2015-11-02 19:32:07 +00:00
|
|
|
package google
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"testing"
|
|
|
|
|
2016-01-05 21:47:10 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/acctest"
|
2015-11-02 19:32:07 +00:00
|
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
2017-07-19 20:49:14 +00:00
|
|
|
"google.golang.org/api/compute/v1"
|
2015-11-02 19:32:07 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestAccComputeTargetHttpsProxy_basic(t *testing.T) {
|
2017-10-12 22:07:29 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
var proxy compute.TargetHttpsProxy
|
|
|
|
resourceSuffix := acctest.RandString(10)
|
2015-11-02 19:32:07 +00:00
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckComputeTargetHttpsProxyDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
2017-07-19 20:49:14 +00:00
|
|
|
Config: testAccComputeTargetHttpsProxy_basic1(resourceSuffix),
|
2015-11-02 19:32:07 +00:00
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckComputeTargetHttpsProxyExists(
|
2017-07-19 20:49:14 +00:00
|
|
|
"google_compute_target_https_proxy.foobar", &proxy),
|
|
|
|
testAccComputeTargetHttpsProxyDescription("Resource created for Terraform acceptance testing", &proxy),
|
|
|
|
testAccComputeTargetHttpsProxyHasSslCertificate("httpsproxy-test-cert1-"+resourceSuffix, &proxy),
|
2015-11-02 19:32:07 +00:00
|
|
|
),
|
|
|
|
},
|
2018-01-03 14:26:55 +00:00
|
|
|
resource.TestStep{
|
|
|
|
ResourceName: "google_compute_target_https_proxy.foobar",
|
|
|
|
ImportState: true,
|
|
|
|
ImportStateVerify: true,
|
|
|
|
},
|
2015-11-02 19:32:07 +00:00
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestAccComputeTargetHttpsProxy_update(t *testing.T) {
|
2017-10-12 22:07:29 +00:00
|
|
|
t.Parallel()
|
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
var proxy compute.TargetHttpsProxy
|
|
|
|
resourceSuffix := acctest.RandString(10)
|
2015-11-02 19:32:07 +00:00
|
|
|
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
|
|
Providers: testAccProviders,
|
|
|
|
CheckDestroy: testAccCheckComputeTargetHttpsProxyDestroy,
|
|
|
|
Steps: []resource.TestStep{
|
|
|
|
resource.TestStep{
|
2017-07-19 20:49:14 +00:00
|
|
|
Config: testAccComputeTargetHttpsProxy_basic1(resourceSuffix),
|
2015-11-02 19:32:07 +00:00
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckComputeTargetHttpsProxyExists(
|
2017-07-19 20:49:14 +00:00
|
|
|
"google_compute_target_https_proxy.foobar", &proxy),
|
|
|
|
testAccComputeTargetHttpsProxyDescription("Resource created for Terraform acceptance testing", &proxy),
|
|
|
|
testAccComputeTargetHttpsProxyHasSslCertificate("httpsproxy-test-cert1-"+resourceSuffix, &proxy),
|
2015-11-02 19:32:07 +00:00
|
|
|
),
|
|
|
|
},
|
|
|
|
|
|
|
|
resource.TestStep{
|
2017-07-19 20:49:14 +00:00
|
|
|
Config: testAccComputeTargetHttpsProxy_basic2(resourceSuffix),
|
2015-11-02 19:32:07 +00:00
|
|
|
Check: resource.ComposeTestCheckFunc(
|
|
|
|
testAccCheckComputeTargetHttpsProxyExists(
|
2017-07-19 20:49:14 +00:00
|
|
|
"google_compute_target_https_proxy.foobar", &proxy),
|
2018-01-30 22:41:20 +00:00
|
|
|
testAccComputeTargetHttpsProxyDescription("Resource created for Terraform acceptance testing", &proxy),
|
2017-07-19 20:49:14 +00:00
|
|
|
testAccComputeTargetHttpsProxyHasSslCertificate("httpsproxy-test-cert1-"+resourceSuffix, &proxy),
|
|
|
|
testAccComputeTargetHttpsProxyHasSslCertificate("httpsproxy-test-cert2-"+resourceSuffix, &proxy),
|
2015-11-02 19:32:07 +00:00
|
|
|
),
|
|
|
|
},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAccCheckComputeTargetHttpsProxyDestroy(s *terraform.State) error {
|
|
|
|
config := testAccProvider.Meta().(*Config)
|
|
|
|
|
|
|
|
for _, rs := range s.RootModule().Resources {
|
|
|
|
if rs.Type != "google_compute_target_https_proxy" {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err := config.clientCompute.TargetHttpsProxies.Get(
|
|
|
|
config.Project, rs.Primary.ID).Do()
|
|
|
|
if err == nil {
|
|
|
|
return fmt.Errorf("TargetHttpsProxy still exists")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
func testAccCheckComputeTargetHttpsProxyExists(n string, proxy *compute.TargetHttpsProxy) resource.TestCheckFunc {
|
2015-11-02 19:32:07 +00:00
|
|
|
return func(s *terraform.State) error {
|
|
|
|
rs, ok := s.RootModule().Resources[n]
|
|
|
|
if !ok {
|
|
|
|
return fmt.Errorf("Not found: %s", n)
|
|
|
|
}
|
|
|
|
|
|
|
|
if rs.Primary.ID == "" {
|
|
|
|
return fmt.Errorf("No ID is set")
|
|
|
|
}
|
|
|
|
|
|
|
|
config := testAccProvider.Meta().(*Config)
|
|
|
|
|
|
|
|
found, err := config.clientCompute.TargetHttpsProxies.Get(
|
|
|
|
config.Project, rs.Primary.ID).Do()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if found.Name != rs.Primary.ID {
|
|
|
|
return fmt.Errorf("TargetHttpsProxy not found")
|
|
|
|
}
|
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
*proxy = *found
|
|
|
|
|
2015-11-02 19:32:07 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
func testAccComputeTargetHttpsProxyDescription(description string, proxy *compute.TargetHttpsProxy) resource.TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
|
|
|
if proxy.Description != description {
|
|
|
|
return fmt.Errorf("Wrong description: expected '%s' got '%s'", description, proxy.Description)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAccComputeTargetHttpsProxyHasSslCertificate(cert string, proxy *compute.TargetHttpsProxy) resource.TestCheckFunc {
|
|
|
|
return func(s *terraform.State) error {
|
|
|
|
config := testAccProvider.Meta().(*Config)
|
|
|
|
certUrl := fmt.Sprintf(canonicalSslCertificateTemplate, config.Project, cert)
|
|
|
|
|
|
|
|
for _, sslCertificate := range proxy.SslCertificates {
|
|
|
|
if sslCertificate == certUrl {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return fmt.Errorf("Ssl certificate not found: expected'%s'", certUrl)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testAccComputeTargetHttpsProxy_basic1(id string) string {
|
|
|
|
return fmt.Sprintf(`
|
2015-11-02 19:32:07 +00:00
|
|
|
resource "google_compute_target_https_proxy" "foobar" {
|
|
|
|
description = "Resource created for Terraform acceptance testing"
|
2016-01-05 21:47:10 +00:00
|
|
|
name = "httpsproxy-test-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
url_map = "${google_compute_url_map.foobar.self_link}"
|
|
|
|
ssl_certificates = ["${google_compute_ssl_certificate.foobar1.self_link}"]
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_backend_service" "foobar" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-backend-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
health_checks = ["${google_compute_http_health_check.zero.self_link}"]
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_http_health_check" "zero" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-health-check-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
request_path = "/"
|
|
|
|
check_interval_sec = 1
|
|
|
|
timeout_sec = 1
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_url_map" "foobar" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-url-map-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
default_service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
host_rule {
|
|
|
|
hosts = ["mysite.com", "myothersite.com"]
|
|
|
|
path_matcher = "boop"
|
|
|
|
}
|
|
|
|
path_matcher {
|
|
|
|
default_service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
name = "boop"
|
|
|
|
path_rule {
|
|
|
|
paths = ["/*"]
|
|
|
|
service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
test {
|
|
|
|
host = "mysite.com"
|
|
|
|
path = "/*"
|
|
|
|
service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_ssl_certificate" "foobar1" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-cert1-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
description = "very descriptive"
|
2015-11-20 13:49:55 +00:00
|
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
2015-11-02 19:32:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_ssl_certificate" "foobar2" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-cert2-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
description = "very descriptive"
|
2015-11-20 13:49:55 +00:00
|
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
2015-11-02 19:32:07 +00:00
|
|
|
}
|
2017-07-19 20:49:14 +00:00
|
|
|
`, id, id, id, id, id, id)
|
|
|
|
}
|
2015-11-02 19:32:07 +00:00
|
|
|
|
2017-07-19 20:49:14 +00:00
|
|
|
func testAccComputeTargetHttpsProxy_basic2(id string) string {
|
|
|
|
return fmt.Sprintf(`
|
2015-11-02 19:32:07 +00:00
|
|
|
resource "google_compute_target_https_proxy" "foobar" {
|
2018-01-30 22:41:20 +00:00
|
|
|
description = "Resource created for Terraform acceptance testing"
|
2016-01-05 21:47:10 +00:00
|
|
|
name = "httpsproxy-test-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
url_map = "${google_compute_url_map.foobar.self_link}"
|
2017-07-19 20:49:14 +00:00
|
|
|
ssl_certificates = [
|
|
|
|
"${google_compute_ssl_certificate.foobar1.self_link}",
|
|
|
|
"${google_compute_ssl_certificate.foobar2.self_link}",
|
|
|
|
]
|
2015-11-02 19:32:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_backend_service" "foobar" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-backend-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
health_checks = ["${google_compute_http_health_check.zero.self_link}"]
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_http_health_check" "zero" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-health-check-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
request_path = "/"
|
|
|
|
check_interval_sec = 1
|
|
|
|
timeout_sec = 1
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_url_map" "foobar" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-url-map-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
default_service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
host_rule {
|
|
|
|
hosts = ["mysite.com", "myothersite.com"]
|
|
|
|
path_matcher = "boop"
|
|
|
|
}
|
|
|
|
path_matcher {
|
|
|
|
default_service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
name = "boop"
|
|
|
|
path_rule {
|
|
|
|
paths = ["/*"]
|
|
|
|
service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
test {
|
|
|
|
host = "mysite.com"
|
|
|
|
path = "/*"
|
|
|
|
service = "${google_compute_backend_service.foobar.self_link}"
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_ssl_certificate" "foobar1" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-cert1-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
description = "very descriptive"
|
2015-11-20 13:49:55 +00:00
|
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
2015-11-02 19:32:07 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
resource "google_compute_ssl_certificate" "foobar2" {
|
2017-07-19 20:49:14 +00:00
|
|
|
name = "httpsproxy-test-cert2-%s"
|
2015-11-02 19:32:07 +00:00
|
|
|
description = "very descriptive"
|
2015-11-20 13:49:55 +00:00
|
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
2015-11-02 19:32:07 +00:00
|
|
|
}
|
2017-07-19 20:49:14 +00:00
|
|
|
`, id, id, id, id, id, id)
|
|
|
|
}
|