vpcRs, ok := s.RootModule().Resources["aws_vpc.test"]
|
|
if !ok {
|
|
return fmt.Errorf("can't find aws_vpc.test in state")
|
|
}
|
|
attr := rs.Primary.Attributes
|
|
|
|
if attr["id"] != vpcRs.Primary.Attributes["default_security_group_id"] {
|
|
return fmt.Errorf(
|
|
"id is %s; want %s",
|
|
attr["id"],
|
|
vpcRs.Primary.Attributes["default_security_group_id"],
|
|
)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccDataSourceAwsSecurityGroupConfig(rInt int) string {
|
|
return fmt.Sprintf(`
|
|
provider "aws" {
|
|
region = "eu-west-1"
|
|
}
|
|
resource "aws_vpc" "test" {
|
|
cidr_block = "172.16.0.0/16"
|
|
|
|
tags {
|
|
Name = "terraform-testacc-subnet-data-source"
|
|
}
|
|
}
|
|
|
|
resource "aws_security_group" "test" {
|
|
vpc_id = "${aws_vpc.test.id}"
|
|
name = "test-%d"
|
|
tags {
|
|
Name = "tf-acctest"
|
|
Seed = "%d"
|
|
}
|
|
}
|
|
|
|
data "aws_security_group" "by_id" {
|
|
id = "${aws_security_group.test.id}"
|
|
}
|
|
|
|
data "aws_security_group" "by_name" {
|
|
name = "${aws_security_group.test.name}"
|
|
}
|
|
|
|
data "aws_security_group" "default_by_name" {
|
|
vpc_id = "${aws_vpc.test.id}"
|
|
name = "default"
|
|
}
|
|
|
|
data "aws_security_group" "by_tag" {
|
|
tags {
|
|
Seed = "${aws_security_group.test.tags["Seed"]}"
|
|
}
|
|
}
|
|
|
|
data "aws_security_group" "by_filter" {
|
|
filter {
|
|
name = "group-name"
|
|
values = ["${aws_security_group.test.name}"]
|
|
}
|
|
}`, rInt, rInt)
|
|
}
|