mirror of
https://github.com/letic/terraform-provider-google.git
synced 2024-07-09 03:28:29 +00:00
5ea227f7a0
Signed-off-by: Modular Magician <magic-modules@google.com>
120 lines
3.2 KiB
Go
120 lines
3.2 KiB
Go
package google
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/terraform/helper/acctest"
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
"strings"
|
|
)
|
|
|
|
func TestAccComputeBackendBucketSignedUrlKey_basic(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
context := map[string]interface{}{
|
|
"random_suffix": acctest.RandString(10),
|
|
}
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckComputeBackendBucketSignedUrlKeyDestroy,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: testAccComputeBackendBucketSignedUrlKey_basic(context),
|
|
Check: testAccCheckComputeBackendBucketSignedUrlKeyCreated,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccComputeBackendBucketSignedUrlKey_basic(context map[string]interface{}) string {
|
|
return Nprintf(`
|
|
resource "google_compute_backend_bucket_signed_url_key" "backend_key" {
|
|
name = "test-key-%{random_suffix}"
|
|
key_value = "iAmAFakeKeyRandomBytes=="
|
|
backend_bucket = "${google_compute_backend_bucket.test_backend.name}"
|
|
}
|
|
|
|
resource "google_compute_backend_bucket" "test_backend" {
|
|
name = "test-signed-backend-bucket-%{random_suffix}"
|
|
description = "Contains beautiful images"
|
|
bucket_name = "${google_storage_bucket.bucket.name}"
|
|
enable_cdn = true
|
|
}
|
|
|
|
resource "google_storage_bucket" "bucket" {
|
|
name = "test-storage-bucket-%{random_suffix}"
|
|
location = "EU"
|
|
}
|
|
`, context)
|
|
}
|
|
|
|
func testAccCheckComputeBackendBucketSignedUrlKeyDestroy(s *terraform.State) error {
|
|
exists, err := checkComputeBackendBucketSignedUrlKeyExists(s)
|
|
if err != nil && !isGoogleApiErrorWithCode(err, 404) {
|
|
return err
|
|
}
|
|
if exists {
|
|
return fmt.Errorf("ComputeBackendBucketSignedUrlKey still exists")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func testAccCheckComputeBackendBucketSignedUrlKeyCreated(s *terraform.State) error {
|
|
exists, err := checkComputeBackendBucketSignedUrlKeyExists(s)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if !exists {
|
|
return fmt.Errorf("expected ComputeBackendBucketSignedUrlKey to have been created")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func checkComputeBackendBucketSignedUrlKeyExists(s *terraform.State) (bool, error) {
|
|
for name, rs := range s.RootModule().Resources {
|
|
if rs.Type != "google_compute_backend_bucket_signed_url_key" {
|
|
continue
|
|
}
|
|
if strings.HasPrefix(name, "data.") {
|
|
continue
|
|
}
|
|
|
|
config := testAccProvider.Meta().(*Config)
|
|
keyName := rs.Primary.ID
|
|
|
|
url, err := replaceVarsForTest(rs, "https://www.googleapis.com/compute/v1/projects/{{project}}/global/backendBuckets/{{backend_bucket}}")
|
|
if err != nil {
|
|
return false, err
|
|
}
|
|
|
|
res, err := sendRequest(config, "GET", url, nil)
|
|
if err == nil {
|
|
policyRaw, ok := res["cdnPolicy"]
|
|
if !ok {
|
|
return false, nil
|
|
}
|
|
|
|
policy := policyRaw.(map[string]interface{})
|
|
keyNames, ok := policy["signedUrlKeyNames"]
|
|
if !ok {
|
|
return false, nil
|
|
}
|
|
|
|
// Because the sensitive key value is not returned, all we can do is verify a
|
|
// key with this name exists and assume the key value hasn't been changed.
|
|
for _, k := range keyNames.([]interface{}) {
|
|
if k.(string) == keyName {
|
|
// Just return empty map to indicate key was found
|
|
return true, nil
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return false, nil
|
|
}
|