mirror of
https://github.com/kreuzwerker/terraform-provider-docker.git
synced 2025-12-18 23:06:10 -05:00
Some checks failed
Acc Tests / acc-test (TestAccDockerConfig, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerConfig, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerNetwork, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerNetwork, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerPlugin, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerPlugin, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerSecret, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerSecret, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerTag, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerTag, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerVolume, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (TestAccDockerVolume, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerContainer, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerContainer, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerImage, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerImage, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerRegistryImage, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerRegistryImage, 1.8.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerService, 0.15.x) (push) Has been cancelled
Acc Tests / acc-test (true, TestAccDockerService, 1.8.x) (push) Has been cancelled
Compile Binaries / compile-fast (push) Has been cancelled
Compile Binaries / compile (push) Has been cancelled
golangci-lint / lint (push) Has been cancelled
Unit Tests / unit-test (push) Has been cancelled
Website Checks / markdown-link-check (push) Has been cancelled
Docs and Website Lint / website-generation (push) Has been cancelled
Docs and Website Lint / website-lint-spellcheck-tffmt (push) Has been cancelled
Docs and Website Lint / markdown-lint (push) Has been cancelled
405 lines
11 KiB
Go
405 lines
11 KiB
Go
package provider
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/docker/docker/api/types/network"
|
|
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
|
|
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
|
|
)
|
|
|
|
func TestAccDockerNetwork_basic(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkConfig"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestAccDockerNetwork_full(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
testCheckNetworkInspect := func(*terraform.State) error {
|
|
if n.Scope == "" || n.Scope != "local" {
|
|
return fmt.Errorf("Network Scope is wrong: %v", n.Scope)
|
|
}
|
|
|
|
if n.Driver == "" || n.Driver != "bridge" {
|
|
return fmt.Errorf("Network Driver is wrong: %v", n.Driver)
|
|
}
|
|
|
|
if n.EnableIPv6 != false {
|
|
return fmt.Errorf("Network EnableIPv6 is wrong: %v", n.EnableIPv6)
|
|
}
|
|
|
|
if n.IPAM.Driver == "" ||
|
|
n.IPAM.Options != nil ||
|
|
len(n.IPAM.Config) != 1 ||
|
|
n.IPAM.Config[0].Gateway != "" ||
|
|
n.IPAM.Config[0].IPRange != "" ||
|
|
n.IPAM.Config[0].AuxAddress != nil ||
|
|
n.IPAM.Config[0].Subnet != "10.0.1.0/24" ||
|
|
n.IPAM.Driver != "default" {
|
|
return fmt.Errorf("Network IPAM is wrong: %v", n.IPAM)
|
|
}
|
|
|
|
if n.Internal != true {
|
|
return fmt.Errorf("Network Internal is wrong: %v", n.Internal)
|
|
}
|
|
|
|
if n.Attachable != false {
|
|
return fmt.Errorf("Network Attachable is wrong: %v", n.Attachable)
|
|
}
|
|
|
|
if n.Ingress != false {
|
|
return fmt.Errorf("Network Ingress is wrong: %v", n.Ingress)
|
|
}
|
|
|
|
if n.ConfigFrom.Network != "" {
|
|
return fmt.Errorf("Network ConfigFrom is wrong: %v", n.ConfigFrom)
|
|
}
|
|
|
|
if n.ConfigOnly != false {
|
|
return fmt.Errorf("Network ConfigOnly is wrong: %v", n.ConfigOnly)
|
|
}
|
|
|
|
if n.Containers == nil || len(n.Containers) != 0 {
|
|
return fmt.Errorf("Network Containers is wrong: %v", n.Containers)
|
|
}
|
|
|
|
if n.Options == nil || len(n.Options) != 0 {
|
|
return fmt.Errorf("Network Options is wrong: %v", n.Options)
|
|
}
|
|
|
|
if n.Labels == nil ||
|
|
len(n.Labels) != 2 ||
|
|
!mapEquals("com.docker.compose.network", "foo", n.Labels) ||
|
|
!mapEquals("com.docker.compose.project", "test", n.Labels) {
|
|
return fmt.Errorf("Network Labels is wrong: %v", n.Labels)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkConfigFull"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testCheckNetworkInspect,
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
// TODO mavogel: add full network config test in #74 (import resources)
|
|
|
|
func testAccNetwork(n string, networkToCheck *network.Inspect) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
ctx := context.Background()
|
|
rs, ok := s.RootModule().Resources[n]
|
|
if !ok {
|
|
return fmt.Errorf("Not found: %s", n)
|
|
}
|
|
|
|
if rs.Primary.ID == "" {
|
|
return fmt.Errorf("No ID is set")
|
|
}
|
|
|
|
client, err := testAccProvider.Meta().(*ProviderConfig).MakeClient(ctx, nil)
|
|
if err != nil {
|
|
return fmt.Errorf("failed to create Docker client: %w", err)
|
|
}
|
|
networks, err := client.NetworkList(ctx, network.ListOptions{})
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, n := range networks {
|
|
if n.ID == rs.Primary.ID {
|
|
inspected, err := client.NetworkInspect(ctx, n.ID, network.InspectOptions{})
|
|
if err != nil {
|
|
return fmt.Errorf("Network could not be obtained: %s", err)
|
|
}
|
|
*networkToCheck = inspected
|
|
return nil
|
|
}
|
|
}
|
|
|
|
return fmt.Errorf("Network not found: %s", rs.Primary.ID)
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_internal(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkInternalConfig"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testAccNetworkInternal(&n, true),
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccNetworkInternal(network *network.Inspect, internal bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if network.Internal != internal {
|
|
return fmt.Errorf("Bad value for attribute 'internal': %t", network.Internal)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_attachable(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkAttachableConfig"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testAccNetworkAttachable(&n, true),
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccNetworkAttachable(network *network.Inspect, attachable bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if network.Attachable != attachable {
|
|
return fmt.Errorf("Bad value for attribute 'attachable': %t", network.Attachable)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_ingress(t *testing.T) {
|
|
ctx := context.Background()
|
|
var n network.Inspect
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() {
|
|
testAccPreCheck(t)
|
|
// as we join the swarm an ingress network is created by default
|
|
// As only one can exist, we remove it for the test
|
|
removeSwarmIngressNetwork(ctx, t)
|
|
},
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIngressConfig"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork("docker_network.foo", &n),
|
|
testAccNetworkIngress(&n, true),
|
|
),
|
|
},
|
|
},
|
|
CheckDestroy: func(state *terraform.State) error {
|
|
// we leave the swarm because in the next testAccPreCheck
|
|
// the node will join the swarm again
|
|
// and so recreate the default swarm ingress network
|
|
return nodeLeaveSwarm(ctx, t)
|
|
},
|
|
})
|
|
}
|
|
|
|
func removeSwarmIngressNetwork(ctx context.Context, t *testing.T) {
|
|
client, err := testAccProvider.Meta().(*ProviderConfig).MakeClient(ctx, nil)
|
|
if err != nil {
|
|
t.Errorf("failed to create Docker client: %v", err)
|
|
}
|
|
networks, err := client.NetworkList(ctx, network.ListOptions{})
|
|
if err != nil {
|
|
t.Errorf("failed to list swarm networks: %v", err)
|
|
}
|
|
var ingressNetworkID string
|
|
for _, network := range networks {
|
|
if network.Ingress {
|
|
ingressNetworkID = network.ID
|
|
break
|
|
}
|
|
}
|
|
err = client.NetworkRemove(ctx, ingressNetworkID)
|
|
if err != nil {
|
|
t.Errorf("failed to remove swarm ingress network '%s': %v", ingressNetworkID, err)
|
|
}
|
|
}
|
|
|
|
func nodeLeaveSwarm(ctx context.Context, t *testing.T) error {
|
|
client, err := testAccProvider.Meta().(*ProviderConfig).MakeClient(ctx, nil)
|
|
if err != nil {
|
|
t.Errorf("failed to create Docker client: %v", err)
|
|
}
|
|
force := true
|
|
err = client.SwarmLeave(ctx, force)
|
|
if err != nil {
|
|
t.Errorf("node failed to leave the swarm: %v", err)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func testAccNetworkIngress(network *network.Inspect, ingress bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if network.Ingress != ingress {
|
|
return fmt.Errorf("Bad value for attribute 'ingress': %t", network.Ingress)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_ipv4(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIPv4Config"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testAccNetworkIPv4(&n, true),
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccNetworkIPv4(network *network.Inspect, internal bool) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if len(network.IPAM.Config) != 1 {
|
|
return fmt.Errorf("Bad value for IPAM configuration count: %d", len(network.IPAM.Config))
|
|
}
|
|
if network.IPAM.Config[0].Subnet != "10.0.1.0/24" {
|
|
return fmt.Errorf("Bad value for attribute 'subnet': %v", network.IPAM.Config[0].Subnet)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_ipv6(t *testing.T) {
|
|
t.Skip("TODO mavogel: need to fix ipv6 network state")
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIPv6Config"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testAccNetworkIPv6(&n, true),
|
|
),
|
|
},
|
|
// TODO mavogel: ipam config goes from 2->1
|
|
// probably suppress diff -> #74 (import resources)
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccNetworkIPv6(network *network.Inspect, internal bool) resource.TestCheckFunc { //nolint:unused
|
|
return func(s *terraform.State) error {
|
|
if !network.EnableIPv6 {
|
|
return fmt.Errorf("Bad value for attribute 'ipv6': %t", network.EnableIPv6)
|
|
}
|
|
if len(network.IPAM.Config) != 2 {
|
|
return fmt.Errorf("Bad value for IPAM configuration count: %d", len(network.IPAM.Config))
|
|
}
|
|
if network.IPAM.Config[1].Subnet != "fd00::1/64" {
|
|
return fmt.Errorf("Bad value for attribute 'subnet': %v", network.IPAM.Config[1].Subnet)
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func TestAccDockerNetwork_labels(t *testing.T) {
|
|
var n network.Inspect
|
|
resourceName := "docker_network.foo"
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
ProviderFactories: providerFactories,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkLabelsConfig"),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccNetwork(resourceName, &n),
|
|
testCheckLabelMap(resourceName, "labels",
|
|
map[string]string{
|
|
"com.docker.compose.network": "foo",
|
|
"com.docker.compose.project": "test",
|
|
},
|
|
),
|
|
),
|
|
},
|
|
{
|
|
ResourceName: resourceName,
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|