2013-12-12 22:46:21 -05:00
|
|
|
package googlecompute
|
|
|
|
|
|
|
|
import (
|
2017-07-19 06:28:49 -04:00
|
|
|
"fmt"
|
2014-09-05 12:47:20 -04:00
|
|
|
"io/ioutil"
|
2018-04-30 15:36:48 -04:00
|
|
|
"os"
|
2020-05-06 17:28:22 -04:00
|
|
|
"runtime"
|
2015-07-07 18:18:31 -04:00
|
|
|
"strings"
|
2013-12-12 22:46:21 -05:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestConfigPrepare(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
Key string
|
|
|
|
Value interface{}
|
|
|
|
Err bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
"unknown_key",
|
|
|
|
"bad",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
"private_key_file",
|
|
|
|
"/tmp/i/should/not/exist",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
"project_id",
|
|
|
|
nil,
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"project_id",
|
|
|
|
"foo",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
"source_image",
|
|
|
|
nil,
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"source_image",
|
|
|
|
"foo",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
|
2016-11-13 10:53:45 -05:00
|
|
|
{
|
|
|
|
"source_image_family",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"source_image_family",
|
|
|
|
"foo",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
|
2013-12-12 22:46:21 -05:00
|
|
|
{
|
|
|
|
"zone",
|
|
|
|
nil,
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"zone",
|
|
|
|
"foo",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
"ssh_timeout",
|
|
|
|
"SO BAD",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"ssh_timeout",
|
|
|
|
"5s",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
|
|
|
"state_timeout",
|
|
|
|
"SO BAD",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"state_timeout",
|
|
|
|
"5s",
|
|
|
|
false,
|
|
|
|
},
|
2015-05-29 17:50:11 -04:00
|
|
|
{
|
|
|
|
"use_internal_ip",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"use_internal_ip",
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"use_internal_ip",
|
|
|
|
"SO VERY BAD",
|
|
|
|
true,
|
|
|
|
},
|
2017-02-10 13:58:57 -05:00
|
|
|
{
|
|
|
|
"on_host_maintenance",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"on_host_maintenance",
|
|
|
|
"TERMINATE",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"on_host_maintenance",
|
|
|
|
"SO VERY BAD",
|
2017-02-10 14:57:15 -05:00
|
|
|
true,
|
2017-02-10 13:58:57 -05:00
|
|
|
},
|
2015-12-05 00:17:42 -05:00
|
|
|
{
|
|
|
|
"preemptible",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"preemptible",
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"preemptible",
|
|
|
|
"SO VERY BAD",
|
|
|
|
true,
|
|
|
|
},
|
2016-05-06 07:43:39 -04:00
|
|
|
{
|
|
|
|
"image_family",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"image_family",
|
|
|
|
"",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"image_family",
|
|
|
|
"foo-bar",
|
|
|
|
false,
|
|
|
|
},
|
2016-05-06 08:39:55 -04:00
|
|
|
{
|
|
|
|
"image_family",
|
|
|
|
"foo bar",
|
|
|
|
true,
|
|
|
|
},
|
2019-09-16 13:18:22 -04:00
|
|
|
{
|
2019-09-16 16:50:43 -04:00
|
|
|
// underscore is not allowed
|
2019-09-16 13:18:22 -04:00
|
|
|
"image_name",
|
|
|
|
"foo_bar",
|
2019-09-16 16:50:43 -04:00
|
|
|
true,
|
2019-09-16 13:18:22 -04:00
|
|
|
},
|
|
|
|
{
|
|
|
|
// too long
|
|
|
|
"image_name",
|
|
|
|
"foobar123xyz_abc-456-one-two_three_five_nine_seventeen_eleventy-seven",
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
// starts with non-alphabetic character
|
|
|
|
"image_name",
|
|
|
|
"1boohoo",
|
|
|
|
true,
|
|
|
|
},
|
2019-04-23 14:49:41 -04:00
|
|
|
{
|
|
|
|
"image_encryption_key",
|
|
|
|
map[string]string{"kmsKeyName": "foo"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"image_encryption_key",
|
|
|
|
map[string]string{"No such key": "foo"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"image_encryption_key",
|
|
|
|
map[string]string{"kmsKeyName": "foo", "RawKey": "foo"},
|
|
|
|
false,
|
|
|
|
},
|
2016-10-22 01:45:33 -04:00
|
|
|
{
|
|
|
|
"scopes",
|
|
|
|
[]string{},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"scopes",
|
|
|
|
[]string{"https://www.googleapis.com/auth/userinfo.email", "https://www.googleapis.com/auth/compute", "https://www.googleapis.com/auth/devstorage.full_control", "https://www.googleapis.com/auth/sqlservice.admin"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"scopes",
|
|
|
|
[]string{"https://www.googleapis.com/auth/cloud-platform"},
|
|
|
|
false,
|
|
|
|
},
|
2018-03-07 18:35:01 -05:00
|
|
|
|
|
|
|
{
|
|
|
|
"disable_default_service_account",
|
|
|
|
"",
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"disable_default_service_account",
|
|
|
|
nil,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"disable_default_service_account",
|
|
|
|
false,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"disable_default_service_account",
|
|
|
|
true,
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
"disable_default_service_account",
|
|
|
|
"NOT A BOOL",
|
|
|
|
true,
|
|
|
|
},
|
2013-12-12 22:46:21 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
2013-12-12 22:46:21 -05:00
|
|
|
|
|
|
|
if tc.Value == nil {
|
|
|
|
delete(raw, tc.Key)
|
|
|
|
} else {
|
|
|
|
raw[tc.Key] = tc.Value
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
warns, errs := c.Prepare(raw)
|
2013-12-12 22:46:21 -05:00
|
|
|
|
|
|
|
if tc.Err {
|
|
|
|
testConfigErr(t, warns, errs, tc.Key)
|
|
|
|
} else {
|
|
|
|
testConfigOk(t, warns, errs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2014-09-05 12:47:20 -04:00
|
|
|
|
2017-07-19 06:28:49 -04:00
|
|
|
func TestConfigPrepareAccelerator(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
Keys []string
|
|
|
|
Values []interface{}
|
|
|
|
Err bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
[]string{"accelerator_count", "on_host_maintenance", "accelerator_type"},
|
|
|
|
[]interface{}{1, "MIGRATE", "something_valid"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"accelerator_count", "on_host_maintenance", "accelerator_type"},
|
|
|
|
[]interface{}{1, "TERMINATE", "something_valid"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"accelerator_count", "on_host_maintenance", "accelerator_type"},
|
|
|
|
[]interface{}{1, "TERMINATE", nil},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"accelerator_count", "on_host_maintenance", "accelerator_type"},
|
|
|
|
[]interface{}{1, "TERMINATE", ""},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"accelerator_count", "on_host_maintenance", "accelerator_type"},
|
|
|
|
[]interface{}{1, "TERMINATE", "something_valid"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
2017-07-19 06:28:49 -04:00
|
|
|
|
|
|
|
errStr := ""
|
|
|
|
for k := range tc.Keys {
|
|
|
|
|
|
|
|
// Create the string for error reporting
|
|
|
|
// convert value to string if it can be converted
|
|
|
|
errStr += fmt.Sprintf("%s:%v, ", tc.Keys[k], tc.Values[k])
|
|
|
|
if tc.Values[k] == nil {
|
|
|
|
delete(raw, tc.Keys[k])
|
|
|
|
} else {
|
|
|
|
raw[tc.Keys[k]] = tc.Values[k]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
warns, errs := c.Prepare(raw)
|
2017-07-19 06:28:49 -04:00
|
|
|
|
|
|
|
if tc.Err {
|
|
|
|
testConfigErr(t, warns, errs, strings.TrimRight(errStr, ", "))
|
|
|
|
} else {
|
|
|
|
testConfigOk(t, warns, errs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-03-13 15:36:14 -04:00
|
|
|
func TestConfigPrepareServiceAccount(t *testing.T) {
|
|
|
|
cases := []struct {
|
|
|
|
Keys []string
|
|
|
|
Values []interface{}
|
|
|
|
Err bool
|
|
|
|
}{
|
|
|
|
{
|
|
|
|
[]string{"disable_default_service_account", "service_account_email"},
|
|
|
|
[]interface{}{true, "service@account.email.com"},
|
|
|
|
true,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"disable_default_service_account", "service_account_email"},
|
|
|
|
[]interface{}{false, "service@account.email.com"},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
{
|
|
|
|
[]string{"disable_default_service_account", "service_account_email"},
|
|
|
|
[]interface{}{true, ""},
|
|
|
|
false,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
2018-03-13 15:36:14 -04:00
|
|
|
|
|
|
|
errStr := ""
|
|
|
|
for k := range tc.Keys {
|
|
|
|
|
|
|
|
// Create the string for error reporting
|
|
|
|
// convert value to string if it can be converted
|
|
|
|
errStr += fmt.Sprintf("%s:%v, ", tc.Keys[k], tc.Values[k])
|
|
|
|
if tc.Values[k] == nil {
|
|
|
|
delete(raw, tc.Keys[k])
|
|
|
|
} else {
|
|
|
|
raw[tc.Keys[k]] = tc.Values[k]
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
warns, errs := c.Prepare(raw)
|
2018-03-13 15:36:14 -04:00
|
|
|
|
|
|
|
if tc.Err {
|
|
|
|
testConfigErr(t, warns, errs, strings.TrimRight(errStr, ", "))
|
|
|
|
} else {
|
|
|
|
testConfigOk(t, warns, errs)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2018-10-15 00:41:38 -04:00
|
|
|
func TestConfigPrepareStartupScriptFile(t *testing.T) {
|
|
|
|
config := map[string]interface{}{
|
|
|
|
"project_id": "project",
|
|
|
|
"source_image": "foo",
|
|
|
|
"ssh_username": "packer",
|
|
|
|
"startup_script_file": "no-such-file",
|
|
|
|
"zone": "us-central1-a",
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
_, errs := c.Prepare(config)
|
2018-10-15 00:41:38 -04:00
|
|
|
|
|
|
|
if errs == nil || !strings.Contains(errs.Error(), "startup_script_file") {
|
|
|
|
t.Fatalf("should error: startup_script_file")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-04-24 17:11:00 -04:00
|
|
|
func TestConfigPrepareIAP(t *testing.T) {
|
|
|
|
config := map[string]interface{}{
|
2020-04-24 17:27:56 -04:00
|
|
|
"project_id": "project",
|
|
|
|
"source_image": "foo",
|
|
|
|
"ssh_username": "packer",
|
|
|
|
"zone": "us-central1-a",
|
|
|
|
"communicator": "ssh",
|
|
|
|
"use_iap": true,
|
2020-04-24 17:11:00 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
var c Config
|
2020-04-24 17:27:56 -04:00
|
|
|
_, err := c.Prepare(config)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("Shouldn't have errors. Err = %s", err)
|
|
|
|
}
|
2020-04-24 17:11:00 -04:00
|
|
|
|
2020-05-06 17:28:22 -04:00
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
if c.IAPExt != ".cmd" {
|
|
|
|
t.Fatalf("IAP tempfile extension didn't default correctly to .cmd")
|
|
|
|
}
|
2020-05-06 18:18:21 -04:00
|
|
|
if c.IAPHashBang != "" {
|
|
|
|
t.Fatalf("IAP hashbang didn't default correctly to nothing.")
|
|
|
|
}
|
2020-05-06 17:28:22 -04:00
|
|
|
} else {
|
|
|
|
if c.IAPExt != "" {
|
|
|
|
t.Fatalf("IAP tempfile extension should default to empty on unix mahcines")
|
|
|
|
}
|
2020-05-06 18:18:21 -04:00
|
|
|
if c.IAPHashBang != "/bin/sh" {
|
|
|
|
t.Fatalf("IAP hashbang didn't default correctly to /bin/sh.")
|
|
|
|
}
|
2020-04-24 17:11:00 -04:00
|
|
|
}
|
|
|
|
if c.Comm.SSHHost != "localhost" {
|
|
|
|
t.Fatalf("Didn't correctly override the ssh host.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestConfigPrepareIAP_failures(t *testing.T) {
|
|
|
|
config := map[string]interface{}{
|
2020-04-24 17:27:56 -04:00
|
|
|
"project_id": "project",
|
|
|
|
"source_image": "foo",
|
|
|
|
"winrm_username": "packer",
|
|
|
|
"zone": "us-central1-a",
|
|
|
|
"communicator": "winrm",
|
|
|
|
"iap_hashbang": "/bin/bash",
|
|
|
|
"iap_ext": ".ps1",
|
|
|
|
"use_iap": true,
|
2020-04-24 17:11:00 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
var c Config
|
|
|
|
_, errs := c.Prepare(config)
|
|
|
|
if errs == nil {
|
|
|
|
t.Fatalf("Should have errored because we're using winrm.")
|
|
|
|
}
|
|
|
|
if c.IAPHashBang != "/bin/bash" {
|
|
|
|
t.Fatalf("IAP hashbang defaulted even though set.")
|
|
|
|
}
|
|
|
|
if c.IAPExt != ".ps1" {
|
|
|
|
t.Fatalf("IAP tempfile defaulted even though set.")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-06-29 12:56:33 -04:00
|
|
|
func TestConfigDefaults(t *testing.T) {
|
|
|
|
cases := []struct {
|
2019-05-05 11:12:30 -04:00
|
|
|
Read func(c *Config) interface{}
|
2015-06-29 12:56:33 -04:00
|
|
|
Value interface{}
|
|
|
|
}{
|
|
|
|
{
|
2019-05-05 11:12:30 -04:00
|
|
|
func(c *Config) interface{} { return c.Comm.Type },
|
2015-06-29 12:56:33 -04:00
|
|
|
"ssh",
|
|
|
|
},
|
|
|
|
|
|
|
|
{
|
2019-05-05 11:12:30 -04:00
|
|
|
func(c *Config) interface{} { return c.Comm.SSHPort },
|
2015-06-29 12:56:33 -04:00
|
|
|
22,
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range cases {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
2015-06-29 12:56:33 -04:00
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
warns, errs := c.Prepare(raw)
|
2015-06-29 12:56:33 -04:00
|
|
|
testConfigOk(t, warns, errs)
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
actual := tc.Read(&c)
|
2015-06-29 12:56:33 -04:00
|
|
|
if actual != tc.Value {
|
|
|
|
t.Fatalf("bad: %#v", actual)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-07 18:18:31 -04:00
|
|
|
func TestImageName(t *testing.T) {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
c.Prepare(raw)
|
2016-01-19 14:12:19 -05:00
|
|
|
if !strings.HasPrefix(c.ImageName, "packer-") {
|
|
|
|
t.Fatalf("ImageName should have 'packer-' prefix, found %s", c.ImageName)
|
|
|
|
}
|
2015-07-07 18:18:31 -04:00
|
|
|
if strings.Contains(c.ImageName, "{{timestamp}}") {
|
|
|
|
t.Errorf("ImageName should be interpolated; found %s", c.ImageName)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-11 03:54:48 -05:00
|
|
|
func TestRegion(t *testing.T) {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
c.Prepare(raw)
|
2016-02-11 03:54:48 -05:00
|
|
|
if c.Region != "us-east1" {
|
|
|
|
t.Fatalf("Region should be 'us-east1' given Zone of 'us-east1-a', but is %s", c.Region)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-07-07 18:18:31 -04:00
|
|
|
// Helper stuff below
|
|
|
|
|
2018-04-30 15:36:48 -04:00
|
|
|
func testConfig(t *testing.T) (config map[string]interface{}, tempAccountFile string) {
|
|
|
|
tempAccountFile = testAccountFile(t)
|
|
|
|
|
|
|
|
config = map[string]interface{}{
|
|
|
|
"account_file": tempAccountFile,
|
2015-07-07 18:18:31 -04:00
|
|
|
"project_id": "hashicorp",
|
|
|
|
"source_image": "foo",
|
2016-11-15 16:06:15 -05:00
|
|
|
"ssh_username": "root",
|
2016-05-06 07:43:39 -04:00
|
|
|
"image_family": "bar",
|
2017-09-19 06:34:08 -04:00
|
|
|
"image_labels": map[string]string{
|
2017-09-19 06:31:05 -04:00
|
|
|
"label-1": "value-1",
|
|
|
|
"label-2": "value-2",
|
|
|
|
},
|
2017-12-18 15:51:39 -05:00
|
|
|
"image_licenses": []string{
|
|
|
|
"test-license",
|
|
|
|
},
|
2019-06-11 08:15:30 -04:00
|
|
|
"metadata_files": map[string]string{},
|
|
|
|
"zone": "us-east1-a",
|
2015-07-07 18:18:31 -04:00
|
|
|
}
|
2018-04-30 15:36:48 -04:00
|
|
|
|
|
|
|
return config, tempAccountFile
|
2015-07-07 18:18:31 -04:00
|
|
|
}
|
|
|
|
|
2019-05-05 11:12:30 -04:00
|
|
|
func testConfigStruct(t *testing.T) *Config {
|
2018-04-30 15:36:48 -04:00
|
|
|
raw, tempfile := testConfig(t)
|
|
|
|
defer os.Remove(tempfile)
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
var c Config
|
|
|
|
warns, errs := c.Prepare(raw)
|
2015-07-07 18:18:31 -04:00
|
|
|
if len(warns) > 0 {
|
|
|
|
t.Fatalf("bad: %#v", len(warns))
|
|
|
|
}
|
|
|
|
if errs != nil {
|
|
|
|
t.Fatalf("bad: %#v", errs)
|
|
|
|
}
|
|
|
|
|
2019-12-17 05:25:56 -05:00
|
|
|
return &c
|
2015-07-07 18:18:31 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
func testConfigErr(t *testing.T, warns []string, err error, extra string) {
|
|
|
|
if len(warns) > 0 {
|
|
|
|
t.Fatalf("bad: %#v", warns)
|
|
|
|
}
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("should error: %s", extra)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func testConfigOk(t *testing.T, warns []string, err error) {
|
|
|
|
if len(warns) > 0 {
|
|
|
|
t.Fatalf("bad: %#v", warns)
|
|
|
|
}
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("bad: %s", err)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-09-05 12:47:20 -04:00
|
|
|
func testAccountFile(t *testing.T) string {
|
|
|
|
tf, err := ioutil.TempFile("", "packer")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer tf.Close()
|
|
|
|
|
|
|
|
if _, err := tf.Write([]byte(testAccountContent)); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tf.Name()
|
|
|
|
}
|
|
|
|
|
2019-06-11 08:15:30 -04:00
|
|
|
const testMetadataFileContent = `testMetadata`
|
|
|
|
|
|
|
|
func testMetadataFile(t *testing.T) string {
|
|
|
|
tf, err := ioutil.TempFile("", "packer")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
defer tf.Close()
|
|
|
|
if _, err := tf.Write([]byte(testMetadataFileContent)); err != nil {
|
|
|
|
t.Fatalf("err: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return tf.Name()
|
|
|
|
}
|
|
|
|
|
2019-07-03 18:58:08 -04:00
|
|
|
// This is just some dummy data that doesn't actually work
|
|
|
|
const testAccountContent = `{
|
|
|
|
"type": "service_account",
|
|
|
|
"project_id": "test-project-123456789",
|
|
|
|
"private_key_id": "bananaphone",
|
|
|
|
"private_key": "-----BEGIN PRIVATE KEY-----\nring_ring_ring_ring_ring_ring_ring_BANANAPHONE\n-----END PRIVATE KEY-----\n",
|
|
|
|
"client_email": "raffi-compute@developer.gserviceaccount.com",
|
|
|
|
"client_id": "1234567890",
|
|
|
|
"auth_uri": "https://accounts.google.com/o/oauth2/auth",
|
|
|
|
"token_uri": "https://accounts.google.com/o/oauth2/token",
|
|
|
|
"auth_provider_x509_cert_url": "https://www.googleapis.com/oauth2/v1/certs",
|
|
|
|
"client_x509_cert_url": "https://www.googleapis.com/robot/v1/metadata/x509/12345-compute%40developer.gserviceaccount.com"
|
|
|
|
}`
|