package aws import ( "fmt" "testing" "github.com/awslabs/aws-sdk-go/aws" "github.com/awslabs/aws-sdk-go/service/ec2" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSRouteTable_normal(t *testing.T) { var v ec2.RouteTable testCheck := func(*terraform.State) error { if len(v.Routes) != 2 { return fmt.Errorf("bad routes: %#v", v.Routes) } routes := make(map[string]*ec2.Route) for _, r := range v.Routes { routes[*r.DestinationCIDRBlock] = r } if _, ok := routes["10.1.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } if _, ok := routes["10.2.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } return nil } testCheckChange := func(*terraform.State) error { if len(v.Routes) != 3 { return fmt.Errorf("bad routes: %#v", v.Routes) } routes := make(map[string]*ec2.Route) for _, r := range v.Routes { routes[*r.DestinationCIDRBlock] = r } if _, ok := routes["10.1.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } if _, ok := routes["10.3.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } if _, ok := routes["10.4.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } return nil } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckRouteTableDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRouteTableConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists( "aws_route_table.foo", &v), testCheck, ), }, resource.TestStep{ Config: testAccRouteTableConfigChange, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists( "aws_route_table.foo", &v), testCheckChange, ), }, }, }) } func TestAccAWSRouteTable_instance(t *testing.T) { var v ec2.RouteTable testCheck := func(*terraform.State) error { if len(v.Routes) != 2 { return fmt.Errorf("bad routes: %#v", v.Routes) } routes := make(map[string]*ec2.Route) for _, r := range v.Routes { routes[*r.DestinationCIDRBlock] = r } if _, ok := routes["10.1.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } if _, ok := routes["10.2.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } return nil } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckRouteTableDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRouteTableConfigInstance, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists( "aws_route_table.foo", &v), testCheck, ), }, }, }) } func TestAccAWSRouteTable_tags(t *testing.T) { var route_table ec2.RouteTable resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckRouteTableDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRouteTableConfigTags, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists("aws_route_table.foo", &route_table), testAccCheckTagsSDK(&route_table.Tags, "foo", "bar"), ), }, resource.TestStep{ Config: testAccRouteTableConfigTagsUpdate, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists("aws_route_table.foo", &route_table), testAccCheckTagsSDK(&route_table.Tags, "foo", ""), testAccCheckTagsSDK(&route_table.Tags, "bar", "baz"), ), }, }, }) } func testAccCheckRouteTableDestroy(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).ec2conn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_route_table" { continue } // Try to find the resource resp, err := conn.DescribeRouteTables(&ec2.DescribeRouteTablesInput{ RouteTableIDs: []*string{aws.String(rs.Primary.ID)}, }) if err == nil { if len(resp.RouteTables) > 0 { return fmt.Errorf("still exist.") } return nil } // Verify the error is what we want ec2err, ok := err.(aws.APIError) if !ok { return err } if ec2err.Code != "InvalidRouteTableID.NotFound" { return err } } return nil } func testAccCheckRouteTableExists(n string, v *ec2.RouteTable) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No ID is set") } conn := testAccProvider.Meta().(*AWSClient).ec2conn resp, err := conn.DescribeRouteTables(&ec2.DescribeRouteTablesInput{ RouteTableIDs: []*string{aws.String(rs.Primary.ID)}, }) if err != nil { return err } if len(resp.RouteTables) == 0 { return fmt.Errorf("RouteTable not found") } *v = *resp.RouteTables[0] return nil } } // TODO: re-enable this test. // VPC Peering connections are prefixed with pcx // Right now there is no VPC Peering resource func _TestAccAWSRouteTable_vpcPeering(t *testing.T) { var v ec2.RouteTable testCheck := func(*terraform.State) error { if len(v.Routes) != 2 { return fmt.Errorf("bad routes: %#v", v.Routes) } routes := make(map[string]*ec2.Route) for _, r := range v.Routes { routes[*r.DestinationCIDRBlock] = r } if _, ok := routes["10.1.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } if _, ok := routes["10.2.0.0/16"]; !ok { return fmt.Errorf("bad routes: %#v", v.Routes) } return nil } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckRouteTableDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRouteTableVpcPeeringConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists( "aws_route_table.foo", &v), testCheck, ), }, }, }) } func TestAccAWSRouteTable_vgwRoutePropagation(t *testing.T) { var v ec2.RouteTable var vgw ec2.VPNGateway testCheck := func(*terraform.State) error { if len(v.PropagatingVGWs) != 1 { return fmt.Errorf("bad propagating vgws: %#v", v.PropagatingVGWs) } propagatingVGWs := make(map[string]*ec2.PropagatingVGW) for _, gw := range v.PropagatingVGWs { propagatingVGWs[*gw.GatewayID] = gw } if _, ok := propagatingVGWs[*vgw.VPNGatewayID]; !ok { return fmt.Errorf("bad propagating vgws: %#v", v.PropagatingVGWs) } return nil } resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: resource.ComposeTestCheckFunc( testAccCheckVpnGatewayDestroy, testAccCheckRouteTableDestroy, ), Steps: []resource.TestStep{ resource.TestStep{ Config: testAccRouteTableVgwRoutePropagationConfig, Check: resource.ComposeTestCheckFunc( testAccCheckRouteTableExists( "aws_route_table.foo", &v), testAccCheckVpnGatewayExists( "aws_vpn_gateway.foo", &vgw), testCheck, ), }, }, }) } const testAccRouteTableConfig = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_internet_gateway" "foo" { vpc_id = "${aws_vpc.foo.id}" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" route { cidr_block = "10.2.0.0/16" gateway_id = "${aws_internet_gateway.foo.id}" } } ` const testAccRouteTableConfigChange = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_internet_gateway" "foo" { vpc_id = "${aws_vpc.foo.id}" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" route { cidr_block = "10.3.0.0/16" gateway_id = "${aws_internet_gateway.foo.id}" } route { cidr_block = "10.4.0.0/16" gateway_id = "${aws_internet_gateway.foo.id}" } } ` const testAccRouteTableConfigInstance = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_subnet" "foo" { cidr_block = "10.1.1.0/24" vpc_id = "${aws_vpc.foo.id}" } resource "aws_instance" "foo" { # us-west-2 ami = "ami-4fccb37f" instance_type = "m1.small" subnet_id = "${aws_subnet.foo.id}" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" route { cidr_block = "10.2.0.0/16" instance_id = "${aws_instance.foo.id}" } } ` const testAccRouteTableConfigTags = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" tags { foo = "bar" } } ` const testAccRouteTableConfigTagsUpdate = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" tags { bar = "baz" } } ` // TODO: re-enable this test. // VPC Peering connections are prefixed with pcx // Right now there is no VPC Peering resource const testAccRouteTableVpcPeeringConfig = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_internet_gateway" "foo" { vpc_id = "${aws_vpc.foo.id}" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" route { cidr_block = "10.2.0.0/16" vpc_peering_connection_id = "pcx-12345" } } ` const testAccRouteTableVgwRoutePropagationConfig = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_vpn_gateway" "foo" { vpc_id = "${aws_vpc.foo.id}" } resource "aws_route_table" "foo" { vpc_id = "${aws_vpc.foo.id}" propagating_vgws = ["${aws_vpn_gateway.foo.id}"] } `