terraform-provider-google/google/resource_compute_ssl_policy_test.go
The Magician 4af5438dc2 Remove outdated tests (superseded by generated ones) (#2836)
<!-- This change is generated by MagicModules. -->
/cc @rileykarson
2019-01-08 14:09:55 -08:00

223 lines
6.3 KiB
Go

package google
import (
"fmt"
"testing"
"github.com/hashicorp/terraform/helper/acctest"
"github.com/hashicorp/terraform/helper/resource"
"github.com/hashicorp/terraform/terraform"
compute "google.golang.org/api/compute/v1"
)
func TestAccComputeSslPolicy_update(t *testing.T) {
t.Parallel()
var sslPolicy compute.SslPolicy
sslPolicyName := fmt.Sprintf("test-ssl-policy-%s", acctest.RandString(10))
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckComputeSslPolicyDestroy,
Steps: []resource.TestStep{
{
Config: testAccComputeSslUpdate1(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "MODERN"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_0"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccComputeSslUpdate2(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "RESTRICTED"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_2"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func TestAccComputeSslPolicy_update_to_custom(t *testing.T) {
t.Parallel()
var sslPolicy compute.SslPolicy
sslPolicyName := fmt.Sprintf("test-ssl-policy-%s", acctest.RandString(10))
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckComputeSslPolicyDestroy,
Steps: []resource.TestStep{
{
Config: testAccComputeSslUpdate1(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "MODERN"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_0"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccComputeSslUpdate3(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "CUSTOM"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_1"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func TestAccComputeSslPolicy_update_from_custom(t *testing.T) {
t.Parallel()
var sslPolicy compute.SslPolicy
sslPolicyName := fmt.Sprintf("test-ssl-policy-%s", acctest.RandString(10))
resource.Test(t, resource.TestCase{
PreCheck: func() { testAccPreCheck(t) },
Providers: testAccProviders,
CheckDestroy: testAccCheckComputeSslPolicyDestroy,
Steps: []resource.TestStep{
{
Config: testAccComputeSslUpdate3(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "CUSTOM"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_1"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
{
Config: testAccComputeSslUpdate1(sslPolicyName),
Check: resource.ComposeTestCheckFunc(
testAccCheckComputeSslPolicyExists(
"google_compute_ssl_policy.update", &sslPolicy),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "profile", "MODERN"),
resource.TestCheckResourceAttr(
"google_compute_ssl_policy.update", "min_tls_version", "TLS_1_0"),
),
},
{
ResourceName: "google_compute_ssl_policy.update",
ImportState: true,
ImportStateVerify: true,
},
},
})
}
func testAccCheckComputeSslPolicyExists(n string, sslPolicy *compute.SslPolicy) resource.TestCheckFunc {
return func(s *terraform.State) error {
rs, ok := s.RootModule().Resources[n]
if !ok {
return fmt.Errorf("Not found: %s", n)
}
if rs.Primary.ID == "" {
return fmt.Errorf("No ID is set")
}
config := testAccProvider.Meta().(*Config)
project, err := getTestProject(rs.Primary, config)
if err != nil {
return err
}
name := rs.Primary.Attributes["name"]
found, err := config.clientCompute.SslPolicies.Get(
project, name).Do()
if err != nil {
return fmt.Errorf("Error Reading SSL Policy %s: %s", name, err)
}
if found.Name != rs.Primary.ID {
return fmt.Errorf("SSL Policy not found")
}
*sslPolicy = *found
return nil
}
}
func testAccComputeSslUpdate1(resourceName string) string {
return fmt.Sprintf(`
resource "google_compute_ssl_policy" "update" {
name = "%s"
description = "Generated by TF provider acceptance test"
min_tls_version = "TLS_1_0"
profile = "MODERN"
}
`, resourceName)
}
func testAccComputeSslUpdate2(resourceName string) string {
return fmt.Sprintf(`
resource "google_compute_ssl_policy" "update" {
name = "%s"
description = "Generated by TF provider acceptance test"
min_tls_version = "TLS_1_2"
profile = "RESTRICTED"
}
`, resourceName)
}
func testAccComputeSslUpdate3(resourceName string) string {
return fmt.Sprintf(`
resource "google_compute_ssl_policy" "update" {
name = "%s"
description = "Generated by TF provider acceptance test"
min_tls_version = "TLS_1_1"
profile = "CUSTOM"
custom_features = ["TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384", "TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384"]
}
`, resourceName)
}