-
Notifications
You must be signed in to change notification settings - Fork 4.7k
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
New acceptance test and extensions of existing
- Loading branch information
Aris van Ommeren
committed
Jul 23, 2020
1 parent
e6f6936
commit 1da2b30
Showing
1 changed file
with
155 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -181,6 +181,69 @@ func testAccAzureRMKubernetesCluster_roleBasedAccessControlAAD(t *testing.T) { | |
data.ImportStep( | ||
"role_based_access_control.0.azure_active_directory.0.server_app_secret", | ||
), | ||
{ | ||
Config: testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedConfig(data, ""), | ||
Check: resource.ComposeTestCheckFunc( | ||
testCheckAzureRMKubernetesClusterExists(data.ResourceName), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.#", "1"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.enabled", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.tenant_id"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.managed", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "kube_admin_config.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "kube_admin_config_raw"), | ||
), | ||
}, | ||
}, | ||
}) | ||
} | ||
|
||
func TestAccAzureRMKubernetesCluster_roleBasedAccessControlAADUpdateToManaged(t *testing.T) { | ||
checkIfShouldRunTestsIndividually(t) | ||
testAccAzureRMKubernetesCluster_roleBasedAccessControlAADUpdateToManaged(t) | ||
} | ||
|
||
func testAccAzureRMKubernetesCluster_roleBasedAccessControlAADUpdateToManaged(t *testing.T) { | ||
data := acceptance.BuildTestData(t, "azurerm_kubernetes_cluster", "test") | ||
clientData := data.Client() | ||
auth := clientData.Default | ||
|
||
resource.ParallelTest(t, resource.TestCase{ | ||
PreCheck: func() { acceptance.PreCheck(t) }, | ||
Providers: acceptance.SupportedProviders, | ||
CheckDestroy: testCheckAzureRMKubernetesClusterDestroy, | ||
Steps: []resource.TestStep{ | ||
{ | ||
Config: testAccAzureRMKubernetesCluster_roleBasedAccessControlAADConfig(data, auth.ClientID, auth.ClientSecret, ""), | ||
Check: resource.ComposeTestCheckFunc( | ||
testCheckAzureRMKubernetesClusterExists(data.ResourceName), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.#", "1"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.enabled", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.client_app_id"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.server_app_id"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.server_app_secret"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.tenant_id"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "kube_admin_config.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "kube_admin_config_raw"), | ||
), | ||
}, | ||
data.ImportStep( | ||
"role_based_access_control.0.azure_active_directory.0.server_app_secret", | ||
), | ||
{ | ||
Config: testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedConfig(data, ""), | ||
Check: resource.ComposeTestCheckFunc( | ||
testCheckAzureRMKubernetesClusterExists(data.ResourceName), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.#", "1"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.enabled", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.tenant_id"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.managed", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "kube_admin_config.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "kube_admin_config_raw"), | ||
), | ||
}, | ||
}, | ||
}) | ||
} | ||
|
@@ -230,6 +293,51 @@ func testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManaged(t *testing | |
}) | ||
} | ||
|
||
func TestAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedChange(t *testing.T) { | ||
checkIfShouldRunTestsIndividually(t) | ||
testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManaged(t) | ||
} | ||
|
||
func testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedChange(t *testing.T) { | ||
data := acceptance.BuildTestData(t, "azurerm_kubernetes_cluster", "test") | ||
clientData := data.Client() | ||
|
||
resource.ParallelTest(t, resource.TestCase{ | ||
PreCheck: func() { acceptance.PreCheck(t) }, | ||
Providers: acceptance.SupportedProviders, | ||
CheckDestroy: testCheckAzureRMKubernetesClusterDestroy, | ||
Steps: []resource.TestStep{ | ||
{ | ||
Config: testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedConfig(data, ""), | ||
Check: resource.ComposeTestCheckFunc( | ||
testCheckAzureRMKubernetesClusterExists(data.ResourceName), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.#", "1"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.enabled", "true"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "role_based_access_control.0.azure_active_directory.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.tenant_id"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "role_based_access_control.0.azure_active_directory.0.managed"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "kube_admin_config.#", "1"), | ||
resource.TestCheckResourceAttrSet(data.ResourceName, "kube_admin_config_raw"), | ||
resource.TestCheckResourceAttr(data.ResourceName, "default_node_pool.0.node_count", "1"), | ||
), | ||
}, | ||
data.ImportStep( | ||
"role_based_access_control.0.azure_active_directory.0.server_app_secret", | ||
), | ||
{ | ||
Config: testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedConfigScale(data, clientData.TenantID), | ||
Check: resource.ComposeTestCheckFunc( | ||
testCheckAzureRMKubernetesClusterExists(data.ResourceName), | ||
resource.TestCheckResourceAttr(data.ResourceName, "default_node_pool.0.node_count", "2"), | ||
), | ||
}, | ||
data.ImportStep( | ||
"role_based_access_control.0.azure_active_directory.0.server_app_secret", | ||
), | ||
}, | ||
}) | ||
} | ||
|
||
func TestAccAzureRMKubernetesCluster_servicePrincipal(t *testing.T) { | ||
checkIfShouldRunTestsIndividually(t) | ||
testAccAzureRMKubernetesCluster_servicePrincipal(t) | ||
|
@@ -580,6 +688,53 @@ resource "azurerm_kubernetes_cluster" "test" { | |
`, tenantId, data.RandomInteger, data.Locations.Primary, data.RandomInteger, data.RandomInteger, data.RandomInteger) | ||
} | ||
|
||
func testAccAzureRMKubernetesCluster_roleBasedAccessControlAADManagedConfigScale(data acceptance.TestData, tenantId string) string { | ||
return fmt.Sprintf(` | ||
variable "tenant_id" { | ||
default = "%s" | ||
} | ||
resource "azurerm_resource_group" "test" { | ||
name = "acctestRG-aks-%d" | ||
location = "%s" | ||
} | ||
resource "azurerm_kubernetes_cluster" "test" { | ||
name = "acctestaks%d" | ||
location = "${azurerm_resource_group.test.location}" | ||
resource_group_name = "${azurerm_resource_group.test.name}" | ||
dns_prefix = "acctestaks%d" | ||
linux_profile { | ||
admin_username = "acctestuser%d" | ||
ssh_key { | ||
key_data = "ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCqaZoyiz1qbdOQ8xEf6uEu1cCwYowo5FHtsBhqLoDnnp7KUTEBN+L2NxRIfQ781rxV6Iq5jSav6b2Q8z5KiseOlvKA/RF2wqU0UPYqQviQhLmW6THTpmrv/YkUCuzxDpsH7DUDhZcwySLKVVe0Qm3+5N2Ta6UYH3lsDf9R9wTP2K/+vAnflKebuypNlmocIvakFWoZda18FOmsOoIVXQ8HWFNCuw9ZCunMSN62QGamCe3dL5cXlkgHYv7ekJE15IA9aOJcM7e90oeTqo+7HTcWfdu0qQqPWY5ujyMw/llas8tsXY85LFqRnr3gJ02bAscjc477+X+j/gkpFoN1QEmt [email protected]" | ||
} | ||
} | ||
default_node_pool { | ||
name = "default" | ||
node_count = 2 | ||
vm_size = "Standard_DS2_v2" | ||
} | ||
identity { | ||
type = "SystemAssigned" | ||
} | ||
role_based_access_control { | ||
enabled = true | ||
azure_active_directory { | ||
tenant_id = var.tenant_id | ||
managed = true | ||
} | ||
} | ||
} | ||
`, tenantId, data.RandomInteger, data.Locations.Primary, data.RandomInteger, data.RandomInteger, data.RandomInteger) | ||
} | ||
|
||
func testAccAzureRMKubernetesCluster_servicePrincipalConfig(data acceptance.TestData, clientId, clientSecret string) string { | ||
return fmt.Sprintf(` | ||
provider "azurerm" { | ||
|