terraform-provider-greenhost/digitalocean/resource_digitalocean_firew...

401 lines
11 KiB
Go
Raw Normal View History

resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
package digitalocean
import (
"context"
"fmt"
2018-11-28 23:22:18 +00:00
"log"
"strings"
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
"testing"
"github.com/digitalocean/godo"
Upgrade to terraform-plugin-sdk (#321) * Upgrade to terraform-plugin-sdk After following the [guide](https://www.terraform.io/docs/extend/plugin-sdk.html#using-tf-sdk-migrator) Check ``` ▶ GO111MODULE=on tf-sdk-migrator check Checking Go runtime version ... Go version 1.12.10: OK. Checking whether provider uses Go modules... Go modules in use: OK. Checking version of github.com/hashicorp/terraform-plugin-sdk to determine if provider was already migrated... Checking version of github.com/hashicorp/terraform used in provider... Terraform version 0.12.8: OK. Checking whether provider uses deprecated SDK packages or identifiers... No imports of deprecated SDK packages or identifiers: OK. All constraints satisfied. Provider can be migrated to the new SDK. ``` Migrate ``` ▶ GO111MODULE=on tf-sdk-migrator migrate Checking Go runtime version ... Go version 1.12.10: OK. Checking whether provider uses Go modules... Go modules in use: OK. Checking version of github.com/hashicorp/terraform-plugin-sdk to determine if provider was already migrated... Checking version of github.com/hashicorp/terraform used in provider... Terraform version 0.12.8: OK. Checking whether provider uses deprecated SDK packages or identifiers... No imports of deprecated SDK packages or identifiers: OK. All constraints satisfied. Provider can be migrated to the new SDK. Rewriting provider go.mod file... Rewriting SDK package imports... Running `go mod tidy`... Success! Provider is migrated to github.com/hashicorp/terraform-plugin-sdk v1.1.0. It looks like this provider vendors dependencies. Don't forget to run `go mod vendor`. Make sure to review all changes and run all tests. ``` * Fix build under go 1.13.x.
2019-10-22 21:44:03 +00:00
"github.com/hashicorp/terraform-plugin-sdk/helper/acctest"
"github.com/hashicorp/terraform-plugin-sdk/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/terraform"
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
)
2018-11-28 23:22:18 +00:00
func init() {
resource.AddTestSweepers("digitalocean_firewall", &resource.Sweeper{
Name: "digitalocean_firewall",
F: testSweepFirewall,
})
}
func testSweepFirewall(region string) error {
meta, err := sharedConfigForRegion(region)
if err != nil {
return err
}
client := meta.(*CombinedConfig).godoClient()
2018-11-28 23:22:18 +00:00
opt := &godo.ListOptions{PerPage: 200}
fws, _, err := client.Firewalls.List(context.Background(), opt)
if err != nil {
return err
}
for _, f := range fws {
if strings.HasPrefix(f.Name, "foobar-") {
log.Printf("Destroying firewall %s", f.Name)
if _, err := client.Firewalls.Delete(context.Background(), f.ID); err != nil {
return err
}
}
}
return nil
}
func TestAccDigitalOceanFirewall_AllowOnlyInbound(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_OnlyInbound(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "inbound_rule.#", "1"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_AllowMultipleInbound(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_OnlyMultipleInbound(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "inbound_rule.#", "2"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_AllowOnlyOutbound(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_OnlyOutbound(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "outbound_rule.#", "1"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_AllowMultipleOutbound(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_OnlyMultipleOutbound(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "outbound_rule.#", "2"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_MultipleInboundAndOutbound(t *testing.T) {
rName := acctest.RandString(10)
tagName := "tag-" + rName
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_MultipleInboundAndOutbound(tagName, rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "inbound_rule.#", "2"),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "outbound_rule.#", "2"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_fullPortRange(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_fullPortRange(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "inbound_rule.#", "1"),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "outbound_rule.#", "1"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_icmp(t *testing.T) {
rName := acctest.RandString(10)
var firewall godo.Firewall
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_icmp(rName),
Check: resource.ComposeAggregateTestCheckFunc(
testAccCheckDigitalOceanFirewallExists("digitalocean_firewall.foobar", &firewall),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "inbound_rule.#", "1"),
resource.TestCheckResourceAttr("digitalocean_firewall.foobar", "outbound_rule.#", "1"),
),
},
},
})
}
func TestAccDigitalOceanFirewall_ImportMultipleRules(t *testing.T) {
resourceName := "digitalocean_firewall.foobar"
rName := acctest.RandString(10)
tagName := "tag-" + rName
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckDigitalOceanFirewallDestroy,
Steps: []resource.TestStep{
{
Config: testAccDigitalOceanFirewallConfig_MultipleInboundAndOutbound(tagName, rName),
},
{
ResourceName: resourceName,
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccDigitalOceanFirewallConfig_OnlyInbound(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
inbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "22"
source_addresses = ["0.0.0.0/0", "::/0"]
}
}
`, rName)
}
func testAccDigitalOceanFirewallConfig_OnlyOutbound(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
outbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "22"
destination_addresses = ["0.0.0.0/0", "::/0"]
}
}
`, rName)
}
func testAccDigitalOceanFirewallConfig_OnlyMultipleInbound(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
inbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "22"
source_addresses = ["0.0.0.0/0", "::/0"]
}
inbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "80"
source_addresses = ["1.2.3.0/24", "2002::/16"]
}
}
`, rName)
}
func testAccDigitalOceanFirewallConfig_OnlyMultipleOutbound(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
outbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "22"
destination_addresses = ["192.168.1.0/24", "2002:1001::/48"]
}
outbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "udp"
port_range = "53"
destination_addresses = ["1.2.3.0/24", "2002::/16"]
}
}
`, rName)
}
func testAccDigitalOceanFirewallConfig_MultipleInboundAndOutbound(tagName string, rName string) string {
return fmt.Sprintf(`
resource "digitalocean_tag" "foobar" {
name = "%s"
}
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
inbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "22"
source_addresses = ["0.0.0.0/0", "::/0"]
}
inbound_rule {
protocol = "tcp"
port_range = "443"
source_addresses = ["192.168.1.0/24", "2002:1001:1:2::/64"]
source_tags = ["%s"]
}
outbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "tcp"
port_range = "443"
destination_addresses = ["192.168.1.0/24", "2002:1001:1:2::/64"]
destination_tags = ["%s"]
}
outbound_rule {
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
protocol = "udp"
port_range = "53"
destination_addresses = ["0.0.0.0/0", "::/0"]
}
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
}
`, tagName, rName, tagName, tagName)
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
}
func testAccDigitalOceanFirewallConfig_fullPortRange(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
inbound_rule {
protocol = "tcp"
port_range = "all"
source_addresses = ["192.168.1.1/32"]
}
outbound_rule {
protocol = "tcp"
port_range = "all"
destination_addresses = ["192.168.1.2/32"]
}
}
`, rName)
}
func testAccDigitalOceanFirewallConfig_icmp(rName string) string {
return fmt.Sprintf(`
resource "digitalocean_firewall" "foobar" {
2018-11-28 23:22:18 +00:00
name = "foobar-%s"
inbound_rule {
protocol = "icmp"
source_addresses = ["192.168.1.1/32"]
}
outbound_rule {
protocol = "icmp"
port_range = "1-65535"
destination_addresses = ["192.168.1.2/32"]
}
}
`, rName)
}
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
func testAccCheckDigitalOceanFirewallDestroy(s *terraform.State) error {
client := testAccProvider.Meta().(*CombinedConfig).godoClient()
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
for _, rs := range s.RootModule().Resources {
if rs.Type != "digitalocean_firewall" {
continue
}
// Try to find the firewall
_, _, err := client.Firewalls.Get(context.Background(), rs.Primary.ID)
if err == nil {
return fmt.Errorf("Firewall still exists")
}
}
return nil
}
func testAccCheckDigitalOceanFirewallExists(n string, firewall *godo.Firewall) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No Record ID is set")
}
client := testAccProvider.Meta().(*CombinedConfig).godoClient()
resource_digitalocean_firewall.go: Add DO Cloud Firewalls (#15124) https://www.digitalocean.com/products/cloud-firewalls/ https://blog.digitalocean.com/cloud-firewalls-secure-droplets-by-default/ https://github.com/digitalocean/godo/commit/4fa9e9d999007b447089056a1c581b5594f0f851 air$ go test -v -run TestAccDigitalOceanFirewall === RUN TestAccDigitalOceanFirewall_importBasic === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_importBasic (19.14s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22) (3.89s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22) (4.61s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.48s) --- PASS: TestAccDigitalOceanFirewall_importBasic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (4.05s) --- PASS: TestAccDigitalOceanFirewall_importBasic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (3.11s) === RUN TestAccDigitalOceanFirewall_Basic === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) === RUN TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) === RUN TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) --- PASS: TestAccDigitalOceanFirewall_Basic (18.77s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22) (3.56s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22) (3.73s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_inbound_SSH(TCP/22)_and_HTTP(TCP/80) (3.21s) --- PASS: TestAccDigitalOceanFirewall_Basic/only_allow_outbound_SSH(TCP/22)_and_DNS(UDP/53) (3.84s) --- PASS: TestAccDigitalOceanFirewall_Basic/allow_inbound_and_outbound_HTTPS(TCP/443),_inbound_SSH(TCP/22),_and_outbound_DNS(UDP/53) (4.43s) PASS ok github.com/terraform-providers/terraform-provider-digitalocean/digitalocean 37.920s air$
2017-06-06 15:29:54 +00:00
foundFirewall, _, err := client.Firewalls.Get(context.Background(), rs.Primary.ID)
if err != nil {
return err
}
if foundFirewall.ID != rs.Primary.ID {
return fmt.Errorf("Record not found")
}
*firewall = *foundFirewall
return nil
}
}