github.com/recobe182/terraform@v0.8.5-0.20170117231232-49ab22a935b7/builtin/providers/aws/resource_aws_flow_log_test.go (about) 1 package aws 2 3 import ( 4 "fmt" 5 "testing" 6 7 "github.com/aws/aws-sdk-go/aws" 8 "github.com/aws/aws-sdk-go/service/ec2" 9 "github.com/hashicorp/terraform/helper/acctest" 10 "github.com/hashicorp/terraform/helper/resource" 11 "github.com/hashicorp/terraform/terraform" 12 ) 13 14 func TestAccAWSFlowLog_basic(t *testing.T) { 15 var flowLog ec2.FlowLog 16 17 fln := fmt.Sprintf("tf-test-fl-%d", acctest.RandInt()) 18 19 resource.Test(t, resource.TestCase{ 20 PreCheck: func() { testAccPreCheck(t) }, 21 IDRefreshName: "aws_flow_log.test_flow_log", 22 Providers: testAccProviders, 23 CheckDestroy: testAccCheckFlowLogDestroy, 24 Steps: []resource.TestStep{ 25 resource.TestStep{ 26 Config: testAccFlowLogConfig_basic(fln), 27 Check: resource.ComposeTestCheckFunc( 28 testAccCheckFlowLogExists("aws_flow_log.test_flow_log", &flowLog), 29 testAccCheckAWSFlowLogAttributes(&flowLog), 30 ), 31 }, 32 }, 33 }) 34 } 35 36 func TestAccAWSFlowLog_subnet(t *testing.T) { 37 var flowLog ec2.FlowLog 38 39 fln := fmt.Sprintf("tf-test-fl-%d", acctest.RandInt()) 40 41 resource.Test(t, resource.TestCase{ 42 PreCheck: func() { testAccPreCheck(t) }, 43 IDRefreshName: "aws_flow_log.test_flow_log_subnet", 44 Providers: testAccProviders, 45 CheckDestroy: testAccCheckFlowLogDestroy, 46 Steps: []resource.TestStep{ 47 resource.TestStep{ 48 Config: testAccFlowLogConfig_subnet(fln), 49 Check: resource.ComposeTestCheckFunc( 50 testAccCheckFlowLogExists("aws_flow_log.test_flow_log_subnet", &flowLog), 51 testAccCheckAWSFlowLogAttributes(&flowLog), 52 ), 53 }, 54 }, 55 }) 56 } 57 58 func testAccCheckFlowLogExists(n string, flowLog *ec2.FlowLog) resource.TestCheckFunc { 59 return func(s *terraform.State) error { 60 rs, ok := s.RootModule().Resources[n] 61 if !ok { 62 return fmt.Errorf("Not found: %s", n) 63 } 64 65 if rs.Primary.ID == "" { 66 return fmt.Errorf("No Flow Log ID is set") 67 } 68 69 conn := testAccProvider.Meta().(*AWSClient).ec2conn 70 describeOpts := &ec2.DescribeFlowLogsInput{ 71 FlowLogIds: []*string{aws.String(rs.Primary.ID)}, 72 } 73 resp, err := conn.DescribeFlowLogs(describeOpts) 74 if err != nil { 75 return err 76 } 77 78 if len(resp.FlowLogs) > 0 { 79 *flowLog = *resp.FlowLogs[0] 80 return nil 81 } 82 return fmt.Errorf("No Flow Logs found for id (%s)", rs.Primary.ID) 83 } 84 } 85 86 func testAccCheckAWSFlowLogAttributes(flowLog *ec2.FlowLog) resource.TestCheckFunc { 87 return func(s *terraform.State) error { 88 if flowLog.FlowLogStatus != nil && *flowLog.FlowLogStatus == "ACTIVE" { 89 return nil 90 } 91 if flowLog.FlowLogStatus == nil { 92 return fmt.Errorf("Flow Log status is not ACTIVE, is nil") 93 } else { 94 return fmt.Errorf("Flow Log status is not ACTIVE, got: %s", *flowLog.FlowLogStatus) 95 } 96 } 97 } 98 99 func testAccCheckFlowLogDestroy(s *terraform.State) error { 100 for _, rs := range s.RootModule().Resources { 101 if rs.Type != "aws_flow_log" { 102 continue 103 } 104 105 return nil 106 } 107 108 return nil 109 } 110 111 func testAccFlowLogConfig_basic(fln string) string { 112 return fmt.Sprintf(` 113 resource "aws_vpc" "default" { 114 cidr_block = "10.0.0.0/16" 115 tags { 116 Name = "tf-flow-log-test" 117 } 118 } 119 120 resource "aws_subnet" "test_subnet" { 121 vpc_id = "${aws_vpc.default.id}" 122 cidr_block = "10.0.1.0/24" 123 124 tags { 125 Name = "tf-flow-test" 126 } 127 } 128 129 resource "aws_iam_role" "test_role" { 130 name = "test_role" 131 assume_role_policy = <<EOF 132 { 133 "Version": "2012-10-17", 134 "Statement": [ 135 { 136 "Effect": "Allow", 137 "Principal": { 138 "Service": [ 139 "ec2.amazonaws.com" 140 ] 141 }, 142 "Action": [ 143 "sts:AssumeRole" 144 ] 145 } 146 ] 147 } 148 EOF 149 } 150 151 resource "aws_cloudwatch_log_group" "foobar" { 152 name = "%s" 153 } 154 resource "aws_flow_log" "test_flow_log" { 155 # log_group_name needs to exist before hand 156 # until we have a CloudWatch Log Group Resource 157 log_group_name = "tf-test-log-group" 158 iam_role_arn = "${aws_iam_role.test_role.arn}" 159 vpc_id = "${aws_vpc.default.id}" 160 traffic_type = "ALL" 161 } 162 163 resource "aws_flow_log" "test_flow_log_subnet" { 164 # log_group_name needs to exist before hand 165 # until we have a CloudWatch Log Group Resource 166 log_group_name = "${aws_cloudwatch_log_group.foobar.name}" 167 iam_role_arn = "${aws_iam_role.test_role.arn}" 168 subnet_id = "${aws_subnet.test_subnet.id}" 169 traffic_type = "ALL" 170 } 171 `, fln) 172 } 173 174 func testAccFlowLogConfig_subnet(fln string) string { 175 return fmt.Sprintf(` 176 resource "aws_vpc" "default" { 177 cidr_block = "10.0.0.0/16" 178 tags { 179 Name = "tf-flow-log-test" 180 } 181 } 182 183 resource "aws_subnet" "test_subnet" { 184 vpc_id = "${aws_vpc.default.id}" 185 cidr_block = "10.0.1.0/24" 186 187 tags { 188 Name = "tf-flow-test" 189 } 190 } 191 192 resource "aws_iam_role" "test_role" { 193 name = "test_role" 194 assume_role_policy = <<EOF 195 { 196 "Version": "2012-10-17", 197 "Statement": [ 198 { 199 "Effect": "Allow", 200 "Principal": { 201 "Service": [ 202 "ec2.amazonaws.com" 203 ] 204 }, 205 "Action": [ 206 "sts:AssumeRole" 207 ] 208 } 209 ] 210 } 211 EOF 212 } 213 resource "aws_cloudwatch_log_group" "foobar" { 214 name = "%s" 215 } 216 217 resource "aws_flow_log" "test_flow_log_subnet" { 218 # log_group_name needs to exist before hand 219 # until we have a CloudWatch Log Group Resource 220 log_group_name = "${aws_cloudwatch_log_group.foobar.name}" 221 iam_role_arn = "${aws_iam_role.test_role.arn}" 222 subnet_id = "${aws_subnet.test_subnet.id}" 223 traffic_type = "ALL" 224 } 225 `, fln) 226 }