terraform/builtin/providers/aws/resource_aws_vpc_peering_co...

164 lines
3.8 KiB
Go
Raw Normal View History

2015-02-12 10:45:29 +01:00
package aws
import (
"fmt"
"os"
2015-02-12 10:45:29 +01:00
"testing"
"github.com/aws/aws-sdk-go/aws"
"github.com/aws/aws-sdk-go/service/ec2"
2015-02-12 10:45:29 +01:00
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
)
func TestAccAWSVPCPeeringConnection_basic(t *testing.T) {
var connection ec2.VpcPeeringConnection
2015-02-12 10:45:29 +01:00
resource.Test(t, resource.TestCase{
PreCheck: func() {
testAccPreCheck(t)
if os.Getenv("AWS_ACCOUNT_ID") == "" {
t.Fatal("AWS_ACCOUNT_ID must be set")
}
},
2015-02-12 10:45:29 +01:00
Providers: testAccProviders,
CheckDestroy: testAccCheckAWSVpcPeeringConnectionDestroy,
Steps: []resource.TestStep{
resource.TestStep{
Config: testAccVpcPeeringConfig,
Check: resource.ComposeTestCheckFunc(
testAccCheckAWSVpcPeeringConnectionExists("aws_vpc_peering_connection.foo", &connection),
),
},
},
})
}
func TestAccAWSVPCPeeringConnection_tags(t *testing.T) {
var connection ec2.VpcPeeringConnection
2015-10-14 20:55:37 +02:00
peerId := os.Getenv("TF_PEER_ID")
2015-12-22 19:05:01 +01:00
if peerId == "" {
t.Skip("Error: TestAccAWSVPCPeeringConnection_tags requires a peer id to be set")
2015-12-22 19:05:01 +01:00
}
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckVpcDestroy,
Steps: []resource.TestStep{
resource.TestStep{
2015-10-14 20:55:37 +02:00
Config: fmt.Sprintf(testAccVpcPeeringConfigTags, peerId),
Check: resource.ComposeTestCheckFunc(
testAccCheckAWSVpcPeeringConnectionExists("aws_vpc_peering_connection.foo", &connection),
testAccCheckTags(&connection.Tags, "foo", "bar"),
2015-02-12 10:45:29 +01:00
),
},
},
})
}
func testAccCheckAWSVpcPeeringConnectionDestroy(s *terraform.State) error {
2015-04-16 22:05:55 +02:00
conn := testAccProvider.Meta().(*AWSClient).ec2conn
2015-02-12 10:45:29 +01:00
for _, rs := range s.RootModule().Resources {
if rs.Type != "aws_vpc_peering_connection" {
continue
}
describe, err := conn.DescribeVpcPeeringConnections(
&ec2.DescribeVpcPeeringConnectionsInput{
VpcPeeringConnectionIds: []*string{aws.String(rs.Primary.ID)},
})
2015-02-12 10:45:29 +01:00
if err != nil {
return err
}
var pc *ec2.VpcPeeringConnection
for _, c := range describe.VpcPeeringConnections {
if rs.Primary.ID == *c.VpcPeeringConnectionId {
pc = c
}
}
if pc == nil {
// not found
return nil
}
if pc.Status != nil {
if *pc.Status.Code == "deleted" {
return nil
2015-02-12 10:45:29 +01:00
}
return fmt.Errorf("Found vpc peering connection in unexpected state: %s", pc)
2015-02-12 10:45:29 +01:00
}
2015-02-12 10:45:29 +01:00
}
return fmt.Errorf("Fall through error for testAccCheckAWSVpcPeeringConnectionDestroy")
2015-02-12 10:45:29 +01:00
}
func testAccCheckAWSVpcPeeringConnectionExists(n string, connection *ec2.VpcPeeringConnection) resource.TestCheckFunc {
2015-02-12 10:45:29 +01:00
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No vpc peering connection id is set")
}
conn := testAccProvider.Meta().(*AWSClient).ec2conn
resp, err := conn.DescribeVpcPeeringConnections(
&ec2.DescribeVpcPeeringConnectionsInput{
VpcPeeringConnectionIds: []*string{aws.String(rs.Primary.ID)},
})
if err != nil {
return err
}
if len(resp.VpcPeeringConnections) == 0 {
return fmt.Errorf("VPC peering connection not found")
}
*connection = *resp.VpcPeeringConnections[0]
2015-02-12 10:45:29 +01:00
return nil
}
}
const testAccVpcPeeringConfig = `
resource "aws_vpc" "foo" {
cidr_block = "10.0.0.0/16"
2015-02-12 10:45:29 +01:00
}
resource "aws_vpc" "bar" {
cidr_block = "10.1.0.0/16"
2015-02-12 10:45:29 +01:00
}
resource "aws_vpc_peering_connection" "foo" {
vpc_id = "${aws_vpc.foo.id}"
peer_vpc_id = "${aws_vpc.bar.id}"
auto_accept = true
}
`
const testAccVpcPeeringConfigTags = `
resource "aws_vpc" "foo" {
cidr_block = "10.0.0.0/16"
}
resource "aws_vpc" "bar" {
cidr_block = "10.1.0.0/16"
}
resource "aws_vpc_peering_connection" "foo" {
vpc_id = "${aws_vpc.foo.id}"
peer_vpc_id = "${aws_vpc.bar.id}"
2015-10-14 20:55:37 +02:00
peer_owner_id = "%s"
tags {
foo = "bar"
}
2015-02-12 10:45:29 +01:00
}
`