Skip to content

Commit

Permalink
Staging current changes
Browse files Browse the repository at this point in the history
  • Loading branch information
tomhunte committed Apr 1, 2024
1 parent 8f7d685 commit cc325f7
Show file tree
Hide file tree
Showing 2 changed files with 61 additions and 203 deletions.
Original file line number Diff line number Diff line change
Expand Up @@ -202,12 +202,15 @@ func resourceRecommendationPreferencesCreate(ctx context.Context, d *schema.Reso
var diags diag.Diagnostics
conn := meta.(*conns.AWSClient).ComputeOptimizerClient(ctx)

// resourceType := d.Get("resource_type").(string)
resourceType := "Ec2Instance"
in := &computeoptimizer.PutRecommendationPreferencesInput{
ResourceType: types.ResourceType(*aws.String(d.Get("resource_type").(string))),
// ResourceType: types.ResourceType(*aws.String(d.Get("resource_type").(string))),
ResourceType: types.ResourceType(resourceType),
}

recommendationPreferences := []string{}
recommendationPreferences = append(recommendationPreferences, d.Get("resource_type").(string))
recommendationPreferences = append(recommendationPreferences, resourceType)

if v, ok := d.GetOk("enhanced_infrastructure_metrics"); ok {
in.EnhancedInfrastructureMetrics = types.EnhancedInfrastructureMetrics(*aws.String(v.(string)))
Expand Down
257 changes: 56 additions & 201 deletions internal/service/computeoptimizer/recommendation_preferences_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2,187 +2,63 @@
// SPDX-License-Identifier: MPL-2.0

package computeoptimizer_test
// **PLEASE DELETE THIS AND ALL TIP COMMENTS BEFORE SUBMITTING A PR FOR REVIEW!**
//
// TIP: ==== INTRODUCTION ====
// Thank you for trying the skaff tool!
//
// You have opted to include these helpful comments. They all include "TIP:"
// to help you find and remove them when you're done with them.
//
// While some aspects of this file are customized to your input, the
// scaffold tool does *not* look at the AWS API and ensure it has correct
// function, structure, and variable names. It makes guesses based on
// commonalities. You will need to make significant adjustments.
//
// In other words, as generated, this is a rough outline of the work you will
// need to do. If something doesn't make sense for your situation, get rid of
// it.

import (
// TIP: ==== IMPORTS ====
// This is a common set of imports but not customized to your code since
// your code hasn't been written yet. Make sure you, your IDE, or
// goimports -w <file> fixes these imports.
//
// The provider linter wants your imports to be in two groups: first,
// standard library (i.e., "fmt" or "strings"), second, everything else.
//
// Also, AWS Go SDK v2 may handle nested structures differently than v1,
// using the services/computeoptimizer/types package. If so, you'll
// need to import types and reference the nested types, e.g., as
// types.<Type Name>.
// "context"
// "errors"
"context"
"errors"
"fmt"
"testing"

"github.com/YakDriver/regexache"
"github.com/aws/aws-sdk-go-v2/aws"
"github.com/aws/aws-sdk-go-v2/service/computeoptimizer"
"github.com/aws/aws-sdk-go-v2/service/computeoptimizer/types"
sdkacctest "github.com/hashicorp/terraform-plugin-testing/helper/acctest"
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
"github.com/hashicorp/terraform-plugin-testing/terraform"

// "github.com/hashicorp/terraform-plugin-testing/terraform"
"github.com/hashicorp/terraform-provider-aws/internal/acctest"
"github.com/hashicorp/terraform-provider-aws/internal/conns"
"github.com/hashicorp/terraform-provider-aws/internal/create"
"github.com/hashicorp/terraform-provider-aws/internal/errs"
"github.com/hashicorp/terraform-provider-aws/names"

// TIP: You will often need to import the package that this test file lives
// in. Since it is in the "test" context, it must import the package to use
// any normal context constants, variables, or functions.
// "github.com/hashicorp/terraform-provider-aws/internal/create"

// "github.com/hashicorp/terraform-provider-aws/internal/conns"
// "github.com/hashicorp/terraform-provider-aws/internal/create"
"github.com/hashicorp/terraform-provider-aws/internal/errs"
tfcomputeoptimizer "github.com/hashicorp/terraform-provider-aws/internal/service/computeoptimizer"
"github.com/hashicorp/terraform-provider-aws/names"
)

// TIP: File Structure. The basic outline for all test files should be as
// follows. Improve this resource's maintainability by following this
// outline.
//
// 1. Package declaration (add "_test" since this is a test file)
// 2. Imports
// 3. Unit tests
// 4. Basic test
// 5. Disappears test
// 6. All the other tests
// 7. Helper functions (exists, destroy, check, etc.)
// 8. Functions that return Terraform configurations

// TIP: ==== UNIT TESTS ====
// This is an example of a unit test. Its name is not prefixed with
// "TestAcc" like an acceptance test.
//
// Unlike acceptance tests, unit tests do not access AWS and are focused on a
// function (or method). Because of this, they are quick and cheap to run.
//
// In designing a resource's implementation, isolate complex bits from AWS bits
// so that they can be tested through a unit test. We encourage more unit tests
// in the provider.
//
// Cut and dry functions using well-used patterns, like typical flatteners and
// expanders, don't need unit testing. However, if they are complex or
// intricate, they should be unit tested.
func TestRecommendationPreferencesExampleUnitTest(t *testing.T) {
t.Parallel()

testCases := []struct {
TestName string
Input string
Expected string
Error bool
}{
{
TestName: "empty",
Input: "",
Expected: "",
Error: true,
},
{
TestName: "descriptive name",
Input: "some input",
Expected: "some output",
Error: false,
},
{
TestName: "another descriptive name",
Input: "more input",
Expected: "more output",
Error: false,
},
}

for _, testCase := range testCases {
testCase := testCase
t.Run(testCase.TestName, func(t *testing.T) {
t.Parallel()
got, err := tfcomputeoptimizer.FunctionFromResource(testCase.Input)

if err != nil && !testCase.Error {
t.Errorf("got error (%s), expected no error", err)
}

if err == nil && testCase.Error {
t.Errorf("got (%s) and no error, expected error", got)
}

if got != testCase.Expected {
t.Errorf("got %s, expected %s", got, testCase.Expected)
}
})
}
}

// TIP: ==== ACCEPTANCE TESTS ====
// This is an example of a basic acceptance test. This should test as much of
// standard functionality of the resource as possible, and test importing, if
// applicable. We prefix its name with "TestAcc", the service, and the
// resource name.
//
// Acceptance test access AWS and cost money to run.
func TestAccComputeOptimizerRecommendationPreferences_basic(t *testing.T) {
ctx := acctest.Context(t)
// TIP: This is a long-running test guard for tests that run longer than
// 300s (5 min) generally.

if testing.Short() {
t.Skip("skipping long-running test in short mode")
}

var recommendationpreferences computeoptimizer.DescribeRecommendationPreferencesResponse
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
var recommendationpreferences computeoptimizer.GetRecommendationPreferencesOutput
resourceType := "Ec2Instance"
resourceName := "aws_computeoptimizer_recommendation_preferences.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() {
acctest.PreCheck(ctx, t)
acctest.PreCheckPartitionHasService(t, names.ComputeOptimizerEndpointID)
testAccPreCheck(ctx, t)
},
ErrorCheck: acctest.ErrorCheck(t, names.ComputeOptimizerEndpointID),
PreCheck: func() { acctest.PreCheck(ctx, t); testAccPreCheck(ctx, t, resourceType) },
ErrorCheck: acctest.ErrorCheck(t, names.ComputeOptimizerServiceID),
ProtoV5ProviderFactories: acctest.ProtoV5ProviderFactories,
CheckDestroy: testAccCheckRecommendationPreferencesDestroy(ctx),
CheckDestroy: testAccCheckRecommendationPreferencesDestroy(ctx, resourceType),
Steps: []resource.TestStep{
{
Config: testAccRecommendationPreferencesConfig_basic(rName),
Config: testAccRecommendationPreferencesConfig_basic(resourceType),
Check: resource.ComposeTestCheckFunc(
testAccCheckRecommendationPreferencesExists(ctx, resourceName, &recommendationpreferences),
resource.TestCheckResourceAttr(resourceName, "auto_minor_version_upgrade", "false"),
resource.TestCheckResourceAttrSet(resourceName, "maintenance_window_start_time.0.day_of_week"),
resource.TestCheckTypeSetElemNestedAttrs(resourceName, "user.*", map[string]string{
"console_access": "false",
"groups.#": "0",
"username": "Test",
"password": "TestTest1234",
}),
acctest.MatchResourceAttrRegionalARN(resourceName, "arn", "computeoptimizer", regexache.MustCompile(`recommendationpreferences:+.`)),
),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
ImportStateVerifyIgnore: []string{"apply_immediately", "user"},
},
// {
// ResourceName: resourceName,
// ImportState: true,
// ImportStateVerify: true,
// ImportStateVerifyIgnore: []string{"apply_immediately", "user"},
// },
},
})
}
Expand All @@ -193,22 +69,19 @@ func TestAccComputeOptimizerRecommendationPreferences_disappears(t *testing.T) {
t.Skip("skipping long-running test in short mode")
}

var recommendationpreferences computeoptimizer.DescribeRecommendationPreferencesResponse
rName := sdkacctest.RandomWithPrefix(acctest.ResourcePrefix)
var recommendationpreferences computeoptimizer.GetRecommendationPreferencesOutput
resourceType := "Ec2Instance"
resourceName := "aws_computeoptimizer_recommendation_preferences.test"

resource.ParallelTest(t, resource.TestCase{
PreCheck: func() {
acctest.PreCheck(ctx, t)
acctest.PreCheckPartitionHasService(t, names.ComputeOptimizerEndpointID)
testAccPreCheck(t)
},
ErrorCheck: acctest.ErrorCheck(t, names.ComputeOptimizerEndpointID),
PreCheck: func() { acctest.PreCheck(ctx, t); testAccPreCheck(ctx, t, resourceType) },
ErrorCheck: acctest.ErrorCheck(t, names.ComputeOptimizerServiceID),
ProtoV5ProviderFactories: acctest.ProtoV5ProviderFactories,
CheckDestroy: testAccCheckRecommendationPreferencesDestroy(ctx),
CheckDestroy: testAccCheckRecommendationPreferencesDestroy(ctx, resourceType),
Steps: []resource.TestStep{
{
Config: testAccRecommendationPreferencesConfig_basic(rName, testAccRecommendationPreferencesVersionNewer),
// Config: testAccRecommendationPreferencesConfig_basic(rName, testAccRecommendationPreferencesVersionNewer),
Config: testAccRecommendationPreferencesConfig_basic(resourceType),
Check: resource.ComposeTestCheckFunc(
testAccCheckRecommendationPreferencesExists(ctx, resourceName, &recommendationpreferences),
acctest.CheckResourceDisappears(ctx, acctest.Provider, tfcomputeoptimizer.ResourceRecommendationPreferences(), resourceName),
Expand All @@ -219,7 +92,7 @@ func TestAccComputeOptimizerRecommendationPreferences_disappears(t *testing.T) {
})
}

func testAccCheckRecommendationPreferencesDestroy(ctx context.Context) resource.TestCheckFunc {
func testAccCheckRecommendationPreferencesDestroy(ctx context.Context, resourceType string) resource.TestCheckFunc {
return func(s *terraform.State) error {
conn := acctest.Provider.Meta().(*conns.AWSClient).ComputeOptimizerClient(ctx)

Expand All @@ -228,17 +101,15 @@ func testAccCheckRecommendationPreferencesDestroy(ctx context.Context) resource.
continue
}

input := &computeoptimizer.DescribeRecommendationPreferencesInput{
RecommendationPreferencesId: aws.String(rs.Primary.ID),
input := &computeoptimizer.GetRecommendationPreferencesInput{
ResourceType: types.ResourceType(resourceType),
}
_, err := conn.DescribeRecommendationPreferences(ctx, &computeoptimizer.DescribeRecommendationPreferencesInput{
RecommendationPreferencesId: aws.String(rs.Primary.ID),
})
if errs.IsA[*types.ResourceNotFoundException](err){
_, err := conn.GetRecommendationPreferences(ctx, input)
if errs.IsA[*types.ResourceNotFoundException](err) {
return nil
}
if err != nil {
return create.Error(names.ComputeOptimizer, create.ErrActionCheckingDestroyed, tfcomputeoptimizer.ResNameRecommendationPreferences, rs.Primary.ID, err)
return create.Error(names.ComputeOptimizer, create.ErrActionCheckingDestroyed, tfcomputeoptimizer.ResNameRecommendationPreferences, rs.Primary.ID, err)
}

return create.Error(names.ComputeOptimizer, create.ErrActionCheckingDestroyed, tfcomputeoptimizer.ResNameRecommendationPreferences, rs.Primary.ID, errors.New("not destroyed"))
Expand All @@ -248,7 +119,7 @@ func testAccCheckRecommendationPreferencesDestroy(ctx context.Context) resource.
}
}

func testAccCheckRecommendationPreferencesExists(ctx context.Context, name string, recommendationpreferences *computeoptimizer.DescribeRecommendationPreferencesResponse) resource.TestCheckFunc {
func testAccCheckRecommendationPreferencesExists(ctx context.Context, name string, recommendationpreferences *computeoptimizer.GetRecommendationPreferencesOutput) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[name]
if !ok {
Expand All @@ -260,8 +131,8 @@ func testAccCheckRecommendationPreferencesExists(ctx context.Context, name strin
}

conn := acctest.Provider.Meta().(*conns.AWSClient).ComputeOptimizerClient(ctx)
resp, err := conn.DescribeRecommendationPreferences(ctx, &computeoptimizer.DescribeRecommendationPreferencesInput{
RecommendationPreferencesId: aws.String(rs.Primary.ID),
resp, err := conn.GetRecommendationPreferences(ctx, &computeoptimizer.GetRecommendationPreferencesInput{
ResourceType: types.ResourceType(rs.Primary.Attributes["resource_type"]),
})

if err != nil {
Expand All @@ -274,11 +145,14 @@ func testAccCheckRecommendationPreferencesExists(ctx context.Context, name strin
}
}

func testAccPreCheck(ctx context.Context, t *testing.T) {
func testAccPreCheck(ctx context.Context, t *testing.T, resourceType string) {
conn := acctest.Provider.Meta().(*conns.AWSClient).ComputeOptimizerClient(ctx)

input := &computeoptimizer.ListRecommendationPreferencessInput{}
_, err := conn.ListRecommendationPreferencess(ctx, input)
input := &computeoptimizer.GetRecommendationPreferencesInput{
ResourceType: types.ResourceType(resourceType),
}

_, err := conn.GetRecommendationPreferences(ctx, input)

if acctest.PreCheckSkipError(err) {
t.Skipf("skipping acceptance testing: %s", err)
Expand All @@ -288,39 +162,20 @@ func testAccPreCheck(ctx context.Context, t *testing.T) {
}
}

func testAccCheckRecommendationPreferencesNotRecreated(before, after *computeoptimizer.DescribeRecommendationPreferencesResponse) resource.TestCheckFunc {
return func(s *terraform.State) error {
if before, after := aws.ToString(before.RecommendationPreferencesId), aws.ToString(after.RecommendationPreferencesId); before != after {
return create.Error(names.ComputeOptimizer, create.ErrActionCheckingNotRecreated, tfcomputeoptimizer.ResNameRecommendationPreferences, aws.ToString(before.RecommendationPreferencesId), errors.New("recreated"))
}
// func testAccCheckRecommendationPreferencesNotRecreated(before, after *computeoptimizer.DescribeRecommendationPreferencesResponse) resource.TestCheckFunc {
// return func(s *terraform.State) error {
// if before, after := aws.ToString(before.RecommendationPreferencesId), aws.ToString(after.RecommendationPreferencesId); before != after {
// return create.Error(names.ComputeOptimizer, create.ErrActionCheckingNotRecreated, tfcomputeoptimizer.ResNameRecommendationPreferences, aws.ToString(before.RecommendationPreferencesId), errors.New("recreated"))
// }

return nil
}
}
// return nil
// }
// }

func testAccRecommendationPreferencesConfig_basic(rName, version string) string {
func testAccRecommendationPreferencesConfig_basic(resourceType string) string {
return fmt.Sprintf(`
resource "aws_security_group" "test" {
name = %[1]q
}
resource "aws_computeoptimizer_recommendation_preferences" "test" {
recommendation_preferences_name = %[1]q
engine_type = "ActiveComputeOptimizer"
engine_version = %[2]q
host_instance_type = "computeoptimizer.t2.micro"
security_groups = [aws_security_group.test.id]
authentication_strategy = "simple"
storage_type = "efs"
logs {
general = true
}
user {
username = "Test"
password = "TestTest1234"
}
resource_type = %[1]q
}
`, rName, version)
`, resourceType)
}

0 comments on commit cc325f7

Please sign in to comment.