terraform-provider-docker/internal/provider/resource_docker_network_test.go
Manuel Vogel 0588c2071b
chore/refactor tests (#201)
* chore: format test configs for datasources

* chore: outlines load test config helper and structure

* docs(contributing): add command for resouce tests

to have an example of the regex

* refactor: move container test configs into separate files

* fix: add insecure_skip_verify for image pulls

to fix the local test setup with invalid certs

* chore(ci): remove insecure registry adaption

* chore: regenerate website

* chore: update gitignore for scipts/testing dir

* fix: replace nodejs services with go versions

* fix: move testing program versions in separate files

* test: reactivate flaky test from travis

* chore: fix linter on all go files

* fix(linter): testing go servers

* chore(ci): add env for go version

* chore(ci): name workflow steps

also moves description of available docker versions in to acc dockerfile

* Revert "test: reactivate flaky test from travis"

This reverts commit b02654acc4d6b7d02c8f3ba090e6a3f248741b10.

* docs: fix provider-ssh example

* chore: use alpine als final image for tests

* refactor: move test configs from folder into testname.tf files

* refactor: image delete log is now debug and indented

* refactor: image test config into seprate files

* refactor: move network test config into seperate files

* refactor: move plugin test config into seperate files

* chore: rename registry image test file

* refactor: move registry_image test config into seperate files

* chore: format secret test configs

* refactor: inline volume test configs

* fix: remove unused volume label test function

* refactor: move service test configs into seperate files

* test: reactivate and fix service test

* chore: simplify insecure skip verify add to http client

* chore(ci): debug into service test

* chore(ci): add testacc setup

* chore: format tf config for provider test

* chore(ci): add debug output for config.json

* fix: check service auth for emptyness

* fix: remove re-read of provider auth config

because the bug occured only in CI as the meta object might be GCd

* test: pass auth to service instead of provider

* chore: reactivate all acc tests

* test: outlines service inspect json check for full spec

* test: add service inspect json checks

* test: finish service inspect json checks

* chore(service): move test helper to end to of the file

* chore: move mapEquals to test helpers

* test: add json inspect for config

* chore: add debug inspect log for plugin, secret and volume

* test: add json inspect for secret

* test: add json inspect for image

* test: add json inspect for network

* test: add json inspect for plugin

* test: add json inspect for volume

* test: inline ds plugin test configs

* test: inline network configs

* test: move ds reg image configs into separate files

* test: reactivates container upload checks

* chore: adapt issues ref from old to new xw repo

* fix: reactivate network ingress test

and provide helpers for removing the default ingress network and leaving the swamr

* docs: rerun website gen

* test: fix reg image build and keep test

* chore: add name to todo

* chore: move ds network and plugin specs to file

* chore: format provider test spec

* chore: use simpler error message for empty strings
2021-05-31 16:11:49 +09:00

397 lines
11 KiB
Go

package provider
import (
"context"
"fmt"
"testing"
"github.com/docker/docker/api/types"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
)
func TestAccDockerNetwork_basic(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkConfig"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func TestAccDockerNetwork_full(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
testCheckNetworkInspect := func(*terraform.State) error {
if n.Scope == "" || n.Scope != "local" {
return fmt.Errorf("Network Scope is wrong: %v", n.Scope)
}
if n.Driver == "" || n.Driver != "bridge" {
return fmt.Errorf("Network Driver is wrong: %v", n.Driver)
}
if n.EnableIPv6 != false {
return fmt.Errorf("Network EnableIPv6 is wrong: %v", n.EnableIPv6)
}
if n.IPAM.Driver == "" ||
n.IPAM.Options != nil ||
len(n.IPAM.Config) != 1 ||
n.IPAM.Config[0].Gateway != "" ||
n.IPAM.Config[0].IPRange != "" ||
n.IPAM.Config[0].AuxAddress != nil ||
n.IPAM.Config[0].Subnet != "10.0.1.0/24" ||
n.IPAM.Driver != "default" {
return fmt.Errorf("Network IPAM is wrong: %v", n.IPAM)
}
if n.Internal != true {
return fmt.Errorf("Network Internal is wrong: %v", n.Internal)
}
if n.Attachable != false {
return fmt.Errorf("Network Attachable is wrong: %v", n.Attachable)
}
if n.Ingress != false {
return fmt.Errorf("Network Ingress is wrong: %v", n.Ingress)
}
if n.ConfigFrom.Network != "" {
return fmt.Errorf("Network ConfigFrom is wrong: %v", n.ConfigFrom)
}
if n.ConfigOnly != false {
return fmt.Errorf("Network ConfigOnly is wrong: %v", n.ConfigOnly)
}
if n.Containers == nil || len(n.Containers) != 0 {
return fmt.Errorf("Network Containers is wrong: %v", n.Containers)
}
if n.Options == nil || len(n.Options) != 0 {
return fmt.Errorf("Network Options is wrong: %v", n.Options)
}
if n.Labels == nil ||
len(n.Labels) != 2 ||
!mapEquals("com.docker.compose.network", "foo", n.Labels) ||
!mapEquals("com.docker.compose.project", "test", n.Labels) {
return fmt.Errorf("Network Labels is wrong: %v", n.Labels)
}
return nil
}
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkConfigFull"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testCheckNetworkInspect,
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
// TODO mavogel: add full network config test in #74 (import resources)
func testAccNetwork(n string, network *types.NetworkResource) resource.TestCheckFunc {
return func(s *terraform.State) error {
ctx := context.Background()
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No ID is set")
}
client := testAccProvider.Meta().(*ProviderConfig).DockerClient
networks, err := client.NetworkList(ctx, types.NetworkListOptions{})
if err != nil {
return err
}
for _, n := range networks {
if n.ID == rs.Primary.ID {
inspected, err := client.NetworkInspect(ctx, n.ID, types.NetworkInspectOptions{})
if err != nil {
return fmt.Errorf("Network could not be obtained: %s", err)
}
*network = inspected
return nil
}
}
return fmt.Errorf("Network not found: %s", rs.Primary.ID)
}
}
func TestAccDockerNetwork_internal(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkInternalConfig"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testAccNetworkInternal(&n, true),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccNetworkInternal(network *types.NetworkResource, internal bool) resource.TestCheckFunc {
return func(s *terraform.State) error {
if network.Internal != internal {
return fmt.Errorf("Bad value for attribute 'internal': %t", network.Internal)
}
return nil
}
}
func TestAccDockerNetwork_attachable(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkAttachableConfig"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testAccNetworkAttachable(&n, true),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccNetworkAttachable(network *types.NetworkResource, attachable bool) resource.TestCheckFunc {
return func(s *terraform.State) error {
if network.Attachable != attachable {
return fmt.Errorf("Bad value for attribute 'attachable': %t", network.Attachable)
}
return nil
}
}
func TestAccDockerNetwork_ingress(t *testing.T) {
ctx := context.Background()
var n types.NetworkResource
resource.Test(t, resource.TestCase{
PreCheck: func() {
testAccPreCheck(t)
// as we join the swarm an ingress network is created by default
// As only one can exist, we remove it for the test
removeSwarmIngressNetwork(ctx, t)
},
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIngressConfig"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork("docker_network.foo", &n),
testAccNetworkIngress(&n, true),
),
},
},
CheckDestroy: func(state *terraform.State) error {
// we leave the swarm because in the next testAccPreCheck
// the node will join the swarm again
// and so recreate the default swarm ingress network
return nodeLeaveSwarm(ctx, t)
},
})
}
func removeSwarmIngressNetwork(ctx context.Context, t *testing.T) {
client := testAccProvider.Meta().(*ProviderConfig).DockerClient
networks, err := client.NetworkList(ctx, types.NetworkListOptions{})
if err != nil {
t.Errorf("failed to list swarm networks: %v", err)
}
var ingressNetworkID string
for _, network := range networks {
if network.Ingress {
ingressNetworkID = network.ID
break
}
}
err = client.NetworkRemove(ctx, ingressNetworkID)
if err != nil {
t.Errorf("failed to remove swarm ingress network '%s': %v", ingressNetworkID, err)
}
}
func nodeLeaveSwarm(ctx context.Context, t *testing.T) error {
client := testAccProvider.Meta().(*ProviderConfig).DockerClient
force := true
err := client.SwarmLeave(ctx, force)
if err != nil {
t.Errorf("node failed to leave the swarm: %v", err)
}
return nil
}
func testAccNetworkIngress(network *types.NetworkResource, ingress bool) resource.TestCheckFunc {
return func(s *terraform.State) error {
if network.Ingress != ingress {
return fmt.Errorf("Bad value for attribute 'ingress': %t", network.Ingress)
}
return nil
}
}
func TestAccDockerNetwork_ipv4(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIPv4Config"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testAccNetworkIPv4(&n, true),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccNetworkIPv4(network *types.NetworkResource, internal bool) resource.TestCheckFunc {
return func(s *terraform.State) error {
if len(network.IPAM.Config) != 1 {
return fmt.Errorf("Bad value for IPAM configuration count: %d", len(network.IPAM.Config))
}
if network.IPAM.Config[0].Subnet != "10.0.1.0/24" {
return fmt.Errorf("Bad value for attribute 'subnet': %v", network.IPAM.Config[0].Subnet)
}
return nil
}
}
func TestAccDockerNetwork_ipv6(t *testing.T) {
t.Skip("TODO mavogel: need to fix ipv6 network state")
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkIPv6Config"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testAccNetworkIPv6(&n, true),
),
},
// TODO mavogel: ipam config goes from 2->1
// probably suppress diff -> #74 (import resources)
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccNetworkIPv6(network *types.NetworkResource, internal bool) resource.TestCheckFunc { //nolint:unused
return func(s *terraform.State) error {
if !network.EnableIPv6 {
return fmt.Errorf("Bad value for attribute 'ipv6': %t", network.EnableIPv6)
}
if len(network.IPAM.Config) != 2 {
return fmt.Errorf("Bad value for IPAM configuration count: %d", len(network.IPAM.Config))
}
if network.IPAM.Config[1].Subnet != "fd00::1/64" {
return fmt.Errorf("Bad value for attribute 'subnet': %v", network.IPAM.Config[1].Subnet)
}
return nil
}
}
func TestAccDockerNetwork_labels(t *testing.T) {
var n types.NetworkResource
resourceName := "docker_network.foo"
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
ProviderFactories: providerFactories,
Steps: []resource.TestStep{
{
Config: loadTestConfiguration(t, RESOURCE, "docker_network", "testAccDockerNetworkLabelsConfig"),
Check: resource.ComposeTestCheckFunc(
testAccNetwork(resourceName, &n),
testCheckLabelMap(resourceName, "labels",
map[string]string{
"com.docker.compose.network": "foo",
"com.docker.compose.project": "test",
},
),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}