github.com/ndarilek/terraform@v0.3.8-0.20150320140257-d3135c1b2bac/builtin/providers/cloudstack/resource_cloudstack_vpn_customer_gateway_test.go (about)

     1  package cloudstack
     2  
     3  import (
     4  	"fmt"
     5  	"testing"
     6  
     7  	"github.com/hashicorp/terraform/helper/resource"
     8  	"github.com/hashicorp/terraform/terraform"
     9  	"github.com/xanzy/go-cloudstack/cloudstack"
    10  )
    11  
    12  func TestAccCloudStackVPNCustomerGateway_basic(t *testing.T) {
    13  	var vpnCustomerGateway cloudstack.VpnCustomerGateway
    14  
    15  	resource.Test(t, resource.TestCase{
    16  		PreCheck:     func() { testAccPreCheck(t) },
    17  		Providers:    testAccProviders,
    18  		CheckDestroy: testAccCheckCloudStackVPNCustomerGatewayDestroy,
    19  		Steps: []resource.TestStep{
    20  			resource.TestStep{
    21  				Config: testAccCloudStackVPNCustomerGateway_basic,
    22  				Check: resource.ComposeTestCheckFunc(
    23  					testAccCheckCloudStackVPNCustomerGatewayExists(
    24  						"cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway),
    25  					testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway),
    26  					resource.TestCheckResourceAttr(
    27  						"cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo"),
    28  					resource.TestCheckResourceAttr(
    29  						"cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar"),
    30  					resource.TestCheckResourceAttr(
    31  						"cloudstack_vpn_customer_gateway.foo", "ike_policy", "aes256-sha1"),
    32  					resource.TestCheckResourceAttr(
    33  						"cloudstack_vpn_customer_gateway.bar", "esp_policy", "aes256-sha1"),
    34  				),
    35  			},
    36  		},
    37  	})
    38  }
    39  
    40  func TestAccCloudStackVPNCustomerGateway_update(t *testing.T) {
    41  	var vpnCustomerGateway cloudstack.VpnCustomerGateway
    42  
    43  	resource.Test(t, resource.TestCase{
    44  		PreCheck:     func() { testAccPreCheck(t) },
    45  		Providers:    testAccProviders,
    46  		CheckDestroy: testAccCheckCloudStackVPNCustomerGatewayDestroy,
    47  		Steps: []resource.TestStep{
    48  			resource.TestStep{
    49  				Config: testAccCloudStackVPNCustomerGateway_basic,
    50  				Check: resource.ComposeTestCheckFunc(
    51  					testAccCheckCloudStackVPNCustomerGatewayExists(
    52  						"cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway),
    53  					testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway),
    54  					resource.TestCheckResourceAttr(
    55  						"cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo"),
    56  					resource.TestCheckResourceAttr(
    57  						"cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar"),
    58  					resource.TestCheckResourceAttr(
    59  						"cloudstack_vpn_customer_gateway.foo", "ike_policy", "aes256-sha1"),
    60  					resource.TestCheckResourceAttr(
    61  						"cloudstack_vpn_customer_gateway.bar", "esp_policy", "aes256-sha1"),
    62  				),
    63  			},
    64  
    65  			resource.TestStep{
    66  				Config: testAccCloudStackVPNCustomerGateway_update,
    67  				Check: resource.ComposeTestCheckFunc(
    68  					testAccCheckCloudStackVPNCustomerGatewayExists(
    69  						"cloudstack_vpn_customer_gateway.foo", &vpnCustomerGateway),
    70  					testAccCheckCloudStackVPNCustomerGatewayAttributes(&vpnCustomerGateway),
    71  					resource.TestCheckResourceAttr(
    72  						"cloudstack_vpn_customer_gateway.foo", "name", "terraform-foo-bar"),
    73  					resource.TestCheckResourceAttr(
    74  						"cloudstack_vpn_customer_gateway.bar", "name", "terraform-bar-foo"),
    75  					resource.TestCheckResourceAttr(
    76  						"cloudstack_vpn_customer_gateway.foo", "ike_policy", "3des-md5"),
    77  					resource.TestCheckResourceAttr(
    78  						"cloudstack_vpn_customer_gateway.bar", "esp_policy", "3des-md5"),
    79  				),
    80  			},
    81  		},
    82  	})
    83  }
    84  
    85  func testAccCheckCloudStackVPNCustomerGatewayExists(
    86  	n string, vpnCustomerGateway *cloudstack.VpnCustomerGateway) resource.TestCheckFunc {
    87  	return func(s *terraform.State) error {
    88  		rs, ok := s.RootModule().Resources[n]
    89  		if !ok {
    90  			return fmt.Errorf("Not found: %s", n)
    91  		}
    92  
    93  		if rs.Primary.ID == "" {
    94  			return fmt.Errorf("No VPN CustomerGateway ID is set")
    95  		}
    96  
    97  		cs := testAccProvider.Meta().(*cloudstack.CloudStackClient)
    98  		v, _, err := cs.VPN.GetVpnCustomerGatewayByID(rs.Primary.ID)
    99  
   100  		if err != nil {
   101  			return err
   102  		}
   103  
   104  		if v.Id != rs.Primary.ID {
   105  			return fmt.Errorf("VPN CustomerGateway not found")
   106  		}
   107  
   108  		*vpnCustomerGateway = *v
   109  
   110  		return nil
   111  	}
   112  }
   113  
   114  func testAccCheckCloudStackVPNCustomerGatewayAttributes(
   115  	vpnCustomerGateway *cloudstack.VpnCustomerGateway) resource.TestCheckFunc {
   116  	return func(s *terraform.State) error {
   117  
   118  		if vpnCustomerGateway.Esppolicy != "aes256-sha1" {
   119  			return fmt.Errorf("Bad ESP policy: %s", vpnCustomerGateway.Esppolicy)
   120  		}
   121  
   122  		if vpnCustomerGateway.Ikepolicy != "aes256-sha1" {
   123  			return fmt.Errorf("Bad IKE policy: %s", vpnCustomerGateway.Ikepolicy)
   124  		}
   125  
   126  		if vpnCustomerGateway.Ipsecpsk != "terraform" {
   127  			return fmt.Errorf("Bad IPSEC pre-shared key: %s", vpnCustomerGateway.Ipsecpsk)
   128  		}
   129  
   130  		return nil
   131  	}
   132  }
   133  
   134  func testAccCheckCloudStackVPNCustomerGatewayDestroy(s *terraform.State) error {
   135  	cs := testAccProvider.Meta().(*cloudstack.CloudStackClient)
   136  
   137  	for _, rs := range s.RootModule().Resources {
   138  		if rs.Type != "cloudstack_vpn_customer_gateway" {
   139  			continue
   140  		}
   141  
   142  		if rs.Primary.ID == "" {
   143  			return fmt.Errorf("No VPN Customer Gateway ID is set")
   144  		}
   145  
   146  		p := cs.VPN.NewDeleteVpnCustomerGatewayParams(rs.Primary.ID)
   147  		_, err := cs.VPN.DeleteVpnCustomerGateway(p)
   148  
   149  		if err != nil {
   150  			return fmt.Errorf(
   151  				"Error deleting VPN Customer Gateway (%s): %s",
   152  				rs.Primary.ID, err)
   153  		}
   154  	}
   155  
   156  	return nil
   157  }
   158  
   159  var testAccCloudStackVPNCustomerGateway_basic = fmt.Sprintf(`
   160  resource "cloudstack_vpc" "foo" {
   161    name = "terraform-vpc-foo"
   162    cidr = "%s"
   163    vpc_offering = "%s"
   164    zone = "%s"
   165  }
   166  
   167  resource "cloudstack_vpc" "bar" {
   168    name = "terraform-vpc-bar"
   169    cidr = "%s"
   170    vpc_offering = "%s"
   171    zone = "%s"
   172  }
   173  
   174  resource "cloudstack_vpn_gateway" "foo" {
   175      vpc = "${cloudstack_vpc.foo.name}"
   176  }
   177  
   178  resource "cloudstack_vpn_gateway" "bar" {
   179      vpc = "${cloudstack_vpc.bar.name}"
   180  }
   181  
   182  resource "cloudstack_vpn_customer_gateway" "foo" {
   183      name = "terraform-foo"
   184      cidr = "${cloudstack_vpc.foo.cidr}"
   185      esp_policy = "aes256-sha1"
   186      gateway = "${cloudstack_vpn_gateway.foo.public_ip}"
   187      ike_policy = "aes256-sha1"
   188      ipsec_psk = "terraform"
   189  }
   190  
   191  resource "cloudstack_vpn_customer_gateway" "bar" {
   192      name = "terraform-bar"
   193      cidr = "${cloudstack_vpc.bar.cidr}"
   194      esp_policy = "aes256-sha1"
   195      gateway = "${cloudstack_vpn_gateway.bar.public_ip}"
   196      ike_policy = "aes256-sha1"
   197      ipsec_psk = "terraform"
   198  }`,
   199  	CLOUDSTACK_VPC_CIDR_1,
   200  	CLOUDSTACK_VPC_OFFERING,
   201  	CLOUDSTACK_ZONE,
   202  	CLOUDSTACK_VPC_CIDR_2,
   203  	CLOUDSTACK_VPC_OFFERING,
   204  	CLOUDSTACK_ZONE)
   205  
   206  var testAccCloudStackVPNCustomerGateway_update = fmt.Sprintf(`
   207  resource "cloudstack_vpn_customer_gateway" "foo" {
   208      name = "terraform-foo-bar"
   209      cidr = "${cloudstack_vpc.foo.cidr}"
   210      esp_policy = "3des-md5"
   211      gateway = "${cloudstack_vpn_gateway.foo.public_ip}"
   212      ike_policy = "3des-md5"
   213      ipsec_psk = "terraform"
   214  }
   215  
   216  resource "cloudstack_vpn_customer_gateway" "bar" {
   217      name = "terraform-bar-foo"
   218      cidr = "${cloudstack_vpc.bar.cidr}"
   219      esp_policy = "3des-md5"
   220      gateway = "${cloudstack_vpn_gateway.bar.public_ip}"
   221      ike_policy = "3des-md5"
   222      ipsec_psk = "terraform"
   223  }`)