package common import ( "io/ioutil" "os" "regexp" "testing" "github.com/hashicorp/packer/helper/communicator" ) func init() { // Clear out the AWS access key env vars so they don't // affect our tests. os.Setenv("AWS_ACCESS_KEY_ID", "") os.Setenv("AWS_ACCESS_KEY", "") os.Setenv("AWS_SECRET_ACCESS_KEY", "") os.Setenv("AWS_SECRET_KEY", "") } func testConfig() *RunConfig { return &RunConfig{ SourceAmi: "abcd", InstanceType: "m1.small", Comm: communicator.Config{ SSHUsername: "foo", }, } } func testConfigFilter() *RunConfig { config := testConfig() config.SourceAmi = "" config.SourceAmiFilter = AmiFilterOptions{} return config } func TestRunConfigPrepare(t *testing.T) { c := testConfig() err := c.Prepare(nil) if len(err) > 0 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_InstanceType(t *testing.T) { c := testConfig() c.InstanceType = "" if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_SourceAmi(t *testing.T) { c := testConfig() c.SourceAmi = "" if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_SourceAmiFilterBlank(t *testing.T) { c := testConfigFilter() if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_SourceAmiFilterGood(t *testing.T) { c := testConfigFilter() owner := "123" filter_key := "name" filter_value := "foo" goodFilter := AmiFilterOptions{Owners: []*string{&owner}, Filters: map[*string]*string{&filter_key: &filter_value}} c.SourceAmiFilter = goodFilter if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_EnableT2UnlimitedGood(t *testing.T) { c := testConfig() // Must have a T2 instance type if T2 Unlimited is enabled c.InstanceType = "t2.micro" c.EnableT2Unlimited = true err := c.Prepare(nil) if len(err) > 0 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_EnableT2UnlimitedBadInstanceType(t *testing.T) { c := testConfig() // T2 Unlimited cannot be used with instance types other than T2 c.InstanceType = "m5.large" c.EnableT2Unlimited = true err := c.Prepare(nil) if len(err) != 1 { t.Fatalf("T2 Unlimited should not work with non-T2 instance types") } } func TestRunConfigPrepare_EnableT2UnlimitedBadWithSpotInstanceRequest(t *testing.T) { c := testConfig() // T2 Unlimited cannot be used with Spot Instances c.InstanceType = "t2.micro" c.EnableT2Unlimited = true c.SpotPrice = "auto" c.SpotPriceAutoProduct = "Linux/UNIX" err := c.Prepare(nil) if len(err) != 1 { t.Fatalf("T2 Unlimited cannot be used in conjuntion with Spot Price requests") } } func TestRunConfigPrepare_SpotAuto(t *testing.T) { c := testConfig() c.SpotPrice = "auto" if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } c.SpotPriceAutoProduct = "foo" if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_SSHPort(t *testing.T) { c := testConfig() c.Comm.SSHPort = 0 if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } if c.Comm.SSHPort != 22 { t.Fatalf("invalid value: %d", c.Comm.SSHPort) } c.Comm.SSHPort = 44 if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } if c.Comm.SSHPort != 44 { t.Fatalf("invalid value: %d", c.Comm.SSHPort) } } func TestRunConfigPrepare_UserData(t *testing.T) { c := testConfig() tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("err: %s", err) } defer os.Remove(tf.Name()) defer tf.Close() c.UserData = "foo" c.UserDataFile = tf.Name() if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_UserDataFile(t *testing.T) { c := testConfig() if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } c.UserDataFile = "idontexistidontthink" if err := c.Prepare(nil); len(err) != 1 { t.Fatalf("err: %s", err) } tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("err: %s", err) } defer os.Remove(tf.Name()) defer tf.Close() c.UserDataFile = tf.Name() if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } } func TestRunConfigPrepare_TemporaryKeyPairName(t *testing.T) { c := testConfig() c.TemporaryKeyPairName = "" if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } if c.TemporaryKeyPairName == "" { t.Fatal("keypair name is empty") } // Match prefix and UUID, e.g. "packer_5790d491-a0b8-c84c-c9d2-2aea55086550". r := regexp.MustCompile(`\Apacker_(?:(?i)[a-f\d]{8}(?:-[a-f\d]{4}){3}-[a-f\d]{12}?)\z`) if !r.MatchString(c.TemporaryKeyPairName) { t.Fatal("keypair name is not valid") } c.TemporaryKeyPairName = "ssh-key-123" if err := c.Prepare(nil); len(err) != 0 { t.Fatalf("err: %s", err) } if c.TemporaryKeyPairName != "ssh-key-123" { t.Fatal("keypair name does not match") } }