github.com/jrperritt/terraform@v0.1.1-0.20170525065507-96f391dafc38/builtin/providers/aws/resource_aws_nat_gateway_test.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "strings" 6 "testing" 7 8 "github.com/aws/aws-sdk-go/aws" 9 "github.com/aws/aws-sdk-go/aws/awserr" 10 "github.com/aws/aws-sdk-go/service/ec2" 11 "github.com/hashicorp/terraform/helper/resource" 12 "github.com/hashicorp/terraform/terraform" 13 ) 14 15 func TestAccAWSNatGateway_basic(t *testing.T) { 16 var natGateway ec2.NatGateway 17 18 resource.Test(t, resource.TestCase{ 19 PreCheck: func() { testAccPreCheck(t) }, 20 IDRefreshName: "aws_nat_gateway.gateway", 21 Providers: testAccProviders, 22 CheckDestroy: testAccCheckNatGatewayDestroy, 23 Steps: []resource.TestStep{ 24 resource.TestStep{ 25 Config: testAccNatGatewayConfig, 26 Check: resource.ComposeTestCheckFunc( 27 testAccCheckNatGatewayExists("aws_nat_gateway.gateway", &natGateway), 28 ), 29 }, 30 }, 31 }) 32 } 33 34 func testAccCheckNatGatewayDestroy(s *terraform.State) error { 35 conn := testAccProvider.Meta().(*AWSClient).ec2conn 36 37 for _, rs := range s.RootModule().Resources { 38 if rs.Type != "aws_nat_gateway" { 39 continue 40 } 41 42 // Try to find the resource 43 resp, err := conn.DescribeNatGateways(&ec2.DescribeNatGatewaysInput{ 44 NatGatewayIds: []*string{aws.String(rs.Primary.ID)}, 45 }) 46 if err == nil { 47 status := map[string]bool{ 48 "deleted": true, 49 "deleting": true, 50 "failed": true, 51 } 52 if _, ok := status[strings.ToLower(*resp.NatGateways[0].State)]; len(resp.NatGateways) > 0 && !ok { 53 return fmt.Errorf("still exists") 54 } 55 56 return nil 57 } 58 59 // Verify the error is what we want 60 ec2err, ok := err.(awserr.Error) 61 if !ok { 62 return err 63 } 64 if ec2err.Code() != "NatGatewayNotFound" { 65 return err 66 } 67 } 68 69 return nil 70 } 71 72 func testAccCheckNatGatewayExists(n string, ng *ec2.NatGateway) resource.TestCheckFunc { 73 return func(s *terraform.State) error { 74 rs, ok := s.RootModule().Resources[n] 75 if !ok { 76 return fmt.Errorf("Not found: %s", n) 77 } 78 79 if rs.Primary.ID == "" { 80 return fmt.Errorf("No ID is set") 81 } 82 83 conn := testAccProvider.Meta().(*AWSClient).ec2conn 84 resp, err := conn.DescribeNatGateways(&ec2.DescribeNatGatewaysInput{ 85 NatGatewayIds: []*string{aws.String(rs.Primary.ID)}, 86 }) 87 if err != nil { 88 return err 89 } 90 if len(resp.NatGateways) == 0 { 91 return fmt.Errorf("NatGateway not found") 92 } 93 94 *ng = *resp.NatGateways[0] 95 96 return nil 97 } 98 } 99 100 const testAccNatGatewayConfig = ` 101 resource "aws_vpc" "vpc" { 102 cidr_block = "10.0.0.0/16" 103 tags { 104 Name = "testAccNatGatewayConfig" 105 } 106 } 107 108 resource "aws_subnet" "private" { 109 vpc_id = "${aws_vpc.vpc.id}" 110 cidr_block = "10.0.1.0/24" 111 map_public_ip_on_launch = false 112 } 113 114 resource "aws_subnet" "public" { 115 vpc_id = "${aws_vpc.vpc.id}" 116 cidr_block = "10.0.2.0/24" 117 map_public_ip_on_launch = true 118 } 119 120 resource "aws_internet_gateway" "gw" { 121 vpc_id = "${aws_vpc.vpc.id}" 122 } 123 124 resource "aws_eip" "nat_gateway" { 125 vpc = true 126 } 127 128 // Actual SUT 129 resource "aws_nat_gateway" "gateway" { 130 allocation_id = "${aws_eip.nat_gateway.id}" 131 subnet_id = "${aws_subnet.public.id}" 132 133 depends_on = ["aws_internet_gateway.gw"] 134 } 135 136 resource "aws_route_table" "private" { 137 vpc_id = "${aws_vpc.vpc.id}" 138 139 route { 140 cidr_block = "0.0.0.0/0" 141 nat_gateway_id = "${aws_nat_gateway.gateway.id}" 142 } 143 } 144 145 resource "aws_route_table_association" "private" { 146 subnet_id = "${aws_subnet.private.id}" 147 route_table_id = "${aws_route_table.private.id}" 148 } 149 150 resource "aws_route_table" "public" { 151 vpc_id = "${aws_vpc.vpc.id}" 152 153 route { 154 cidr_block = "0.0.0.0/0" 155 gateway_id = "${aws_internet_gateway.gw.id}" 156 } 157 } 158 159 resource "aws_route_table_association" "public" { 160 subnet_id = "${aws_subnet.public.id}" 161 route_table_id = "${aws_route_table.public.id}" 162 } 163 `