Add 'aws_vpc_endpoint' data source. (#11323)
This commit is contained in:
parent
de329712cb
commit
c5f94d2999
|
@ -0,0 +1,103 @@
|
|||
package aws
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"log"
|
||||
|
||||
"github.com/aws/aws-sdk-go/aws"
|
||||
"github.com/aws/aws-sdk-go/service/ec2"
|
||||
"github.com/hashicorp/errwrap"
|
||||
"github.com/hashicorp/terraform/helper/schema"
|
||||
)
|
||||
|
||||
func dataSourceAwsVpcEndpoint() *schema.Resource {
|
||||
return &schema.Resource{
|
||||
Read: dataSourceAwsVpcEndpointRead,
|
||||
|
||||
Schema: map[string]*schema.Schema{
|
||||
"id": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
Computed: true,
|
||||
},
|
||||
"state": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
Computed: true,
|
||||
},
|
||||
"vpc_id": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
Computed: true,
|
||||
},
|
||||
"service_name": {
|
||||
Type: schema.TypeString,
|
||||
Optional: true,
|
||||
Computed: true,
|
||||
},
|
||||
"policy": {
|
||||
Type: schema.TypeString,
|
||||
Computed: true,
|
||||
},
|
||||
"route_table_ids": &schema.Schema{
|
||||
Type: schema.TypeSet,
|
||||
Computed: true,
|
||||
Elem: &schema.Schema{Type: schema.TypeString},
|
||||
Set: schema.HashString,
|
||||
},
|
||||
},
|
||||
}
|
||||
}
|
||||
|
||||
func dataSourceAwsVpcEndpointRead(d *schema.ResourceData, meta interface{}) error {
|
||||
conn := meta.(*AWSClient).ec2conn
|
||||
|
||||
log.Printf("[DEBUG] Reading VPC Endpoints.")
|
||||
|
||||
req := &ec2.DescribeVpcEndpointsInput{}
|
||||
|
||||
if id, ok := d.GetOk("id"); ok {
|
||||
req.VpcEndpointIds = aws.StringSlice([]string{id.(string)})
|
||||
}
|
||||
|
||||
req.Filters = buildEC2AttributeFilterList(
|
||||
map[string]string{
|
||||
"vpc-endpoint-state": d.Get("state").(string),
|
||||
"vpc-id": d.Get("vpc_id").(string),
|
||||
"service-name": d.Get("service_name").(string),
|
||||
},
|
||||
)
|
||||
if len(req.Filters) == 0 {
|
||||
// Don't send an empty filters list; the EC2 API won't accept it.
|
||||
req.Filters = nil
|
||||
}
|
||||
|
||||
resp, err := conn.DescribeVpcEndpoints(req)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
if resp == nil || len(resp.VpcEndpoints) == 0 {
|
||||
return fmt.Errorf("no matching VPC endpoint found")
|
||||
}
|
||||
if len(resp.VpcEndpoints) > 1 {
|
||||
return fmt.Errorf("multiple VPC endpoints matched; use additional constraints to reduce matches to a single VPC endpoint")
|
||||
}
|
||||
|
||||
vpce := resp.VpcEndpoints[0]
|
||||
policy, err := normalizeJsonString(*vpce.PolicyDocument)
|
||||
if err != nil {
|
||||
return errwrap.Wrapf("policy contains an invalid JSON: {{err}}", err)
|
||||
}
|
||||
|
||||
d.SetId(aws.StringValue(vpce.VpcEndpointId))
|
||||
d.Set("id", vpce.VpcEndpointId)
|
||||
d.Set("state", vpce.State)
|
||||
d.Set("vpc_id", vpce.VpcId)
|
||||
d.Set("service_name", vpce.ServiceName)
|
||||
d.Set("policy", policy)
|
||||
if err := d.Set("route_table_ids", aws.StringValueSlice(vpce.RouteTableIds)); err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
|
@ -0,0 +1,129 @@
|
|||
// make testacc TEST=./builtin/providers/aws/ TESTARGS='-run=TestAccDataSourceAwsVpcEndpoint_'
|
||||
package aws
|
||||
|
||||
import (
|
||||
"fmt"
|
||||
"testing"
|
||||
|
||||
"github.com/hashicorp/terraform/helper/resource"
|
||||
"github.com/hashicorp/terraform/terraform"
|
||||
)
|
||||
|
||||
func TestAccDataSourceAwsVpcEndpoint_basic(t *testing.T) {
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
resource.TestStep{
|
||||
Config: testAccDataSourceAwsVpcEndpointConfig,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
testAccDataSourceAwsVpcEndpointCheckExists("data.aws_vpc_endpoint.s3"),
|
||||
),
|
||||
ExpectNonEmptyPlan: true,
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func TestAccDataSourceAwsVpcEndpoint_withRouteTable(t *testing.T) {
|
||||
resource.Test(t, resource.TestCase{
|
||||
PreCheck: func() { testAccPreCheck(t) },
|
||||
Providers: testAccProviders,
|
||||
Steps: []resource.TestStep{
|
||||
resource.TestStep{
|
||||
Config: testAccDataSourceAwsVpcEndpointWithRouteTableConfig,
|
||||
Check: resource.ComposeTestCheckFunc(
|
||||
testAccDataSourceAwsVpcEndpointCheckExists("data.aws_vpc_endpoint.s3"),
|
||||
resource.TestCheckResourceAttr(
|
||||
"data.aws_vpc_endpoint.s3", "route_table_ids.#", "1"),
|
||||
),
|
||||
ExpectNonEmptyPlan: true,
|
||||
},
|
||||
},
|
||||
})
|
||||
}
|
||||
|
||||
func testAccDataSourceAwsVpcEndpointCheckExists(name string) resource.TestCheckFunc {
|
||||
return func(s *terraform.State) error {
|
||||
rs, ok := s.RootModule().Resources[name]
|
||||
if !ok {
|
||||
return fmt.Errorf("root module has no resource called %s", name)
|
||||
}
|
||||
|
||||
vpceRs, ok := s.RootModule().Resources["aws_vpc_endpoint.s3"]
|
||||
if !ok {
|
||||
return fmt.Errorf("can't find aws_vpc_endpoint.s3 in state")
|
||||
}
|
||||
|
||||
attr := rs.Primary.Attributes
|
||||
|
||||
if attr["id"] != vpceRs.Primary.Attributes["id"] {
|
||||
return fmt.Errorf(
|
||||
"id is %s; want %s",
|
||||
attr["id"],
|
||||
vpceRs.Primary.Attributes["id"],
|
||||
)
|
||||
}
|
||||
|
||||
return nil
|
||||
}
|
||||
}
|
||||
|
||||
const testAccDataSourceAwsVpcEndpointConfig = `
|
||||
provider "aws" {
|
||||
region = "us-west-2"
|
||||
}
|
||||
|
||||
resource "aws_vpc" "foo" {
|
||||
cidr_block = "10.1.0.0/16"
|
||||
|
||||
tags {
|
||||
Name = "terraform-testacc-vpc-endpoint-data-source-foo"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_vpc_endpoint" "s3" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
service_name = "com.amazonaws.us-west-2.s3"
|
||||
}
|
||||
|
||||
data "aws_vpc_endpoint" "s3" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
service_name = "com.amazonaws.us-west-2.s3"
|
||||
state = "available"
|
||||
|
||||
depends_on = ["aws_vpc_endpoint.s3"]
|
||||
}
|
||||
`
|
||||
|
||||
const testAccDataSourceAwsVpcEndpointWithRouteTableConfig = `
|
||||
provider "aws" {
|
||||
region = "us-west-2"
|
||||
}
|
||||
|
||||
resource "aws_vpc" "foo" {
|
||||
cidr_block = "10.1.0.0/16"
|
||||
|
||||
tags {
|
||||
Name = "terraform-testacc-vpc-endpoint-data-source-foo"
|
||||
}
|
||||
}
|
||||
|
||||
resource "aws_route_table" "rt" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
}
|
||||
|
||||
resource "aws_vpc_endpoint" "s3" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
service_name = "com.amazonaws.us-west-2.s3"
|
||||
route_table_ids = ["${aws_route_table.rt.id}"]
|
||||
}
|
||||
|
||||
data "aws_vpc_endpoint" "s3" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
service_name = "com.amazonaws.us-west-2.s3"
|
||||
state = "available"
|
||||
|
||||
depends_on = ["aws_vpc_endpoint.s3"]
|
||||
}
|
||||
`
|
|
@ -181,6 +181,7 @@ func Provider() terraform.ResourceProvider {
|
|||
"aws_subnet": dataSourceAwsSubnet(),
|
||||
"aws_security_group": dataSourceAwsSecurityGroup(),
|
||||
"aws_vpc": dataSourceAwsVpc(),
|
||||
"aws_vpc_endpoint": dataSourceAwsVpcEndpoint(),
|
||||
"aws_vpc_endpoint_service": dataSourceAwsVpcEndpointService(),
|
||||
"aws_vpc_peering_connection": dataSourceAwsVpcPeeringConnection(),
|
||||
},
|
||||
|
|
|
@ -0,0 +1,48 @@
|
|||
---
|
||||
layout: "aws"
|
||||
page_title: "AWS: aws_vpc_endpoint"
|
||||
sidebar_current: "docs-aws-datasource-vpc-endpoint"
|
||||
description: |-
|
||||
Provides details about a specific VPC endpoint.
|
||||
---
|
||||
|
||||
# aws\_vpc\_endpoint
|
||||
|
||||
The VPC Endpoint data source provides details about
|
||||
a specific VPC endpoint.
|
||||
|
||||
## Example Usage
|
||||
|
||||
```
|
||||
# Declare the data source
|
||||
data "aws_vpc_endpoint" "s3" {
|
||||
vpc_id = "${aws_vpc.foo.id}"
|
||||
service_name = "com.amazonaws.us-west-2.s3"
|
||||
}
|
||||
|
||||
resource "aws_vpc_endpoint_route_table_association" "private_s3" {
|
||||
vpc_endpoint_id = "${data.aws_vpc_endpoint.s3.id}"
|
||||
route_table_id = "${aws_route_table.private.id}"
|
||||
}
|
||||
```
|
||||
|
||||
## Argument Reference
|
||||
|
||||
The arguments of this data source act as filters for querying the available VPC endpoints.
|
||||
The given filters must match exactly one VPC endpoint whose data will be exported as attributes.
|
||||
|
||||
* `id` - (Optional) The ID of the specific VPC Endpoint to retrieve.
|
||||
|
||||
* `state` - (Optional) The state of the specific VPC Endpoint to retrieve.
|
||||
|
||||
* `vpc_id` - (Optional) The ID of the VPC in which the specific VPC Endpoint is used.
|
||||
|
||||
* `service_name` - (Optional) The AWS service name of the specific VPC Endpoint to retrieve.
|
||||
|
||||
## Attributes Reference
|
||||
|
||||
All of the argument attributes are also exported as result attributes.
|
||||
|
||||
* `policy` - The policy document associated with the VPC Endpoint.
|
||||
|
||||
* `route_table_ids` - One or more route tables associated with the VPC Endpoint.
|
|
@ -98,6 +98,9 @@
|
|||
<li<%= sidebar_current("docs-aws-datasource-vpc") %>>
|
||||
<a href="/docs/providers/aws/d/vpc.html">aws_vpc</a>
|
||||
</li>
|
||||
<li<%= sidebar_current("docs-aws-datasource-vpc-endpoint") %>>
|
||||
<a href="/docs/providers/aws/d/vpc_endpoint.html">aws_vpc_endpoint</a>
|
||||
</li>
|
||||
<li<%= sidebar_current("docs-aws-datasource-vpc-endpoint-service") %>>
|
||||
<a href="/docs/providers/aws/d/vpc_endpoint_service.html">aws_vpc_endpoint_service</a>
|
||||
</li>
|
||||
|
|
Loading…
Reference in New Issue