* add model serving * add right provider config * rename model_serving to modelserving * add model serving custom endpoint everywhere * rename file * add default region, docs for model serving * add right order of wait handler * rotate after to token * fixes * add initial doc files * address code comments * refactor region description * remove warning for not found resources * add service enablement * address code comments * address code comments * fix datasource * fix acc test * review changes * review changes * review changes * review changes * review changes * review changes * review changes * review changes * review changes * embed markdown description * go tidy --------- Co-authored-by: Mauritz Uphoff <mauritz.uphoff@me.com> Co-authored-by: Mauritz Uphoff <39736813+h3adex@users.noreply.github.com>
158 lines
5.4 KiB
Go
158 lines
5.4 KiB
Go
package modelserving_test
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/terraform-plugin-testing/helper/resource"
|
|
"github.com/hashicorp/terraform-plugin-testing/terraform"
|
|
"github.com/stackitcloud/stackit-sdk-go/core/config"
|
|
"github.com/stackitcloud/stackit-sdk-go/core/utils"
|
|
"github.com/stackitcloud/stackit-sdk-go/services/modelserving"
|
|
"github.com/stackitcloud/stackit-sdk-go/services/modelserving/wait"
|
|
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/core"
|
|
"github.com/stackitcloud/terraform-provider-stackit/stackit/internal/testutil"
|
|
)
|
|
|
|
// Token resource data
|
|
var tokenResource = map[string]string{
|
|
"project_id": testutil.ProjectId,
|
|
"name": "token01",
|
|
"description": "my description",
|
|
"description_updated": "my description updated",
|
|
"region": testutil.Region,
|
|
"ttl_duration": "1h",
|
|
}
|
|
|
|
func inputTokenConfig(name, description string) string {
|
|
return fmt.Sprintf(`
|
|
%s
|
|
|
|
resource "stackit_modelserving_token" "token" {
|
|
project_id = "%s"
|
|
region = "%s"
|
|
name = "%s"
|
|
description = "%s"
|
|
ttl_duration = "%s"
|
|
}
|
|
`,
|
|
testutil.ModelServingProviderConfig(),
|
|
tokenResource["project_id"],
|
|
tokenResource["region"],
|
|
name,
|
|
description,
|
|
tokenResource["ttl_duration"],
|
|
)
|
|
}
|
|
|
|
func TestAccModelServingTokenResource(t *testing.T) {
|
|
resource.Test(t, resource.TestCase{
|
|
ProtoV6ProviderFactories: testutil.TestAccProtoV6ProviderFactories,
|
|
CheckDestroy: testAccCheckModelServingTokenDestroy,
|
|
Steps: []resource.TestStep{
|
|
// Creation
|
|
{
|
|
Config: inputTokenConfig(
|
|
tokenResource["name"],
|
|
tokenResource["description"],
|
|
),
|
|
Check: resource.ComposeAggregateTestCheckFunc(
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "project_id", tokenResource["project_id"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "region", tokenResource["region"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "name", tokenResource["name"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "description", tokenResource["description"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "ttl_duration", tokenResource["ttl_duration"]),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "token_id"),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "state"),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "valid_until"),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "token"),
|
|
),
|
|
},
|
|
// Update
|
|
{
|
|
Config: inputTokenConfig(
|
|
tokenResource["name"],
|
|
tokenResource["description_updated"],
|
|
),
|
|
Check: resource.ComposeAggregateTestCheckFunc(
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "project_id", tokenResource["project_id"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "region", tokenResource["region"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "name", tokenResource["name"]),
|
|
resource.TestCheckResourceAttr("stackit_modelserving_token.token", "description", tokenResource["description_updated"]),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "token_id"),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "state"),
|
|
resource.TestCheckResourceAttrSet("stackit_modelserving_token.token", "valid_until"),
|
|
),
|
|
},
|
|
// Deletion is done by the framework implicitly
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccCheckModelServingTokenDestroy(s *terraform.State) error {
|
|
ctx := context.Background()
|
|
var client *modelserving.APIClient
|
|
var err error
|
|
|
|
if testutil.ModelServingCustomEndpoint == "" {
|
|
client, err = modelserving.NewAPIClient()
|
|
} else {
|
|
client, err = modelserving.NewAPIClient(
|
|
config.WithEndpoint(testutil.ModelServingCustomEndpoint),
|
|
)
|
|
}
|
|
|
|
if err != nil {
|
|
return fmt.Errorf("creating client: %w", err)
|
|
}
|
|
|
|
tokensToDestroy := []string{}
|
|
for _, rs := range s.RootModule().Resources {
|
|
if rs.Type != "stackit_modelserving_token" {
|
|
continue
|
|
}
|
|
|
|
// Token terraform ID: "[project_id],[region],[token_id]"
|
|
idParts := strings.Split(rs.Primary.ID, core.Separator)
|
|
if len(idParts) != 3 {
|
|
return fmt.Errorf("invalid ID: %s", rs.Primary.ID)
|
|
}
|
|
if idParts[2] != "" {
|
|
tokensToDestroy = append(tokensToDestroy, idParts[2])
|
|
}
|
|
}
|
|
|
|
if len(tokensToDestroy) == 0 {
|
|
return nil
|
|
}
|
|
|
|
tokensResp, err := client.ListTokens(ctx, testutil.Region, testutil.ProjectId).Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("getting tokensResp: %w", err)
|
|
}
|
|
|
|
if tokensResp.Tokens == nil || (tokensResp.Tokens != nil && len(*tokensResp.Tokens) == 0) {
|
|
fmt.Print("No tokens found for project \n")
|
|
return nil
|
|
}
|
|
|
|
items := *tokensResp.Tokens
|
|
for i := range items {
|
|
if items[i].Name == nil {
|
|
continue
|
|
}
|
|
if utils.Contains(tokensToDestroy, *items[i].Name) {
|
|
_, err := client.DeleteToken(ctx, testutil.Region, testutil.ProjectId, *items[i].Id).Execute()
|
|
if err != nil {
|
|
return fmt.Errorf("destroying token %s during CheckDestroy: %w", *items[i].Name, err)
|
|
}
|
|
_, err = wait.DeleteModelServingWaitHandler(ctx, client, testutil.Region, testutil.ProjectId, *items[i].Id).WaitWithContext(ctx)
|
|
if err != nil {
|
|
return fmt.Errorf("destroying token %s during CheckDestroy: waiting for deletion %w", *items[i].Name, err)
|
|
}
|
|
}
|
|
}
|
|
return nil
|
|
}
|