mirror of
https://github.com/letic/terraform-provider-google.git
synced 2024-10-15 07:27:15 +00:00
218 lines
6.4 KiB
Go
218 lines
6.4 KiB
Go
package google
|
|
|
|
import (
|
|
"fmt"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/terraform/helper/acctest"
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
)
|
|
|
|
func TestAccComputeTargetSslProxy_basic(t *testing.T) {
|
|
target := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
sslPolicy := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
cert := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
backend := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
hc := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckComputeTargetSslProxyDestroy,
|
|
Steps: []resource.TestStep{
|
|
resource.TestStep{
|
|
Config: testAccComputeTargetSslProxy_basic1(target, sslPolicy, cert, backend, hc),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckComputeTargetSslProxy(
|
|
"google_compute_target_ssl_proxy.foobar", "NONE", cert),
|
|
),
|
|
},
|
|
resource.TestStep{
|
|
ResourceName: "google_compute_target_ssl_proxy.foobar",
|
|
ImportState: true,
|
|
ImportStateVerify: true,
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func TestAccComputeTargetSslProxy_update(t *testing.T) {
|
|
target := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
sslPolicy := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
cert1 := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
cert2 := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
backend1 := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
backend2 := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
hc := fmt.Sprintf("tssl-test-%s", acctest.RandString(10))
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckComputeTargetSslProxyDestroy,
|
|
Steps: []resource.TestStep{
|
|
resource.TestStep{
|
|
Config: testAccComputeTargetSslProxy_basic1(target, sslPolicy, cert1, backend1, hc),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckComputeTargetSslProxy(
|
|
"google_compute_target_ssl_proxy.foobar", "NONE", cert1),
|
|
),
|
|
},
|
|
resource.TestStep{
|
|
Config: testAccComputeTargetSslProxy_basic2(target, sslPolicy, cert1, cert2, backend1, backend2, hc),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckComputeTargetSslProxy(
|
|
"google_compute_target_ssl_proxy.foobar", "PROXY_V1", cert2),
|
|
),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccCheckComputeTargetSslProxyDestroy(s *terraform.State) error {
|
|
config := testAccProvider.Meta().(*Config)
|
|
|
|
for _, rs := range s.RootModule().Resources {
|
|
if rs.Type != "google_compute_target_ssl_proxy" {
|
|
continue
|
|
}
|
|
|
|
_, err := config.clientCompute.TargetSslProxies.Get(
|
|
config.Project, rs.Primary.ID).Do()
|
|
if err == nil {
|
|
return fmt.Errorf("TargetSslProxy still exists")
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func testAccCheckComputeTargetSslProxy(n, proxyHeader, sslCert string) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
rs, ok := s.RootModule().Resources[n]
|
|
if !ok {
|
|
return fmt.Errorf("Not found: %s", n)
|
|
}
|
|
|
|
if rs.Primary.ID == "" {
|
|
return fmt.Errorf("No ID is set")
|
|
}
|
|
|
|
config := testAccProvider.Meta().(*Config)
|
|
|
|
found, err := config.clientCompute.TargetSslProxies.Get(
|
|
config.Project, rs.Primary.ID).Do()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if found.Name != rs.Primary.ID {
|
|
return fmt.Errorf("TargetSslProxy not found")
|
|
}
|
|
|
|
if found.ProxyHeader != proxyHeader {
|
|
return fmt.Errorf("Wrong proxy header. Expected '%s', got '%s'", proxyHeader, found.ProxyHeader)
|
|
}
|
|
|
|
foundCertName := GetResourceNameFromSelfLink(found.SslCertificates[0])
|
|
if foundCertName != sslCert {
|
|
return fmt.Errorf("Wrong ssl certificates. Expected '%s', got '%s'", sslCert, foundCertName)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccComputeTargetSslProxy_basic1(target, sslPolicy, sslCert, backend, hc string) string {
|
|
return fmt.Sprintf(`
|
|
resource "google_compute_target_ssl_proxy" "foobar" {
|
|
description = "Resource created for Terraform acceptance testing"
|
|
name = "%s"
|
|
backend_service = "${google_compute_backend_service.foo.self_link}"
|
|
ssl_certificates = ["${google_compute_ssl_certificate.foo.self_link}"]
|
|
proxy_header = "NONE"
|
|
ssl_policy = "${google_compute_ssl_policy.foo.self_link}"
|
|
}
|
|
|
|
resource "google_compute_ssl_policy" "foo" {
|
|
name = "%s"
|
|
description = "Resource created for Terraform acceptance testing"
|
|
min_tls_version = "TLS_1_2"
|
|
profile = "MODERN"
|
|
}
|
|
|
|
resource "google_compute_ssl_certificate" "foo" {
|
|
name = "%s"
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
|
}
|
|
|
|
resource "google_compute_backend_service" "foo" {
|
|
name = "%s"
|
|
protocol = "SSL"
|
|
health_checks = ["${google_compute_health_check.zero.self_link}"]
|
|
}
|
|
|
|
resource "google_compute_health_check" "zero" {
|
|
name = "%s"
|
|
check_interval_sec = 1
|
|
timeout_sec = 1
|
|
tcp_health_check {
|
|
port = "443"
|
|
}
|
|
}
|
|
`, target, sslPolicy, sslCert, backend, hc)
|
|
}
|
|
|
|
func testAccComputeTargetSslProxy_basic2(target, sslPolicy, sslCert1, sslCert2, backend1, backend2, hc string) string {
|
|
return fmt.Sprintf(`
|
|
resource "google_compute_target_ssl_proxy" "foobar" {
|
|
description = "Resource created for Terraform acceptance testing"
|
|
name = "%s"
|
|
backend_service = "${google_compute_backend_service.bar.self_link}"
|
|
ssl_certificates = ["${google_compute_ssl_certificate.bar.name}"]
|
|
proxy_header = "PROXY_V1"
|
|
}
|
|
|
|
resource "google_compute_ssl_policy" "foo" {
|
|
name = "%s"
|
|
description = "Resource created for Terraform acceptance testing"
|
|
min_tls_version = "TLS_1_2"
|
|
profile = "MODERN"
|
|
}
|
|
|
|
resource "google_compute_ssl_certificate" "foo" {
|
|
name = "%s"
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
|
}
|
|
|
|
resource "google_compute_ssl_certificate" "bar" {
|
|
name = "%s"
|
|
private_key = "${file("test-fixtures/ssl_cert/test.key")}"
|
|
certificate = "${file("test-fixtures/ssl_cert/test.crt")}"
|
|
}
|
|
|
|
resource "google_compute_backend_service" "foo" {
|
|
name = "%s"
|
|
protocol = "SSL"
|
|
health_checks = ["${google_compute_health_check.zero.self_link}"]
|
|
}
|
|
|
|
resource "google_compute_backend_service" "bar" {
|
|
name = "%s"
|
|
protocol = "SSL"
|
|
health_checks = ["${google_compute_health_check.zero.self_link}"]
|
|
}
|
|
|
|
resource "google_compute_health_check" "zero" {
|
|
name = "%s"
|
|
check_interval_sec = 1
|
|
timeout_sec = 1
|
|
tcp_health_check {
|
|
port = "443"
|
|
}
|
|
}
|
|
`, target, sslPolicy, sslCert1, sslCert2, backend1, backend2, hc)
|
|
}
|