mirror of
https://github.com/opentofu/opentofu.git
synced 2025-02-20 11:48:24 -06:00
* vendor: update gopkg.in/ns1/ns1-go.v2 * provider/ns1: Port the ns1 provider to Terraform core * docs/ns1: Document the ns1 provider * ns1: rename remaining nsone -> ns1 (#10805) * Ns1 provider (#11300) * provider/ns1: Flesh out support for meta structs. Following the structure outlined by @pashap. Using reflection to reduce copy/paste. Putting metas inside single-item lists. This is clunky, but I couldn't figure out how else to have a nested struct. Maybe the Terraform people know a better way? Inside the meta struct, all fields are always written to the state; I can't figure out how to omit fields that aren't used. This is not just verbose, it actually causes issues because you can't have both "up" and "up_feed" set). Also some minor other changes: - Add "terraform" import support to records and zones. - Create helper class StringEnum. * provider/ns1: Make fmt * provider/ns1: Remove stubbed out RecordRead (used for testing metadata change). * provider/ns1: Need to get interface that m contains from Ptr Value with Elem() * provider/ns1: Use empty string to indicate no feed given. * provider/ns1: Remove old record.regions fields. * provider/ns1: Removes redundant testAccCheckRecordState * provider/ns1: Moves account permissions logic to permissions.go * provider/ns1: Adds tests for team resource. * provider/ns1: Move remaining permissions logic to permissions.go * ns1/provider: Adds datasource.config * provider/ns1: Small clean up of datafeed resource tests * provider/ns1: removes testAccCheckZoneState in favor of explicit name check * provider/ns1: More renaming of nsone -> ns1 * provider/ns1: Comment out metadata for the moment. * Ns1 provider (#11347) * Fix the removal of empty containers from a flatmap Removal of empty nested containers from a flatmap would sometimes fail a sanity check when removed in the wrong order. This would only fail sometimes due to map iteration. There was also an off-by-one error in the prefix check which could match the incorrect keys. * provider/ns1: Adds ns1 go client through govendor. * provider/ns1: Removes unused debug line * docs/ns1: Adds docs around apikey/datasource/datafeed/team/user/record. * provider/ns1: Gets go vet green
210 lines
5.7 KiB
Go
210 lines
5.7 KiB
Go
package ns1
|
|
|
|
import (
|
|
"fmt"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
|
|
ns1 "gopkg.in/ns1/ns1-go.v2/rest"
|
|
"gopkg.in/ns1/ns1-go.v2/rest/model/account"
|
|
)
|
|
|
|
func TestAccTeam_basic(t *testing.T) {
|
|
var team account.Team
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckTeamDestroy,
|
|
Steps: []resource.TestStep{
|
|
resource.TestStep{
|
|
Config: testAccTeamBasic,
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckTeamExists("ns1_team.foobar", &team),
|
|
testAccCheckTeamName(&team, "terraform test"),
|
|
testAccCheckTeamDNSPermission(&team, "view_zones", true),
|
|
testAccCheckTeamDNSPermission(&team, "zones_allow_by_default", true),
|
|
testAccCheckTeamDNSPermissionZones(&team, "zones_allow", []string{"mytest.zone"}),
|
|
testAccCheckTeamDNSPermissionZones(&team, "zones_deny", []string{"myother.zone"}),
|
|
testAccCheckTeamDataPermission(&team, "manage_datasources", true),
|
|
),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestAccTeam_updated(t *testing.T) {
|
|
var team account.Team
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckTeamDestroy,
|
|
Steps: []resource.TestStep{
|
|
resource.TestStep{
|
|
Config: testAccTeamBasic,
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckTeamExists("ns1_team.foobar", &team),
|
|
testAccCheckTeamName(&team, "terraform test"),
|
|
),
|
|
},
|
|
resource.TestStep{
|
|
Config: testAccTeamUpdated,
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckTeamExists("ns1_team.foobar", &team),
|
|
testAccCheckTeamName(&team, "terraform test updated"),
|
|
testAccCheckTeamDNSPermission(&team, "view_zones", true),
|
|
testAccCheckTeamDNSPermission(&team, "zones_allow_by_default", true),
|
|
testAccCheckTeamDNSPermissionZones(&team, "zones_allow", []string{}),
|
|
testAccCheckTeamDNSPermissionZones(&team, "zones_deny", []string{}),
|
|
testAccCheckTeamDataPermission(&team, "manage_datasources", false),
|
|
),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccCheckTeamExists(n string, team *account.Team) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
rs, ok := s.RootModule().Resources[n]
|
|
if !ok {
|
|
return fmt.Errorf("Not found: %s", n)
|
|
}
|
|
|
|
if rs.Primary.ID == "" {
|
|
return fmt.Errorf("NoID is set")
|
|
}
|
|
|
|
client := testAccProvider.Meta().(*ns1.Client)
|
|
|
|
foundTeam, _, err := client.Teams.Get(rs.Primary.Attributes["id"])
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if foundTeam.Name != rs.Primary.Attributes["name"] {
|
|
return fmt.Errorf("Team not found")
|
|
}
|
|
|
|
*team = *foundTeam
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckTeamDestroy(s *terraform.State) error {
|
|
client := testAccProvider.Meta().(*ns1.Client)
|
|
|
|
for _, rs := range s.RootModule().Resources {
|
|
if rs.Type != "ns1_team" {
|
|
continue
|
|
}
|
|
|
|
team, _, err := client.Teams.Get(rs.Primary.Attributes["id"])
|
|
if err == nil {
|
|
return fmt.Errorf("Team still exists: %#v: %#v", err, team.Name)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func testAccCheckTeamName(team *account.Team, expected string) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if team.Name != expected {
|
|
return fmt.Errorf("Name: got: %s want: %s", team.Name, expected)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckTeamDNSPermission(team *account.Team, perm string, expected bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
dns := team.Permissions.DNS
|
|
|
|
switch perm {
|
|
case "view_zones":
|
|
if dns.ViewZones != expected {
|
|
return fmt.Errorf("DNS.ViewZones: got: %t want: %t", dns.ViewZones, expected)
|
|
}
|
|
case "manage_zones":
|
|
if dns.ManageZones != expected {
|
|
return fmt.Errorf("DNS.ManageZones: got: %t want: %t", dns.ManageZones, expected)
|
|
}
|
|
case "zones_allow_by_default":
|
|
if dns.ZonesAllowByDefault != expected {
|
|
return fmt.Errorf("DNS.ZonesAllowByDefault: got: %t want: %t", dns.ZonesAllowByDefault, expected)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckTeamDataPermission(team *account.Team, perm string, expected bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
data := team.Permissions.Data
|
|
|
|
switch perm {
|
|
case "push_to_datafeeds":
|
|
if data.PushToDatafeeds != expected {
|
|
return fmt.Errorf("Data.PushToDatafeeds: got: %t want: %t", data.PushToDatafeeds, expected)
|
|
}
|
|
case "manage_datasources":
|
|
if data.ManageDatasources != expected {
|
|
return fmt.Errorf("Data.ManageDatasources: got: %t want: %t", data.ManageDatasources, expected)
|
|
}
|
|
case "manage_datafeeds":
|
|
if data.ManageDatafeeds != expected {
|
|
return fmt.Errorf("Data.ManageDatafeeds: got: %t want: %t", data.ManageDatafeeds, expected)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckTeamDNSPermissionZones(team *account.Team, perm string, expected []string) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
dns := team.Permissions.DNS
|
|
|
|
switch perm {
|
|
case "zones_allow":
|
|
if !reflect.DeepEqual(dns.ZonesAllow, expected) {
|
|
return fmt.Errorf("DNS.ZonesAllow: got: %v want: %v", dns.ZonesAllow, expected)
|
|
}
|
|
case "zones_deny":
|
|
if !reflect.DeepEqual(dns.ZonesDeny, expected) {
|
|
return fmt.Errorf("DNS.ZonesDeny: got: %v want: %v", dns.ZonesDeny, expected)
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
const testAccTeamBasic = `
|
|
resource "ns1_team" "foobar" {
|
|
name = "terraform test"
|
|
|
|
dns_view_zones = true
|
|
dns_zones_allow_by_default = true
|
|
dns_zones_allow = ["mytest.zone"]
|
|
dns_zones_deny = ["myother.zone"]
|
|
|
|
data_manage_datasources = true
|
|
}`
|
|
|
|
const testAccTeamUpdated = `
|
|
resource "ns1_team" "foobar" {
|
|
name = "terraform test updated"
|
|
|
|
dns_view_zones = true
|
|
dns_zones_allow_by_default = true
|
|
|
|
data_manage_datasources = false
|
|
}`
|