github.com/minamijoyo/terraform@v0.7.8-0.20161029001309-18b3736ba44b/builtin/providers/aws/resource_aws_vpn_gateway_test.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "testing" 6 "time" 7 8 "github.com/aws/aws-sdk-go/aws" 9 "github.com/aws/aws-sdk-go/aws/awserr" 10 "github.com/aws/aws-sdk-go/service/ec2" 11 "github.com/hashicorp/terraform/helper/resource" 12 "github.com/hashicorp/terraform/terraform" 13 ) 14 15 func TestAccAWSVpnGateway_basic(t *testing.T) { 16 var v, v2 ec2.VpnGateway 17 18 testNotEqual := func(*terraform.State) error { 19 if len(v.VpcAttachments) == 0 { 20 return fmt.Errorf("VPN Gateway A is not attached") 21 } 22 if len(v2.VpcAttachments) == 0 { 23 return fmt.Errorf("VPN Gateway B is not attached") 24 } 25 26 id1 := v.VpcAttachments[0].VpcId 27 id2 := v2.VpcAttachments[0].VpcId 28 if id1 == id2 { 29 return fmt.Errorf("Both attachment IDs are the same") 30 } 31 32 return nil 33 } 34 35 resource.Test(t, resource.TestCase{ 36 PreCheck: func() { testAccPreCheck(t) }, 37 IDRefreshName: "aws_vpn_gateway.foo", 38 Providers: testAccProviders, 39 CheckDestroy: testAccCheckVpnGatewayDestroy, 40 Steps: []resource.TestStep{ 41 resource.TestStep{ 42 Config: testAccVpnGatewayConfig, 43 Check: resource.ComposeTestCheckFunc( 44 testAccCheckVpnGatewayExists( 45 "aws_vpn_gateway.foo", &v), 46 ), 47 }, 48 49 resource.TestStep{ 50 Config: testAccVpnGatewayConfigChangeVPC, 51 Check: resource.ComposeTestCheckFunc( 52 testAccCheckVpnGatewayExists( 53 "aws_vpn_gateway.foo", &v2), 54 testNotEqual, 55 ), 56 }, 57 }, 58 }) 59 } 60 61 func TestAccAWSVpnGateway_withAvailabilityZoneSetToState(t *testing.T) { 62 var v ec2.VpnGateway 63 64 resource.Test(t, resource.TestCase{ 65 PreCheck: func() { testAccPreCheck(t) }, 66 Providers: testAccProviders, 67 CheckDestroy: testAccCheckVpnGatewayDestroy, 68 Steps: []resource.TestStep{ 69 resource.TestStep{ 70 Config: testAccVpnGatewayConfigWithAZ, 71 Check: resource.ComposeTestCheckFunc( 72 testAccCheckVpnGatewayExists("aws_vpn_gateway.foo", &v), 73 resource.TestCheckResourceAttr( 74 "aws_vpn_gateway.foo", "availability_zone", "us-west-2a"), 75 ), 76 }, 77 }, 78 }) 79 } 80 81 func TestAccAWSVpnGateway_disappears(t *testing.T) { 82 var v ec2.VpnGateway 83 84 resource.Test(t, resource.TestCase{ 85 PreCheck: func() { testAccPreCheck(t) }, 86 Providers: testAccProviders, 87 CheckDestroy: testAccCheckVpnGatewayDestroy, 88 Steps: []resource.TestStep{ 89 resource.TestStep{ 90 Config: testAccVpnGatewayConfig, 91 Check: resource.ComposeTestCheckFunc( 92 testAccCheckVpnGatewayExists("aws_vpn_gateway.foo", &v), 93 testAccAWSVpnGatewayDisappears(&v), 94 ), 95 ExpectNonEmptyPlan: true, 96 }, 97 }, 98 }) 99 } 100 101 func TestAccAWSVpnGateway_reattach(t *testing.T) { 102 var vpc1, vpc2 ec2.Vpc 103 var vgw1, vgw2 ec2.VpnGateway 104 105 testAttachmentFunc := func(vgw *ec2.VpnGateway, vpc *ec2.Vpc) func(*terraform.State) error { 106 return func(*terraform.State) error { 107 if len(vgw.VpcAttachments) == 0 { 108 return fmt.Errorf("VPN Gateway %q has no VPC attachments.", 109 *vgw.VpnGatewayId) 110 } 111 112 if len(vgw.VpcAttachments) > 1 { 113 count := 0 114 for _, v := range vgw.VpcAttachments { 115 if *v.State == "attached" { 116 count += 1 117 } 118 } 119 if count > 1 { 120 return fmt.Errorf( 121 "VPN Gateway %q has an unexpected number of VPC attachments (more than 1): %#v", 122 *vgw.VpnGatewayId, vgw.VpcAttachments) 123 } 124 } 125 126 if *vgw.VpcAttachments[0].State != "attached" { 127 return fmt.Errorf("Expected VPN Gateway %q to be attached.", 128 *vgw.VpnGatewayId) 129 } 130 131 if *vgw.VpcAttachments[0].VpcId != *vpc.VpcId { 132 return fmt.Errorf("Expected VPN Gateway %q to be attached to VPC %q, but got: %q", 133 *vgw.VpnGatewayId, *vpc.VpcId, *vgw.VpcAttachments[0].VpcId) 134 } 135 return nil 136 } 137 } 138 139 resource.Test(t, resource.TestCase{ 140 PreCheck: func() { testAccPreCheck(t) }, 141 IDRefreshName: "aws_vpn_gateway.foo", 142 Providers: testAccProviders, 143 CheckDestroy: testAccCheckVpnGatewayDestroy, 144 Steps: []resource.TestStep{ 145 resource.TestStep{ 146 Config: testAccCheckVpnGatewayConfigReattach, 147 Check: resource.ComposeTestCheckFunc( 148 testAccCheckVpcExists("aws_vpc.foo", &vpc1), 149 testAccCheckVpcExists("aws_vpc.bar", &vpc2), 150 testAccCheckVpnGatewayExists( 151 "aws_vpn_gateway.foo", &vgw1), 152 testAccCheckVpnGatewayExists( 153 "aws_vpn_gateway.bar", &vgw2), 154 testAttachmentFunc(&vgw1, &vpc1), 155 testAttachmentFunc(&vgw2, &vpc2), 156 ), 157 }, 158 resource.TestStep{ 159 Config: testAccCheckVpnGatewayConfigReattachChange, 160 Check: resource.ComposeTestCheckFunc( 161 testAccCheckVpnGatewayExists( 162 "aws_vpn_gateway.foo", &vgw1), 163 testAccCheckVpnGatewayExists( 164 "aws_vpn_gateway.bar", &vgw2), 165 testAttachmentFunc(&vgw2, &vpc1), 166 testAttachmentFunc(&vgw1, &vpc2), 167 ), 168 }, 169 resource.TestStep{ 170 Config: testAccCheckVpnGatewayConfigReattach, 171 Check: resource.ComposeTestCheckFunc( 172 testAccCheckVpnGatewayExists( 173 "aws_vpn_gateway.foo", &vgw1), 174 testAccCheckVpnGatewayExists( 175 "aws_vpn_gateway.bar", &vgw2), 176 testAttachmentFunc(&vgw1, &vpc1), 177 testAttachmentFunc(&vgw2, &vpc2), 178 ), 179 }, 180 }, 181 }) 182 } 183 184 func TestAccAWSVpnGateway_delete(t *testing.T) { 185 var vpnGateway ec2.VpnGateway 186 187 testDeleted := func(r string) resource.TestCheckFunc { 188 return func(s *terraform.State) error { 189 _, ok := s.RootModule().Resources[r] 190 if ok { 191 return fmt.Errorf("VPN Gateway %q should have been deleted.", r) 192 } 193 return nil 194 } 195 } 196 197 resource.Test(t, resource.TestCase{ 198 PreCheck: func() { testAccPreCheck(t) }, 199 IDRefreshName: "aws_vpn_gateway.foo", 200 Providers: testAccProviders, 201 CheckDestroy: testAccCheckVpnGatewayDestroy, 202 Steps: []resource.TestStep{ 203 resource.TestStep{ 204 Config: testAccVpnGatewayConfig, 205 Check: resource.ComposeTestCheckFunc( 206 testAccCheckVpnGatewayExists("aws_vpn_gateway.foo", &vpnGateway)), 207 }, 208 resource.TestStep{ 209 Config: testAccNoVpnGatewayConfig, 210 Check: resource.ComposeTestCheckFunc(testDeleted("aws_vpn_gateway.foo")), 211 }, 212 }, 213 }) 214 } 215 216 func TestAccAWSVpnGateway_tags(t *testing.T) { 217 var v ec2.VpnGateway 218 219 resource.Test(t, resource.TestCase{ 220 PreCheck: func() { testAccPreCheck(t) }, 221 IDRefreshName: "aws_vpn_gateway.foo", 222 Providers: testAccProviders, 223 CheckDestroy: testAccCheckVpnGatewayDestroy, 224 Steps: []resource.TestStep{ 225 resource.TestStep{ 226 Config: testAccCheckVpnGatewayConfigTags, 227 Check: resource.ComposeTestCheckFunc( 228 testAccCheckVpnGatewayExists("aws_vpn_gateway.foo", &v), 229 testAccCheckTags(&v.Tags, "foo", "bar"), 230 ), 231 }, 232 resource.TestStep{ 233 Config: testAccCheckVpnGatewayConfigTagsUpdate, 234 Check: resource.ComposeTestCheckFunc( 235 testAccCheckVpnGatewayExists("aws_vpn_gateway.foo", &v), 236 testAccCheckTags(&v.Tags, "foo", ""), 237 testAccCheckTags(&v.Tags, "bar", "baz"), 238 ), 239 }, 240 }, 241 }) 242 } 243 244 func testAccAWSVpnGatewayDisappears(gateway *ec2.VpnGateway) resource.TestCheckFunc { 245 return func(s *terraform.State) error { 246 conn := testAccProvider.Meta().(*AWSClient).ec2conn 247 248 _, err := conn.DetachVpnGateway(&ec2.DetachVpnGatewayInput{ 249 VpnGatewayId: gateway.VpnGatewayId, 250 VpcId: gateway.VpcAttachments[0].VpcId, 251 }) 252 if err != nil { 253 ec2err, ok := err.(awserr.Error) 254 if ok { 255 if ec2err.Code() == "InvalidVpnGatewayID.NotFound" { 256 return nil 257 } else if ec2err.Code() == "InvalidVpnGatewayAttachment.NotFound" { 258 return nil 259 } 260 } 261 262 if err != nil { 263 return err 264 } 265 } 266 267 opts := &ec2.DeleteVpnGatewayInput{ 268 VpnGatewayId: gateway.VpnGatewayId, 269 } 270 if _, err := conn.DeleteVpnGateway(opts); err != nil { 271 return err 272 } 273 return resource.Retry(40*time.Minute, func() *resource.RetryError { 274 opts := &ec2.DescribeVpnGatewaysInput{ 275 VpnGatewayIds: []*string{gateway.VpnGatewayId}, 276 } 277 resp, err := conn.DescribeVpnGateways(opts) 278 if err != nil { 279 cgw, ok := err.(awserr.Error) 280 if ok && cgw.Code() == "InvalidVpnGatewayID.NotFound" { 281 return nil 282 } 283 if ok && cgw.Code() == "IncorrectState" { 284 return resource.RetryableError(fmt.Errorf( 285 "Waiting for VPN Gateway to be in the correct state: %v", gateway.VpnGatewayId)) 286 } 287 return resource.NonRetryableError( 288 fmt.Errorf("Error retrieving VPN Gateway: %s", err)) 289 } 290 if *resp.VpnGateways[0].State == "deleted" { 291 return nil 292 } 293 return resource.RetryableError(fmt.Errorf( 294 "Waiting for VPN Gateway: %v", gateway.VpnGatewayId)) 295 }) 296 } 297 } 298 299 func testAccCheckVpnGatewayDestroy(s *terraform.State) error { 300 ec2conn := testAccProvider.Meta().(*AWSClient).ec2conn 301 302 for _, rs := range s.RootModule().Resources { 303 if rs.Type != "aws_vpn_gateway" { 304 continue 305 } 306 307 // Try to find the resource 308 resp, err := ec2conn.DescribeVpnGateways(&ec2.DescribeVpnGatewaysInput{ 309 VpnGatewayIds: []*string{aws.String(rs.Primary.ID)}, 310 }) 311 if err == nil { 312 var v *ec2.VpnGateway 313 for _, g := range resp.VpnGateways { 314 if *g.VpnGatewayId == rs.Primary.ID { 315 v = g 316 } 317 } 318 319 if v == nil { 320 // wasn't found 321 return nil 322 } 323 324 if *v.State != "deleted" { 325 return fmt.Errorf("Expected VPN Gateway to be in deleted state, but was not: %s", v) 326 } 327 return nil 328 } 329 330 // Verify the error is what we want 331 ec2err, ok := err.(awserr.Error) 332 if !ok { 333 return err 334 } 335 if ec2err.Code() != "InvalidVpnGatewayID.NotFound" { 336 return err 337 } 338 } 339 340 return nil 341 } 342 343 func testAccCheckVpnGatewayExists(n string, ig *ec2.VpnGateway) resource.TestCheckFunc { 344 return func(s *terraform.State) error { 345 rs, ok := s.RootModule().Resources[n] 346 if !ok { 347 return fmt.Errorf("Not found: %s", n) 348 } 349 350 if rs.Primary.ID == "" { 351 return fmt.Errorf("No ID is set") 352 } 353 354 ec2conn := testAccProvider.Meta().(*AWSClient).ec2conn 355 resp, err := ec2conn.DescribeVpnGateways(&ec2.DescribeVpnGatewaysInput{ 356 VpnGatewayIds: []*string{aws.String(rs.Primary.ID)}, 357 }) 358 if err != nil { 359 return err 360 } 361 if len(resp.VpnGateways) == 0 { 362 return fmt.Errorf("VPN Gateway not found") 363 } 364 365 *ig = *resp.VpnGateways[0] 366 367 return nil 368 } 369 } 370 371 const testAccNoVpnGatewayConfig = ` 372 resource "aws_vpc" "foo" { 373 cidr_block = "10.1.0.0/16" 374 } 375 ` 376 377 const testAccVpnGatewayConfig = ` 378 resource "aws_vpc" "foo" { 379 cidr_block = "10.1.0.0/16" 380 } 381 382 resource "aws_vpn_gateway" "foo" { 383 vpc_id = "${aws_vpc.foo.id}" 384 } 385 ` 386 387 const testAccVpnGatewayConfigChangeVPC = ` 388 resource "aws_vpc" "bar" { 389 cidr_block = "10.2.0.0/16" 390 } 391 392 resource "aws_vpn_gateway" "foo" { 393 vpc_id = "${aws_vpc.bar.id}" 394 } 395 ` 396 397 const testAccCheckVpnGatewayConfigTags = ` 398 resource "aws_vpc" "foo" { 399 cidr_block = "10.1.0.0/16" 400 } 401 402 resource "aws_vpn_gateway" "foo" { 403 vpc_id = "${aws_vpc.foo.id}" 404 tags { 405 foo = "bar" 406 } 407 } 408 ` 409 410 const testAccCheckVpnGatewayConfigTagsUpdate = ` 411 resource "aws_vpc" "foo" { 412 cidr_block = "10.1.0.0/16" 413 } 414 415 resource "aws_vpn_gateway" "foo" { 416 vpc_id = "${aws_vpc.foo.id}" 417 tags { 418 bar = "baz" 419 } 420 } 421 ` 422 423 const testAccCheckVpnGatewayConfigReattach = ` 424 resource "aws_vpc" "foo" { 425 cidr_block = "10.1.0.0/16" 426 } 427 428 resource "aws_vpc" "bar" { 429 cidr_block = "10.2.0.0/16" 430 } 431 432 resource "aws_vpn_gateway" "foo" { 433 vpc_id = "${aws_vpc.foo.id}" 434 } 435 436 resource "aws_vpn_gateway" "bar" { 437 vpc_id = "${aws_vpc.bar.id}" 438 } 439 ` 440 441 const testAccCheckVpnGatewayConfigReattachChange = ` 442 resource "aws_vpc" "foo" { 443 cidr_block = "10.1.0.0/16" 444 } 445 446 resource "aws_vpc" "bar" { 447 cidr_block = "10.2.0.0/16" 448 } 449 450 resource "aws_vpn_gateway" "foo" { 451 vpc_id = "${aws_vpc.bar.id}" 452 } 453 454 resource "aws_vpn_gateway" "bar" { 455 vpc_id = "${aws_vpc.foo.id}" 456 } 457 ` 458 459 const testAccVpnGatewayConfigWithAZ = ` 460 resource "aws_vpc" "foo" { 461 cidr_block = "10.1.0.0/16" 462 } 463 464 resource "aws_vpn_gateway" "foo" { 465 vpc_id = "${aws_vpc.foo.id}" 466 availability_zone = "us-west-2a" 467 } 468 `