terraform-provider-stackitp.../stackit/internal/services/kms/wrapping-key/resource_test.go
2025-11-18 16:53:58 +01:00

244 lines
6.7 KiB
Go

package kms
import (
"fmt"
"testing"
"github.com/google/uuid"
"github.com/google/go-cmp/cmp"
"github.com/hashicorp/terraform-plugin-framework/types"
"github.com/stackitcloud/stackit-sdk-go/core/utils"
"github.com/stackitcloud/stackit-sdk-go/services/kms"
)
var (
projectId = uuid.NewString()
keyRingId = uuid.NewString()
wrappingKeyId = uuid.NewString()
)
func TestMapFields(t *testing.T) {
type args struct {
state *Model
input *kms.WrappingKey
region string
}
tests := []struct {
description string
args args
expected *Model
isValid bool
}{
{
description: "default values",
args: args{
state: &Model{
KeyRingId: types.StringValue(keyRingId),
ProjectId: types.StringValue(projectId),
WrappingKeyId: types.StringValue(wrappingKeyId),
},
input: &kms.WrappingKey{
Id: utils.Ptr("wid"),
AccessScope: utils.Ptr(kms.ACCESSSCOPE_PUBLIC),
Algorithm: utils.Ptr(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256),
Purpose: utils.Ptr(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY),
Protection: utils.Ptr(kms.PROTECTION_SOFTWARE),
},
region: "eu01",
},
expected: &Model{
Description: types.StringNull(),
DisplayName: types.StringNull(),
KeyRingId: types.StringValue(keyRingId),
Id: types.StringValue(fmt.Sprintf("%s,eu01,%s,%s", projectId, keyRingId, wrappingKeyId)),
ProjectId: types.StringValue(projectId),
Region: types.StringValue("eu01"),
WrappingKeyId: types.StringValue(wrappingKeyId),
AccessScope: types.StringValue(string(kms.ACCESSSCOPE_PUBLIC)),
Algorithm: types.StringValue(string(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256)),
Purpose: types.StringValue(string(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY)),
Protection: types.StringValue(string(kms.PROTECTION_SOFTWARE)),
},
isValid: true,
},
{
description: "values_ok",
args: args{
state: &Model{
KeyRingId: types.StringValue(keyRingId),
ProjectId: types.StringValue(projectId),
WrappingKeyId: types.StringValue(wrappingKeyId),
},
input: &kms.WrappingKey{
Description: utils.Ptr("descr"),
DisplayName: utils.Ptr("name"),
Id: utils.Ptr(wrappingKeyId),
AccessScope: utils.Ptr(kms.ACCESSSCOPE_PUBLIC),
Algorithm: utils.Ptr(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256),
Purpose: utils.Ptr(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY),
Protection: utils.Ptr(kms.PROTECTION_SOFTWARE),
},
region: "eu02",
},
expected: &Model{
Description: types.StringValue("descr"),
DisplayName: types.StringValue("name"),
KeyRingId: types.StringValue(keyRingId),
Id: types.StringValue(fmt.Sprintf("%s,eu02,%s,%s", projectId, keyRingId, wrappingKeyId)),
ProjectId: types.StringValue(projectId),
Region: types.StringValue("eu02"),
WrappingKeyId: types.StringValue(wrappingKeyId),
AccessScope: types.StringValue(string(kms.ACCESSSCOPE_PUBLIC)),
Algorithm: types.StringValue(string(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256)),
Purpose: types.StringValue(string(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY)),
Protection: types.StringValue(string(kms.PROTECTION_SOFTWARE)),
},
isValid: true,
},
{
description: "nil_response_field",
args: args{
state: &Model{},
input: &kms.WrappingKey{
Id: nil,
},
},
expected: &Model{},
isValid: false,
},
{
description: "nil_response",
args: args{
state: &Model{},
input: nil,
},
expected: &Model{},
isValid: false,
},
{
description: "no_resource_id",
args: args{
state: &Model{
Region: types.StringValue("eu01"),
ProjectId: types.StringValue("pid"),
},
input: &kms.WrappingKey{},
},
expected: &Model{},
isValid: false,
},
{
// TODO: test for workaround - remove once STACKITKMS-377 is resolved
description: "empty description string",
args: args{
state: &Model{
KeyRingId: types.StringValue(keyRingId),
ProjectId: types.StringValue(projectId),
WrappingKeyId: types.StringValue(wrappingKeyId),
},
input: &kms.WrappingKey{
Description: utils.Ptr(""),
Id: utils.Ptr(wrappingKeyId),
AccessScope: utils.Ptr(kms.ACCESSSCOPE_PUBLIC),
Algorithm: utils.Ptr(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256),
Purpose: utils.Ptr(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY),
Protection: utils.Ptr(kms.PROTECTION_SOFTWARE),
},
region: "eu02",
},
expected: &Model{
Description: types.StringNull(),
KeyRingId: types.StringValue(keyRingId),
Id: types.StringValue(fmt.Sprintf("%s,eu02,%s,%s", projectId, keyRingId, wrappingKeyId)),
ProjectId: types.StringValue(projectId),
Region: types.StringValue("eu02"),
WrappingKeyId: types.StringValue(wrappingKeyId),
AccessScope: types.StringValue(string(kms.ACCESSSCOPE_PUBLIC)),
Algorithm: types.StringValue(string(kms.WRAPPINGALGORITHM__2048_OAEP_SHA256)),
Purpose: types.StringValue(string(kms.WRAPPINGPURPOSE_ASYMMETRIC_KEY)),
Protection: types.StringValue(string(kms.PROTECTION_SOFTWARE)),
},
isValid: true,
},
}
for _, tt := range tests {
t.Run(tt.description, func(t *testing.T) {
err := mapFields(tt.args.input, tt.args.state, tt.args.region)
if !tt.isValid && err == nil {
t.Fatalf("Should have failed")
}
if tt.isValid && err != nil {
t.Fatalf("Should not have failed: %v", err)
}
if tt.isValid {
diff := cmp.Diff(tt.args.state, tt.expected)
if diff != "" {
t.Fatalf("Data does not match: %s", diff)
}
}
})
}
}
func TestToCreatePayload(t *testing.T) {
tests := []struct {
description string
input *Model
expected *kms.CreateWrappingKeyPayload
isValid bool
}{
{
"default_values",
&Model{},
&kms.CreateWrappingKeyPayload{},
true,
},
{
"simple_values",
&Model{
DisplayName: types.StringValue("name"),
},
&kms.CreateWrappingKeyPayload{
DisplayName: utils.Ptr("name"),
},
true,
},
{
"null_fields",
&Model{
DisplayName: types.StringValue(""),
Description: types.StringValue(""),
},
&kms.CreateWrappingKeyPayload{
DisplayName: utils.Ptr(""),
Description: utils.Ptr(""),
},
true,
},
{
"nil_model",
nil,
nil,
false,
},
}
for _, tt := range tests {
t.Run(tt.description, func(t *testing.T) {
output, err := toCreatePayload(tt.input)
if !tt.isValid && err == nil {
t.Fatalf("Should have failed")
}
if tt.isValid && err != nil {
t.Fatalf("Should not have failed: %v", err)
}
if tt.isValid {
diff := cmp.Diff(output, tt.expected)
if diff != "" {
t.Fatalf("Data does not match: %s", diff)
}
}
})
}
}