github.com/ndarilek/terraform@v0.3.8-0.20150320140257-d3135c1b2bac/builtin/providers/cloudstack/resource_cloudstack_vpn_customer_gateway_test.go (about) 1 package cloudstack 2 3 import ( 4 "fmt" 5 "testing" 6 7 "github.com/hashicorp/terraform/helper/resource" 8 "github.com/hashicorp/terraform/terraform" 9 "github.com/xanzy/go-cloudstack/cloudstack" 10 ) 11 12 func TestAccCloudStackVPNCustomerGateway_basic(t *testing.T) { 13 var vpnCustomerGateway cloudstack.VpnCustomerGateway 14 15 resource.Test(t, resource.TestCase{ 16 PreCheck: func() { testAccPreCheck(t) }, 17 Providers: testAccProviders, 18 CheckDestroy: testAccCheckCloudStackVPNCustomerGatewayDestroy, 19 Steps: []resource.TestStep{ 20 resource.TestStep{ 21 Config: testAccCloudStackVPNCustomerGateway_basic, 22 Check: resource.ComposeTestCheckFunc( 23 testAccCheckCloudStackVPNCustomerGatewayExists( 24 "cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway), 25 testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway), 26 resource.TestCheckResourceAttr( 27 "cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo"), 28 resource.TestCheckResourceAttr( 29 "cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar"), 30 resource.TestCheckResourceAttr( 31 "cloudstack_vpn_customer_gateway.foo", "ike_policy", "aes256-sha1"), 32 resource.TestCheckResourceAttr( 33 "cloudstack_vpn_customer_gateway.bar", "esp_policy", "aes256-sha1"), 34 ), 35 }, 36 }, 37 }) 38 } 39 40 func TestAccCloudStackVPNCustomerGateway_update(t *testing.T) { 41 var vpnCustomerGateway cloudstack.VpnCustomerGateway 42 43 resource.Test(t, resource.TestCase{ 44 PreCheck: func() { testAccPreCheck(t) }, 45 Providers: testAccProviders, 46 CheckDestroy: testAccCheckCloudStackVPNCustomerGatewayDestroy, 47 Steps: []resource.TestStep{ 48 resource.TestStep{ 49 Config: testAccCloudStackVPNCustomerGateway_basic, 50 Check: resource.ComposeTestCheckFunc( 51 testAccCheckCloudStackVPNCustomerGatewayExists( 52 "cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway), 53 testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway), 54 resource.TestCheckResourceAttr( 55 "cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo"), 56 resource.TestCheckResourceAttr( 57 "cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar"), 58 resource.TestCheckResourceAttr( 59 "cloudstack_vpn_customer_gateway.foo", "ike_policy", "aes256-sha1"), 60 resource.TestCheckResourceAttr( 61 "cloudstack_vpn_customer_gateway.bar", "esp_policy", "aes256-sha1"), 62 ), 63 }, 64 65 resource.TestStep{ 66 Config: testAccCloudStackVPNCustomerGateway_update, 67 Check: resource.ComposeTestCheckFunc( 68 testAccCheckCloudStackVPNCustomerGatewayExists( 69 "cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway), 70 testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway), 71 resource.TestCheckResourceAttr( 72 "cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo-bar"), 73 resource.TestCheckResourceAttr( 74 "cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar-foo"), 75 resource.TestCheckResourceAttr( 76 "cloudstack_vpn_customer_gateway.foo", "ike_policy", "3des-md5"), 77 resource.TestCheckResourceAttr( 78 "cloudstack_vpn_customer_gateway.bar", "esp_policy", "3des-md5"), 79 ), 80 }, 81 }, 82 }) 83 } 84 85 func testAccCheckCloudStackVPNCustomerGatewayExists( 86 n string, vpnCustomerGateway *cloudstack.VpnCustomerGateway) resource.TestCheckFunc { 87 return func(s *terraform.State) error { 88 rs, ok := s.RootModule().Resources[n] 89 if !ok { 90 return fmt.Errorf("Not found: %s", n) 91 } 92 93 if rs.Primary.ID == "" { 94 return fmt.Errorf("No VPN CustomerGateway ID is set") 95 } 96 97 cs := testAccProvider.Meta().(*cloudstack.CloudStackClient) 98 v, _, err := cs.VPN.GetVpnCustomerGatewayByID(rs.Primary.ID) 99 100 if err != nil { 101 return err 102 } 103 104 if v.Id != rs.Primary.ID { 105 return fmt.Errorf("VPN CustomerGateway not found") 106 } 107 108 *vpnCustomerGateway = *v 109 110 return nil 111 } 112 } 113 114 func testAccCheckCloudStackVPNCustomerGatewayAttributes( 115 vpnCustomerGateway *cloudstack.VpnCustomerGateway) resource.TestCheckFunc { 116 return func(s *terraform.State) error { 117 118 if vpnCustomerGateway.Esppolicy != "aes256-sha1" { 119 return fmt.Errorf("Bad ESP policy: %s", vpnCustomerGateway.Esppolicy) 120 } 121 122 if vpnCustomerGateway.Ikepolicy != "aes256-sha1" { 123 return fmt.Errorf("Bad IKE policy: %s", vpnCustomerGateway.Ikepolicy) 124 } 125 126 if vpnCustomerGateway.Ipsecpsk != "terraform" { 127 return fmt.Errorf("Bad IPSEC pre-shared key: %s", vpnCustomerGateway.Ipsecpsk) 128 } 129 130 return nil 131 } 132 } 133 134 func testAccCheckCloudStackVPNCustomerGatewayDestroy(s *terraform.State) error { 135 cs := testAccProvider.Meta().(*cloudstack.CloudStackClient) 136 137 for _, rs := range s.RootModule().Resources { 138 if rs.Type != "cloudstack_vpn_customer_gateway" { 139 continue 140 } 141 142 if rs.Primary.ID == "" { 143 return fmt.Errorf("No VPN Customer Gateway ID is set") 144 } 145 146 p := cs.VPN.NewDeleteVpnCustomerGatewayParams(rs.Primary.ID) 147 _, err := cs.VPN.DeleteVpnCustomerGateway(p) 148 149 if err != nil { 150 return fmt.Errorf( 151 "Error deleting VPN Customer Gateway (%s): %s", 152 rs.Primary.ID, err) 153 } 154 } 155 156 return nil 157 } 158 159 var testAccCloudStackVPNCustomerGateway_basic = fmt.Sprintf(` 160 resource "cloudstack_vpc" "foo" { 161 name = "terraform-vpc-foo" 162 cidr = "%s" 163 vpc_offering = "%s" 164 zone = "%s" 165 } 166 167 resource "cloudstack_vpc" "bar" { 168 name = "terraform-vpc-bar" 169 cidr = "%s" 170 vpc_offering = "%s" 171 zone = "%s" 172 } 173 174 resource "cloudstack_vpn_gateway" "foo" { 175 vpc = "${cloudstack_vpc.foo.name}" 176 } 177 178 resource "cloudstack_vpn_gateway" "bar" { 179 vpc = "${cloudstack_vpc.bar.name}" 180 } 181 182 resource "cloudstack_vpn_customer_gateway" "foo" { 183 name = "terraform-foo" 184 cidr = "${cloudstack_vpc.foo.cidr}" 185 esp_policy = "aes256-sha1" 186 gateway = "${cloudstack_vpn_gateway.foo.public_ip}" 187 ike_policy = "aes256-sha1" 188 ipsec_psk = "terraform" 189 } 190 191 resource "cloudstack_vpn_customer_gateway" "bar" { 192 name = "terraform-bar" 193 cidr = "${cloudstack_vpc.bar.cidr}" 194 esp_policy = "aes256-sha1" 195 gateway = "${cloudstack_vpn_gateway.bar.public_ip}" 196 ike_policy = "aes256-sha1" 197 ipsec_psk = "terraform" 198 }`, 199 CLOUDSTACK_VPC_CIDR_1, 200 CLOUDSTACK_VPC_OFFERING, 201 CLOUDSTACK_ZONE, 202 CLOUDSTACK_VPC_CIDR_2, 203 CLOUDSTACK_VPC_OFFERING, 204 CLOUDSTACK_ZONE) 205 206 var testAccCloudStackVPNCustomerGateway_update = fmt.Sprintf(` 207 resource "cloudstack_vpn_customer_gateway" "foo" { 208 name = "terraform-foo-bar" 209 cidr = "${cloudstack_vpc.foo.cidr}" 210 esp_policy = "3des-md5" 211 gateway = "${cloudstack_vpn_gateway.foo.public_ip}" 212 ike_policy = "3des-md5" 213 ipsec_psk = "terraform" 214 } 215 216 resource "cloudstack_vpn_customer_gateway" "bar" { 217 name = "terraform-bar-foo" 218 cidr = "${cloudstack_vpc.bar.cidr}" 219 esp_policy = "3des-md5" 220 gateway = "${cloudstack_vpn_gateway.bar.public_ip}" 221 ike_policy = "3des-md5" 222 ipsec_psk = "terraform" 223 }`)