package aws import ( "fmt" "testing" "github.com/aws/aws-sdk-go/aws" "github.com/aws/aws-sdk-go/service/ec2" "github.com/hashicorp/terraform/helper/resource" "github.com/hashicorp/terraform/terraform" ) func TestAccAWSVpcEndpoint_basic(t *testing.T) { var endpoint ec2.VPCEndpoint resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckVpcEndpointDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccVpcEndpointConfig, Check: resource.ComposeTestCheckFunc( testAccCheckVpcEndpointExists("aws_vpc_endpoint.private-s3", &endpoint), ), }, }, }) } func TestAccAWSVpcEndpoint_withRouteTableAndPolicy(t *testing.T) { var endpoint ec2.VPCEndpoint var routeTable ec2.RouteTable resource.Test(t, resource.TestCase{ PreCheck: func() { testAccPreCheck(t) }, Providers: testAccProviders, CheckDestroy: testAccCheckVpcEndpointDestroy, Steps: []resource.TestStep{ resource.TestStep{ Config: testAccVpcEndpointWithRouteTableAndPolicyConfig, Check: resource.ComposeTestCheckFunc( testAccCheckVpcEndpointExists("aws_vpc_endpoint.second-private-s3", &endpoint), testAccCheckRouteTableExists("aws_route_table.default", &routeTable), ), }, resource.TestStep{ Config: testAccVpcEndpointWithRouteTableAndPolicyConfigModified, Check: resource.ComposeTestCheckFunc( testAccCheckVpcEndpointExists("aws_vpc_endpoint.second-private-s3", &endpoint), testAccCheckRouteTableExists("aws_route_table.default", &routeTable), ), }, }, }) } func testAccCheckVpcEndpointDestroy(s *terraform.State) error { conn := testAccProvider.Meta().(*AWSClient).ec2conn for _, rs := range s.RootModule().Resources { if rs.Type != "aws_vpc_endpoint" { continue } // Try to find the VPC input := &ec2.DescribeVPCEndpointsInput{ VPCEndpointIDs: []*string{aws.String(rs.Primary.ID)}, } resp, err := conn.DescribeVPCEndpoints(input) if len(resp.VPCEndpoints) > 0 { return fmt.Errorf("VPC Endpoints still exist.") } return err } return nil } func testAccCheckVpcEndpointExists(n string, endpoint *ec2.VPCEndpoint) resource.TestCheckFunc { return func(s *terraform.State) error { rs, ok := s.RootModule().Resources[n] if !ok { return fmt.Errorf("Not found: %s", n) } if rs.Primary.ID == "" { return fmt.Errorf("No VPC Endpoint ID is set") } conn := testAccProvider.Meta().(*AWSClient).ec2conn input := &ec2.DescribeVPCEndpointsInput{ VPCEndpointIDs: []*string{aws.String(rs.Primary.ID)}, } resp, err := conn.DescribeVPCEndpoints(input) if err != nil { return err } if len(resp.VPCEndpoints) == 0 { return fmt.Errorf("VPC Endpoint not found") } *endpoint = *resp.VPCEndpoints[0] return nil } } const testAccVpcEndpointConfig = ` resource "aws_vpc" "foo" { cidr_block = "10.1.0.0/16" } resource "aws_vpc_endpoint" "private-s3" { vpc_id = "${aws_vpc.foo.id}" service_name = "com.amazonaws.us-west-2.s3" } ` const testAccVpcEndpointWithRouteTableAndPolicyConfig = ` resource "aws_vpc" "foo" { cidr_block = "10.0.0.0/16" } resource "aws_subnet" "foo" { vpc_id = "${aws_vpc.foo.id}" cidr_block = "10.0.1.0/24" } resource "aws_vpc_endpoint" "second-private-s3" { vpc_id = "${aws_vpc.foo.id}" service_name = "com.amazonaws.us-west-2.s3" route_table_ids = ["${aws_route_table.default.id}"] policy = <