0
0
mirror of https://github.com/bpg/terraform-provider-proxmox.git synced 2025-06-30 18:42:58 +00:00

fix(lxc): cloned container does not start by default (#615)

* fix(lxc): cloned container does not start by default

Signed-off-by: Pavel Boldyrev <627562+bpg@users.noreply.github.com>
This commit is contained in:
Pavel Boldyrev 2023-10-09 21:20:01 -04:00 committed by GitHub
parent be5251dd5a
commit d5994a2bd5
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
5 changed files with 196 additions and 19 deletions

View File

@ -0,0 +1,126 @@
/*
* This Source Code Form is subject to the terms of the Mozilla Public
* License, v. 2.0. If a copy of the MPL was not distributed with this
* file, You can obtain one at https://mozilla.org/MPL/2.0/.
*/
package tests
import (
"context"
"fmt"
"testing"
"github.com/hashicorp/terraform-plugin-sdk/v2/helper/resource"
"github.com/hashicorp/terraform-plugin-sdk/v2/terraform"
"github.com/stretchr/testify/require"
)
const (
accTestContainerName = "proxmox_virtual_environment_container.test_container"
accTestContainerCloneName = "proxmox_virtual_environment_container.test_container_clone"
)
func TestAccResourceContainer(t *testing.T) {
t.Parallel()
accProviders := testAccMuxProviders(context.Background(), t)
resource.Test(t, resource.TestCase{
ProtoV6ProviderFactories: accProviders,
Steps: []resource.TestStep{
{
Config: testAccResourceContainerCreateConfig(false),
Check: testAccResourceContainerCreateCheck(t),
},
{
Config: testAccResourceContainerCreateConfig(true) + testAccResourceContainerCreateCloneConfig(),
Check: testAccResourceContainerCreateCloneCheck(t),
},
},
})
}
func testAccResourceContainerCreateConfig(isTemplate bool) string {
return fmt.Sprintf(`
resource "proxmox_virtual_environment_container" "test_container" {
node_name = "%s"
vm_id = 1100
template = %t
disk {
datastore_id = "local-lvm"
size = 8
}
description = <<-EOT
my
description
value
EOT
initialization {
hostname = "test"
ip_config {
ipv4 {
address = "dhcp"
}
}
}
network_interface {
name = "vmbr0"
}
operating_system {
template_file_id = "local:vztmpl/ubuntu-23.04-standard_23.04-1_amd64.tar.zst"
type = "ubuntu"
}
}
`, accTestNodeName, isTemplate)
}
func testAccResourceContainerCreateCheck(t *testing.T) resource.TestCheckFunc {
t.Helper()
return resource.ComposeTestCheckFunc(
resource.TestCheckResourceAttr(accTestContainerName, "description", "my\ndescription\nvalue\n"),
func(*terraform.State) error {
err := getNodesClient().Container(1100).WaitForContainerStatus(context.Background(), "running", 10, 1)
require.NoError(t, err, "container did not start")
return nil
},
)
}
func testAccResourceContainerCreateCloneConfig() string {
return fmt.Sprintf(`
resource "proxmox_virtual_environment_container" "test_container_clone" {
depends_on = [proxmox_virtual_environment_container.test_container]
node_name = "%s"
vm_id = 1101
clone {
vm_id = 1100
}
initialization {
hostname = "test-clone"
}
}
`, accTestNodeName)
}
func testAccResourceContainerCreateCloneCheck(t *testing.T) resource.TestCheckFunc {
t.Helper()
return resource.ComposeTestCheckFunc(
func(*terraform.State) error {
err := getNodesClient().Container(1101).WaitForContainerStatus(context.Background(), "running", 10, 1)
require.NoError(t, err, "container did not start")
return nil
},
)
}

View File

@ -25,7 +25,7 @@ func TestAccResourceLinuxVLAN(t *testing.T) {
accProviders := testAccMuxProviders(context.Background(), t)
iface := "eno0"
iface := "enp6s18"
vlan1 := gofakeit.Number(10, 4094)
customName := fmt.Sprintf("iface_%s", gofakeit.Word())
vlan2 := gofakeit.Number(10, 4094)

View File

@ -9,6 +9,7 @@ package tests
import (
"context"
"fmt"
"sync"
"testing"
"github.com/hashicorp/terraform-plugin-framework/providerserver"
@ -20,7 +21,10 @@ import (
"github.com/stretchr/testify/require"
"github.com/bpg/terraform-provider-proxmox/fwprovider"
"github.com/bpg/terraform-provider-proxmox/proxmox/api"
"github.com/bpg/terraform-provider-proxmox/proxmox/nodes"
sdkV2provider "github.com/bpg/terraform-provider-proxmox/proxmoxtf/provider"
"github.com/bpg/terraform-provider-proxmox/utils"
)
const (
@ -65,3 +69,40 @@ func testAccMuxProviders(ctx context.Context, t *testing.T) map[string]func() (t
return muxServers
}
//nolint:gochecknoglobals
var (
once sync.Once
nodesClient *nodes.Client
)
func getNodesClient() *nodes.Client {
if nodesClient == nil {
once.Do(
func() {
username := utils.GetAnyStringEnv("PROXMOX_VE_USERNAME")
password := utils.GetAnyStringEnv("PROXMOX_VE_PASSWORD")
endpoint := utils.GetAnyStringEnv("PROXMOX_VE_ENDPOINT")
apiToken := utils.GetAnyStringEnv("PROXMOX_VE_API_TOKEN")
creds, err := api.NewCredentials(username, password, "", apiToken)
if err != nil {
panic(err)
}
conn, err := api.NewConnection(endpoint, true)
if err != nil {
panic(err)
}
client, err := api.NewClient(creds, conn)
if err != nil {
panic(err)
}
nodesClient = &nodes.Client{Client: client, NodeName: accTestNodeName}
})
}
return nodesClient
}

View File

@ -119,11 +119,20 @@ func (c *Client) ShutdownContainer(ctx context.Context, d *ShutdownRequestBody)
return nil
}
// StartContainer starts a container.
// StartContainer starts a container if is not already running.
func (c *Client) StartContainer(ctx context.Context, timeout int) error {
status, err := c.GetContainerStatus(ctx)
if err != nil {
return fmt.Errorf("error retrieving container status: %w", err)
}
if status.Status == "running" {
return nil
}
taskID, err := c.StartContainerAsync(ctx)
if err != nil {
return err
return fmt.Errorf("error starting container: %w", err)
}
err = c.Tasks().WaitForTask(ctx, *taskID, timeout, 5)
@ -131,6 +140,12 @@ func (c *Client) StartContainer(ctx context.Context, timeout int) error {
return fmt.Errorf("error waiting for container start: %w", err)
}
// the timeout here should probably be configurable
err = c.WaitForContainerStatus(ctx, "running", timeout*2, 5)
if err != nil {
return fmt.Errorf("error waiting for container start: %w", err)
}
return nil
}
@ -170,9 +185,9 @@ func (c *Client) UpdateContainer(ctx context.Context, d *UpdateRequestBody) erro
return nil
}
// WaitForContainerState waits for a container to reach a specific state.
func (c *Client) WaitForContainerState(ctx context.Context, state string, timeout int, delay int) error {
state = strings.ToLower(state)
// WaitForContainerStatus waits for a container to reach a specific state.
func (c *Client) WaitForContainerStatus(ctx context.Context, status string, timeout int, delay int) error {
status = strings.ToLower(status)
timeDelay := int64(delay)
timeMax := float64(timeout)
@ -186,7 +201,7 @@ func (c *Client) WaitForContainerState(ctx context.Context, state string, timeou
return fmt.Errorf("error retrieving container status: %w", err)
}
if data.Status == state {
if data.Status == status {
return nil
}
@ -203,9 +218,9 @@ func (c *Client) WaitForContainerState(ctx context.Context, state string, timeou
}
return fmt.Errorf(
"timeout while waiting for container \"%d\" to enter the state \"%s\"",
"timeout while waiting for container \"%d\" to enter the status \"%s\"",
c.VMID,
state,
status,
)
}

View File

@ -1575,8 +1575,8 @@ func containerCreateStart(ctx context.Context, d *schema.ResourceData, m interfa
containerAPI := api.Node(nodeName).Container(vmID)
// A container was started by the create operation, so wait for it to be running.
err = containerAPI.WaitForContainerState(ctx, "running", 120, 5)
// Start the container and wait for it to reach a running state before continuing.
err = containerAPI.StartContainer(ctx, 60)
if err != nil {
return diag.FromErr(err)
}
@ -2636,11 +2636,6 @@ func containerUpdate(ctx context.Context, d *schema.ResourceData, m interface{})
if e != nil {
return diag.FromErr(e)
}
e = containerAPI.WaitForContainerState(ctx, "running", 300, 5)
if e != nil {
return diag.FromErr(e)
}
} else {
forceStop := types.CustomBool(true)
shutdownTimeout := 300
@ -2653,7 +2648,7 @@ func containerUpdate(ctx context.Context, d *schema.ResourceData, m interface{})
return diag.FromErr(e)
}
e = containerAPI.WaitForContainerState(ctx, "stopped", 300, 5)
e = containerAPI.WaitForContainerStatus(ctx, "stopped", 300, 5)
if e != nil {
return diag.FromErr(e)
}
@ -2716,7 +2711,7 @@ func containerDelete(ctx context.Context, d *schema.ResourceData, m interface{})
return diag.FromErr(err)
}
err = containerAPI.WaitForContainerState(ctx, "stopped", 30, 5)
err = containerAPI.WaitForContainerStatus(ctx, "stopped", 30, 5)
if err != nil {
return diag.FromErr(err)
}
@ -2734,7 +2729,7 @@ func containerDelete(ctx context.Context, d *schema.ResourceData, m interface{})
}
// Wait for the state to become unavailable as that clearly indicates the destruction of the container.
err = containerAPI.WaitForContainerState(ctx, "", 60, 2)
err = containerAPI.WaitForContainerStatus(ctx, "", 60, 2)
if err == nil {
return diag.Errorf("failed to delete container \"%d\"", vmID)
}