Copilot commented on code in PR #197:
URL: 
https://github.com/apache/cloudstack-terraform-provider/pull/197#discussion_r2261123213


##########
cloudstack/resource_cloudstack_limits.go:
##########
@@ -0,0 +1,327 @@
+// Licensed to the Apache Software Foundation (ASF) under one
+// or more contributor license agreements.  See the NOTICE file
+// distributed with this work for additional information
+// regarding copyright ownership.  The ASF licenses this file
+// to you under the Apache License, Version 2.0 (the
+// "License"); you may not use this file except in compliance
+// with the License.  You may obtain a copy of the License at
+//
+//   http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing,
+// software distributed under the License is distributed on an
+// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+// KIND, either express or implied.  See the License for the
+// specific language governing permissions and limitations
+// under the License.
+//
+
+package cloudstack
+
+import (
+       "fmt"
+       "log"
+       "strconv"
+       "strings"
+
+       "github.com/apache/cloudstack-go/v2/cloudstack"
+       "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
+       "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
+)
+
+// resourceTypeMap maps string resource types to their integer values
+var resourceTypeMap = map[string]int{
+       "instance":         0,
+       "ip":               1,
+       "volume":           2,
+       "snapshot":         3,
+       "template":         4,
+       "project":          5,
+       "network":          6,
+       "vpc":              7,
+       "cpu":              8,
+       "memory":           9,
+       "primarystorage":   10,
+       "secondarystorage": 11,
+}
+
+func resourceCloudStackLimits() *schema.Resource {
+       return &schema.Resource{
+               Read:   resourceCloudStackLimitsRead,
+               Update: resourceCloudStackLimitsUpdate,
+               Create: resourceCloudStackLimitsCreate,
+               Delete: resourceCloudStackLimitsDelete,
+               Schema: map[string]*schema.Schema{
+                       "type": {
+                               Type:     schema.TypeString,
+                               Required: true,
+                               ForceNew: true,
+                               ValidateFunc: validation.StringInSlice([]string{
+                                       "instance", "ip", "volume", "snapshot", 
"template", "project", "network", "vpc",
+                                       "cpu", "memory", "primarystorage", 
"secondarystorage",
+                               }, false), // false disables case-insensitive 
matching
+                               Description: "The type of resource to update 
the limits. Available types are: " +
+                                       "instance, ip, volume, snapshot, 
template, project, network, vpc, cpu, memory, " +
+                                       "primarystorage, secondarystorage",
+                       },
+                       "account": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource for a specified 
account. Must be used with the domainid parameter.",
+                       },
+                       "domainid": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource limits for all 
accounts in specified domain. If used with the account parameter, updates 
resource limits for a specified account in specified domain.",
+                       },
+                       "max": {
+                               Type:        schema.TypeInt,
+                               Optional:    true,
+                               Description: "Maximum resource limit. Use -1 
for unlimited resource limit. A value of 0 means zero resources are allowed, 
though the CloudStack API may return -1 for a limit set to 0.",
+                       },
+                       "projectid": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource limits for 
project.",
+                       },
+               },
+               Importer: &schema.ResourceImporter{
+                       StateContext: schema.ImportStatePassthroughContext,
+               },
+       }
+}
+
+// getResourceType gets the resource type from the type field
+func getResourceType(d *schema.ResourceData) (int, error) {
+       // Check if type is set
+       if v, ok := d.GetOk("type"); ok {
+               typeStr := v.(string)
+               if resourcetype, ok := resourceTypeMap[typeStr]; ok {
+                       return resourcetype, nil
+               }
+               return 0, fmt.Errorf("invalid type value: %s", typeStr)
+       }
+
+       return 0, fmt.Errorf("type must be specified")
+}
+
+func resourceCloudStackLimitsCreate(d *schema.ResourceData, meta interface{}) 
error {
+       cs := meta.(*cloudstack.CloudStackClient)
+
+       resourcetype, err := getResourceType(d)
+       if err != nil {
+               return err
+       }
+
+       account := d.Get("account").(string)
+       domainid := d.Get("domainid").(string)
+       projectid := d.Get("projectid").(string)
+
+       // Validate account and domain parameters
+       if account != "" && domainid == "" {
+               return fmt.Errorf("domainid is required when account is 
specified")
+       }
+
+       // Create a new parameter struct
+       p := cs.Limit.NewUpdateResourceLimitParams(resourcetype)
+       if account != "" {
+               p.SetAccount(account)
+       }
+       if domainid != "" {
+               p.SetDomainid(domainid)
+       }
+       if maxVal, ok := d.GetOk("max"); ok {
+               maxIntVal := maxVal.(int)
+               log.Printf("[DEBUG] Setting max value to %d", maxIntVal)
+               p.SetMax(int64(maxIntVal))
+       }
+       if projectid != "" {
+               p.SetProjectid(projectid)
+       }
+
+       log.Printf("[DEBUG] Updating Resource Limit for type %d", resourcetype)
+       _, err = cs.Limit.UpdateResourceLimit(p)
+
+       if err != nil {
+               return fmt.Errorf("Error creating resource limit: %s", err)
+       }
+
+       // Generate a unique ID based on the parameters
+       id := generateResourceID(resourcetype, account, domainid, projectid)
+       d.SetId(id)
+
+       return resourceCloudStackLimitsRead(d, meta)
+}
+
+// generateResourceID creates a unique ID for the resource based on its 
parameters
+func generateResourceID(resourcetype int, account, domainid, projectid string) 
string {
+       if projectid != "" {
+               return fmt.Sprintf("%d-project-%s", resourcetype, projectid)
+       }
+
+       if account != "" && domainid != "" {
+               return fmt.Sprintf("%d-account-%s-%s", resourcetype, account, 
domainid)
+       }
+
+       if domainid != "" {
+               return fmt.Sprintf("%d-domain-%s", resourcetype, domainid)
+       }
+
+       return fmt.Sprintf("%d", resourcetype)
+}
+
+func resourceCloudStackLimitsRead(d *schema.ResourceData, meta interface{}) 
error {
+       cs := meta.(*cloudstack.CloudStackClient)
+
+       // Get the resourcetype from the type field
+       resourcetype, err := getResourceType(d)
+       if err != nil {
+               // If there's an error getting the type, try to extract it from 
the ID
+               idParts := strings.Split(d.Id(), "-")
+               if len(idParts) > 0 {
+                       if rt, err := strconv.Atoi(idParts[0]); err == nil {
+                               resourcetype = rt
+                               // Find the string representation for this 
numeric type
+                               for typeStr, typeVal := range resourceTypeMap {
+                                       if typeVal == rt {
+                                               d.Set("type", typeStr)
+                                               break
+                                       }
+                               }
+                       }
+               }
+       }
+
+       account := d.Get("account").(string)
+       domainid := d.Get("domainid").(string)
+       projectid := d.Get("projectid").(string)
+
+       // Create a new parameter struct
+       p := cs.Limit.NewListResourceLimitsParams()
+       p.SetResourcetype(resourcetype)
+       if account != "" {
+               p.SetAccount(account)
+       }
+       if domainid != "" {
+               p.SetDomainid(domainid)
+       }
+       if projectid != "" {
+               p.SetProjectid(projectid)
+       }
+
+       // Retrieve the resource limits
+       l, err := cs.Limit.ListResourceLimits(p)
+       if err != nil {
+               return fmt.Errorf("error retrieving resource limits: %s", err)
+       }
+
+       if l.Count == 0 {
+               log.Printf("[DEBUG] Resource limit not found")
+               d.SetId("")
+               return nil
+       }
+
+       // Update the config
+       for _, limit := range l.ResourceLimits {
+               if limit.Resourcetype == fmt.Sprintf("%d", resourcetype) {
+                       log.Printf("[DEBUG] Retrieved max value from API: %d", 
limit.Max)
+
+                       // If the user set max to 0 but the API returned -1, 
keep it as 0 in the state
+                       if limit.Max == -1 && d.Get("max").(int) == 0 {
+                               log.Printf("[DEBUG] API returned -1 for a limit 
set to 0, keeping it as 0 in state")
+                               d.Set("max", 0)

Review Comment:
   This condition assumes that `d.Get("max")` will always return an int, but if 
the max field is not set in the schema, this could cause a panic. Consider 
checking if the value exists first with `d.GetOk("max")` before type assertion.
   ```suggestion
                        if limit.Max == -1 {
                                if v, ok := d.GetOk("max"); ok && v.(int) == 0 {
                                        log.Printf("[DEBUG] API returned -1 for 
a limit set to 0, keeping it as 0 in state")
                                        d.Set("max", 0)
                                } else {
                                        d.Set("max", limit.Max)
                                }
   ```



##########
cloudstack/resource_cloudstack_limits.go:
##########
@@ -0,0 +1,327 @@
+// Licensed to the Apache Software Foundation (ASF) under one
+// or more contributor license agreements.  See the NOTICE file
+// distributed with this work for additional information
+// regarding copyright ownership.  The ASF licenses this file
+// to you under the Apache License, Version 2.0 (the
+// "License"); you may not use this file except in compliance
+// with the License.  You may obtain a copy of the License at
+//
+//   http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing,
+// software distributed under the License is distributed on an
+// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+// KIND, either express or implied.  See the License for the
+// specific language governing permissions and limitations
+// under the License.
+//
+
+package cloudstack
+
+import (
+       "fmt"
+       "log"
+       "strconv"
+       "strings"
+
+       "github.com/apache/cloudstack-go/v2/cloudstack"
+       "github.com/hashicorp/terraform-plugin-sdk/v2/helper/schema"
+       "github.com/hashicorp/terraform-plugin-sdk/v2/helper/validation"
+)
+
+// resourceTypeMap maps string resource types to their integer values
+var resourceTypeMap = map[string]int{
+       "instance":         0,
+       "ip":               1,
+       "volume":           2,
+       "snapshot":         3,
+       "template":         4,
+       "project":          5,
+       "network":          6,
+       "vpc":              7,
+       "cpu":              8,
+       "memory":           9,
+       "primarystorage":   10,
+       "secondarystorage": 11,
+}
+
+func resourceCloudStackLimits() *schema.Resource {
+       return &schema.Resource{
+               Read:   resourceCloudStackLimitsRead,
+               Update: resourceCloudStackLimitsUpdate,
+               Create: resourceCloudStackLimitsCreate,
+               Delete: resourceCloudStackLimitsDelete,
+               Schema: map[string]*schema.Schema{
+                       "type": {
+                               Type:     schema.TypeString,
+                               Required: true,
+                               ForceNew: true,
+                               ValidateFunc: validation.StringInSlice([]string{
+                                       "instance", "ip", "volume", "snapshot", 
"template", "project", "network", "vpc",
+                                       "cpu", "memory", "primarystorage", 
"secondarystorage",
+                               }, false), // false disables case-insensitive 
matching
+                               Description: "The type of resource to update 
the limits. Available types are: " +
+                                       "instance, ip, volume, snapshot, 
template, project, network, vpc, cpu, memory, " +
+                                       "primarystorage, secondarystorage",
+                       },
+                       "account": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource for a specified 
account. Must be used with the domainid parameter.",
+                       },
+                       "domainid": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource limits for all 
accounts in specified domain. If used with the account parameter, updates 
resource limits for a specified account in specified domain.",
+                       },
+                       "max": {
+                               Type:        schema.TypeInt,
+                               Optional:    true,
+                               Description: "Maximum resource limit. Use -1 
for unlimited resource limit. A value of 0 means zero resources are allowed, 
though the CloudStack API may return -1 for a limit set to 0.",
+                       },
+                       "projectid": {
+                               Type:        schema.TypeString,
+                               Optional:    true,
+                               ForceNew:    true,
+                               Description: "Update resource limits for 
project.",
+                       },
+               },
+               Importer: &schema.ResourceImporter{
+                       StateContext: schema.ImportStatePassthroughContext,
+               },
+       }
+}
+

Review Comment:
   The import functionality uses `ImportStatePassthroughContext` but the 
documentation shows specific import ID formats like `2-acct1-domain-uuid`. 
Consider implementing a custom import function that properly parses these 
composite IDs or update the documentation to reflect the actual import behavior.
   ```suggestion
                        StateContext: resourceCloudStackLimitsImport,
                },
        }
   }
   
   
   // resourceCloudStackLimitsImport parses composite import IDs and sets 
resource fields accordingly.
   func resourceCloudStackLimitsImport(ctx context.Context, d 
*schema.ResourceData, meta interface{}) ([]*schema.ResourceData, error) {
        // Expected format: type-account-domainid or type-projectid
        // Example: 2-acct1-domain-uuid or 2-projectid
        parts := strings.Split(d.Id(), "-")
        if len(parts) < 2 {
                return nil, fmt.Errorf("unexpected import ID format (%q), 
expected type-account-domainid or type-projectid", d.Id())
        }
   
        // Set type
        typeInt, err := strconv.Atoi(parts[0])
        if err != nil {
                return nil, fmt.Errorf("invalid type value in import ID: %s", 
parts[0])
        }
        var typeStr string
        for k, v := range resourceTypeMap {
                if v == typeInt {
                        typeStr = k
                        break
                }
        }
        if typeStr == "" {
                return nil, fmt.Errorf("unknown type value in import ID: %d", 
typeInt)
        }
        if err := d.Set("type", typeStr); err != nil {
                return nil, err
        }
   
        // Set other fields
        if len(parts) == 3 {
                // type-account-domainid
                if err := d.Set("account", parts[1]); err != nil {
                        return nil, err
                }
                if err := d.Set("domainid", parts[2]); err != nil {
                        return nil, err
                }
        } else if len(parts) == 2 {
                // type-projectid
                if err := d.Set("projectid", parts[1]); err != nil {
                        return nil, err
                }
        } else {
                return nil, fmt.Errorf("unexpected import ID format (%q), 
expected type-account-domainid or type-projectid", d.Id())
        }
   
        return []*schema.ResourceData{d}, nil
   }
   ```



##########
cloudstack/resource_cloudstack_limits_test.go:
##########
@@ -0,0 +1,487 @@
+// Licensed to the Apache Software Foundation (ASF) under one
+// or more contributor license agreements.  See the NOTICE file
+// distributed with this work for additional information
+// regarding copyright ownership.  The ASF licenses this file
+// to you under the Apache License, Version 2.0 (the
+// "License"); you may not use this file except in compliance
+// with the License.  You may obtain a copy of the License at
+//
+//   http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing,
+// software distributed under the License is distributed on an
+// "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
+// KIND, either express or implied.  See the License for the
+// specific language governing permissions and limitations
+// under the License.
+//
+
+package cloudstack
+
+import (
+       "fmt"
+       "testing"
+
+       "github.com/hashicorp/terraform-plugin-testing/helper/resource"
+       "github.com/hashicorp/terraform-plugin-testing/terraform"
+)
+
+func TestAccCloudStackLimits_basic(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_basic,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.foo"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.foo", 
"type", "instance"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.foo", "max", 
"10"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_update(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_basic,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.foo"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.foo", "max", 
"10"),
+                               ),
+                       },
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_update,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.foo"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.foo", "max", 
"20"),
+                               ),
+                       },
+               },
+       })
+}
+
+func testAccCheckCloudStackLimitsExists(n string) resource.TestCheckFunc {
+       return func(s *terraform.State) error {
+               rs, ok := s.RootModule().Resources[n]
+               if !ok {
+                       return fmt.Errorf("Not found: %s", n)
+               }
+
+               if rs.Primary.ID == "" {
+                       return fmt.Errorf("No Limits ID is set")
+               }
+
+               return nil
+       }
+}
+
+func testAccCheckCloudStackLimitsDestroy(s *terraform.State) error {
+       return nil
+}
+
+const testAccCloudStackLimits_basic = `
+resource "cloudstack_limits" "foo" {
+  type         = "instance"
+  max          = 10
+  domainid     = cloudstack_domain.test_domain.id
+}
+`
+
+const testAccCloudStackLimits_update = `
+resource "cloudstack_limits" "foo" {
+  type         = "instance"
+  max          = 20
+  domainid     = cloudstack_domain.test_domain.id
+}
+`
+
+func TestAccCloudStackLimits_domain(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_domain_limit,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.domain_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.domain_limit", "type", "volume"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.domain_limit", "max", "50"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_account(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_account,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.account_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.account_limit", "type", "snapshot"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.account_limit", "max", "100"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_project(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_project,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.project_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.project_limit", "type", "primarystorage"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.project_limit", "max", "1000"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_unlimited(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_unlimited,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.unlimited"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.unlimited", 
"type", "cpu"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.unlimited", 
"max", "-1"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_stringType(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_stringType,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.string_type"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.string_type", "type", "network"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.string_type", "max", "30"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_ip(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_ip,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.ip_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.ip_limit", 
"type", "ip"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.ip_limit", 
"max", "25"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_template(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_template,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.template_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.template_limit", "type", "template"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.template_limit", "max", "40"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_projectType(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_projectType,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.project_type_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.project_type_limit", "type", "project"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.project_type_limit", "max", "15"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_vpc(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_vpc,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.vpc_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.vpc_limit", 
"type", "vpc"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.vpc_limit", 
"max", "10"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_memory(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_memory,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.memory_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.memory_limit", "type", "memory"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.memory_limit", "max", "8192"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_zero(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_zero,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.zero_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.zero_limit", 
"type", "instance"),
+                                       resource.TestCheckResourceAttr(
+                                               "cloudstack_limits.zero_limit", 
"max", "0"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_secondarystorage(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_secondarystorage,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.secondarystorage_limit"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.secondarystorage_limit", "type", "secondarystorage"),
+                                       resource.TestCheckResourceAttr(
+                                               
"cloudstack_limits.secondarystorage_limit", "max", "2000"),
+                               ),
+                       },
+               },
+       })
+}
+
+func TestAccCloudStackLimits_import(t *testing.T) {
+       resource.Test(t, resource.TestCase{
+               PreCheck:     func() { testAccPreCheck(t) },
+               Providers:    testAccProviders,
+               CheckDestroy: testAccCheckCloudStackLimitsDestroy,
+               Steps: []resource.TestStep{
+                       {
+                               Config: testAccCloudStackLimits_domain + 
testAccCloudStackLimits_basic,
+                               Check: resource.ComposeTestCheckFunc(
+                                       
testAccCheckCloudStackLimitsExists("cloudstack_limits.foo"),
+                               ),
+                       },
+                       {
+                               ResourceName:            
"cloudstack_limits.foo",
+                               ImportState:             true,
+                               ImportStateVerify:       true,
+                               ImportStateVerifyIgnore: []string{"domainid", 
"type", "max"},
+                       },
+               },
+       })
+}
+
+// Test configurations for different resource types
+const testAccCloudStackLimits_domain = `
+resource "cloudstack_domain" "test_domain" {
+  name = "test-domain-limits"
+}
+`
+
+const testAccCloudStackLimits_domain_limit = `
+resource "cloudstack_limits" "domain_limit" {
+  type         = "volume"
+  max          = 50
+  domainid     = cloudstack_domain.test_domain.id
+}
+`
+
+const testAccCloudStackLimits_account = `
+resource "cloudstack_account" "test_account" {
+  username     = "test-account-limits"
+  password     = "password"
+  first_name   = "Test"
+  last_name    = "Account"
+  email        = "test-account-lim...@example.com"
+  account_type = 2  # Regular user account type
+  role_id      = 4  # Regular user role
+  domainid     = cloudstack_domain.test_domain.id
+}
+
+resource "cloudstack_limits" "account_limit" {
+  type         = "snapshot"
+  max          = 100
+  account      = cloudstack_account.test_account.username
+  domainid     = cloudstack_domain.test_domain.id
+}
+`
+
+const testAccCloudStackLimits_project = `
+resource "cloudstack_limits" "project_limit" {
+  type         = "primarystorage"
+  max          = 1000
+  domainid     = cloudstack_domain.test_domain.id

Review Comment:
   The test configuration `testAccCloudStackLimits_project` is missing the 
actual project resource creation. It only sets a domain-level limit instead of 
a project-specific limit. This doesn't match the test name and will cause the 
test to fail since no project is created for the `projectid` parameter.
   ```suggestion
   resource "cloudstack_project" "test_project" {
     name        = "test-project-limits"
     display_text = "Test Project for Limits"
     domainid    = cloudstack_domain.test_domain.id
   }
   
   resource "cloudstack_limits" "project_limit" {
     type       = "primarystorage"
     max        = 1000
     projectid  = cloudstack_project.test_project.id
     domainid   = cloudstack_domain.test_domain.id
   ```



-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@cloudstack.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to