package powershell import ( "bytes" "errors" "fmt" "io/ioutil" //"log" "os" "regexp" "strings" "testing" "time" "github.com/mitchellh/packer/packer" ) func testConfig() map[string]interface{} { return map[string]interface{}{ "inline": []interface{}{"foo", "bar"}, } } func init() { //log.SetOutput(ioutil.Discard) } func TestProvisionerPrepare_extractScript(t *testing.T) { config := testConfig() p := new(Provisioner) _ = p.Prepare(config) file, err := extractScript(p) if err != nil { t.Fatalf("Should not be error: %s", err) } t.Logf("File: %s", file) if strings.Index(file, os.TempDir()) != 0 { t.Fatalf("Temp file should reside in %s. File location: %s", os.TempDir(), file) } // File contents should contain 2 lines concatenated by newlines: foo\nbar readFile, err := ioutil.ReadFile(file) expectedContents := "foo\nbar\n" s := string(readFile[:]) if s != expectedContents { t.Fatalf("Expected generated inlineScript to equal '%s', got '%s'", expectedContents, s) } } func TestProvisioner_Impl(t *testing.T) { var raw interface{} raw = &Provisioner{} if _, ok := raw.(packer.Provisioner); !ok { t.Fatalf("must be a Provisioner") } } func TestProvisionerPrepare_Defaults(t *testing.T) { var p Provisioner config := testConfig() err := p.Prepare(config) if err != nil { t.Fatalf("err: %s", err) } if p.config.RemotePath != DefaultRemotePath { t.Errorf("unexpected remote path: %s", p.config.RemotePath) } if p.config.ElevatedUser != "" { t.Error("expected elevated_user to be empty") } if p.config.ElevatedPassword != "" { t.Error("expected elevated_password to be empty") } if p.config.ExecuteCommand != `{{.Vars}}{{.Path}}` { t.Fatalf("Default command should be '{{.Vars}}{{.Path}}', but got %s", p.config.ExecuteCommand) } if p.config.ElevatedExecuteCommand != `{{.Vars}}{{.Path}}'` { t.Fatalf("Default command should be '{{.Vars}}{{.Path}}', but got %s", p.config.ElevatedExecuteCommand) } if p.config.ValidExitCodes == nil { t.Fatalf("ValidExitCodes should not be nil") } if p.config.ValidExitCodes != nil { expCodes := []int{0} for i, v := range p.config.ValidExitCodes { if v != expCodes[i] { t.Fatalf("Expected ValidExitCodes don't match actual") } } } if p.config.ElevatedEnvVarFormat != `$env:%s="%s"; ` { t.Fatalf(`Default command should be powershell '$env:%%s="%%s"; ', but got %s`, p.config.ElevatedEnvVarFormat) } } func TestProvisionerPrepare_Config(t *testing.T) { config := testConfig() config["elevated_user"] = "{{user `user`}}" config["elevated_password"] = "{{user `password`}}" config[packer.UserVariablesConfigKey] = map[string]string{ "user": "myusername", "password": "mypassword", } var p Provisioner err := p.Prepare(config) if err != nil { t.Fatalf("err: %s", err) } if p.config.ElevatedUser != "myusername" { t.Fatalf("Expected 'myusername' for key `elevated_user`: %s", p.config.ElevatedUser) } if p.config.ElevatedPassword != "mypassword" { t.Fatalf("Expected 'mypassword' for key `elevated_password`: %s", p.config.ElevatedPassword) } } func TestProvisionerPrepare_InvalidKey(t *testing.T) { var p Provisioner config := testConfig() // Add a random key config["i_should_not_be_valid"] = true err := p.Prepare(config) if err == nil { t.Fatal("should have error") } } func TestProvisionerPrepare_Elevated(t *testing.T) { var p Provisioner config := testConfig() // Add a random key config["elevated_user"] = "vagrant" err := p.Prepare(config) if err == nil { t.Fatal("should have error (only provided elevated_user)") } config["elevated_password"] = "vagrant" err = p.Prepare(config) if err != nil { t.Fatal("should not have error") } } func TestProvisionerPrepare_Script(t *testing.T) { config := testConfig() delete(config, "inline") config["script"] = "/this/should/not/exist" p := new(Provisioner) err := p.Prepare(config) if err == nil { t.Fatal("should have error") } // Test with a good one tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("error tempfile: %s", err) } defer os.Remove(tf.Name()) config["script"] = tf.Name() p = new(Provisioner) err = p.Prepare(config) if err != nil { t.Fatalf("should not have error: %s", err) } } func TestProvisionerPrepare_ScriptAndInline(t *testing.T) { var p Provisioner config := testConfig() delete(config, "inline") delete(config, "script") err := p.Prepare(config) if err == nil { t.Fatal("should have error") } // Test with both tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("error tempfile: %s", err) } defer os.Remove(tf.Name()) config["inline"] = []interface{}{"foo"} config["script"] = tf.Name() err = p.Prepare(config) if err == nil { t.Fatal("should have error") } } func TestProvisionerPrepare_ScriptAndScripts(t *testing.T) { var p Provisioner config := testConfig() // Test with both tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("error tempfile: %s", err) } defer os.Remove(tf.Name()) config["inline"] = []interface{}{"foo"} config["scripts"] = []string{tf.Name()} err = p.Prepare(config) if err == nil { t.Fatal("should have error") } } func TestProvisionerPrepare_Scripts(t *testing.T) { config := testConfig() delete(config, "inline") config["scripts"] = []string{} p := new(Provisioner) err := p.Prepare(config) if err == nil { t.Fatal("should have error") } // Test with a good one tf, err := ioutil.TempFile("", "packer") if err != nil { t.Fatalf("error tempfile: %s", err) } defer os.Remove(tf.Name()) config["scripts"] = []string{tf.Name()} p = new(Provisioner) err = p.Prepare(config) if err != nil { t.Fatalf("should not have error: %s", err) } } func TestProvisionerPrepare_EnvironmentVars(t *testing.T) { config := testConfig() // Test with a bad case config["environment_vars"] = []string{"badvar", "good=var"} p := new(Provisioner) err := p.Prepare(config) if err == nil { t.Fatal("should have error") } // Test with a trickier case config["environment_vars"] = []string{"=bad"} p = new(Provisioner) err = p.Prepare(config) if err == nil { t.Fatal("should have error") } // Test with a good case // Note: baz= is a real env variable, just empty config["environment_vars"] = []string{"FOO=bar", "baz="} p = new(Provisioner) err = p.Prepare(config) if err != nil { t.Fatalf("should not have error: %s", err) } } func TestProvisionerQuote_EnvironmentVars(t *testing.T) { config := testConfig() config["environment_vars"] = []string{"keyone=valueone", "keytwo=value\ntwo", "keythree='valuethree'", "keyfour='value\nfour'"} p := new(Provisioner) p.Prepare(config) expectedValue := "keyone=valueone" if p.config.Vars[0] != expectedValue { t.Fatalf("%s should be equal to %s", p.config.Vars[0], expectedValue) } expectedValue = "keytwo=value\ntwo" if p.config.Vars[1] != expectedValue { t.Fatalf("%s should be equal to %s", p.config.Vars[1], expectedValue) } expectedValue = "keythree='valuethree'" if p.config.Vars[2] != expectedValue { t.Fatalf("%s should be equal to %s", p.config.Vars[2], expectedValue) } expectedValue = "keyfour='value\nfour'" if p.config.Vars[3] != expectedValue { t.Fatalf("%s should be equal to %s", p.config.Vars[3], expectedValue) } } func testUi() *packer.BasicUi { return &packer.BasicUi{ Reader: new(bytes.Buffer), Writer: new(bytes.Buffer), ErrorWriter: new(bytes.Buffer), } } func testObjects() (packer.Ui, packer.Communicator) { ui := testUi() return ui, new(packer.MockCommunicator) } func TestProvisionerProvision_ValidExitCodes(t *testing.T) { config := testConfig() delete(config, "inline") // Defaults provided by Packer config["remote_path"] = "c:/Windows/Temp/inlineScript.bat" config["inline"] = []string{"whoami"} ui := testUi() p := new(Provisioner) // Defaults provided by Packer p.config.PackerBuildName = "vmware" p.config.PackerBuilderType = "iso" p.config.ValidExitCodes = []int{0, 200} comm := new(packer.MockCommunicator) comm.StartExitStatus = 200 p.Prepare(config) err := p.Provision(ui, comm) if err != nil { t.Fatal("should not have error") } } func TestProvisionerProvision_InvalidExitCodes(t *testing.T) { config := testConfig() delete(config, "inline") // Defaults provided by Packer config["remote_path"] = "c:/Windows/Temp/inlineScript.bat" config["inline"] = []string{"whoami"} ui := testUi() p := new(Provisioner) // Defaults provided by Packer p.config.PackerBuildName = "vmware" p.config.PackerBuilderType = "iso" p.config.ValidExitCodes = []int{0, 200} comm := new(packer.MockCommunicator) comm.StartExitStatus = 201 // Invalid! p.Prepare(config) err := p.Provision(ui, comm) if err == nil { t.Fatal("should have error") } } func TestProvisionerProvision_Inline(t *testing.T) { config := testConfig() delete(config, "inline") // Defaults provided by Packer config["remote_path"] = "c:/Windows/Temp/inlineScript.bat" config["inline"] = []string{"whoami"} ui := testUi() p := new(Provisioner) // Defaults provided by Packer p.config.PackerBuildName = "vmware" p.config.PackerBuilderType = "iso" comm := new(packer.MockCommunicator) p.Prepare(config) err := p.Provision(ui, comm) if err != nil { t.Fatal("should not have error") } expectedCommand := `if (Test-Path variable:global:ProgressPreference){$ProgressPreference="SilentlyContinue"}; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; c:/Windows/Temp/inlineScript.bat; exit $LastExitCode` expectedCommandUtf8, err := powershellUtf8(expectedCommand) if err != nil { t.Fatal("should not have error when Utf 8 encoding") } expectedCommandBase64Encoded := `aWYgKFRlc3QtUGF0aCB2YXJpYWJsZTpnbG9iYWw6UHJvZ3Jlc3NQcmVmZXJlbmNlKXskUHJvZ3Jlc3NQcmVmZXJlbmNlPSJTaWxlbnRseUNvbnRpbnVlIn07ICRlbnY6UEFDS0VSX0JVSUxERVJfVFlQRT0iaXNvIjsgJGVudjpQQUNLRVJfQlVJTERfTkFNRT0idm13YXJlIjsgYzovV2luZG93cy9UZW1wL2lubGluZVNjcmlwdC5iYXQ7IGV4aXQgJExhc3RFeGl0Q29kZQ==` expectedCommandPrefix := `powershell -executionpolicy bypass -encodedCommand ` expectedCommandEncoded := expectedCommandPrefix + expectedCommandBase64Encoded actualCommandWithoutPrefix := strings.Replace(comm.StartCmd.Command, expectedCommandPrefix, "", -1) actualCommandDecoded, err := powershellDecode(actualCommandWithoutPrefix) if err != nil { t.Fatal("should not have error when base64 decoding") } // Should run the command without alteration if comm.StartCmd.Command != expectedCommandEncoded { t.Fatalf("Expect command to be: %s, got %s.", expectedCommandEncoded, comm.StartCmd.Command) } if actualCommandDecoded != expectedCommandUtf8 { t.Fatalf("Expected decoded:%s, %s, got %s", expectedCommandEncoded, len(expectedCommandUtf8), len(actualCommandDecoded)) } envVars := make([]string, 2) envVars[0] = "FOO=BAR" envVars[1] = "BAR=BAZ" config["environment_vars"] = envVars config["remote_path"] = "c:/Windows/Temp/inlineScript.bat" p.Prepare(config) err = p.Provision(ui, comm) if err != nil { t.Fatal("should not have error") } expectedCommand = `if (Test-Path variable:global:ProgressPreference){$ProgressPreference="SilentlyContinue"}; $env:BAR="BAZ"; $env:FOO="BAR"; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; c:/Windows/Temp/inlineScript.bat; exit $LastExitCode` expectedCommandUtf8, err = powershellUtf8(expectedCommand) if err != nil { t.Fatal("should not have error when Utf 8 encoding") } expectedCommandBase64Encoded = `aWYgKFRlc3QtUGF0aCB2YXJpYWJsZTpnbG9iYWw6UHJvZ3Jlc3NQcmVmZXJlbmNlKXskUHJvZ3Jlc3NQcmVmZXJlbmNlPSJTaWxlbnRseUNvbnRpbnVlIn07ICRlbnY6QkFSPSJCQVoiOyAkZW52OkZPTz0iQkFSIjsgJGVudjpQQUNLRVJfQlVJTERFUl9UWVBFPSJpc28iOyAkZW52OlBBQ0tFUl9CVUlMRF9OQU1FPSJ2bXdhcmUiOyBjOi9XaW5kb3dzL1RlbXAvaW5saW5lU2NyaXB0LmJhdDsgZXhpdCAkTGFzdEV4aXRDb2Rl` expectedCommandPrefix = `powershell -executionpolicy bypass -encodedCommand ` expectedCommandEncoded = expectedCommandPrefix + expectedCommandBase64Encoded actualCommandWithoutPrefix = strings.Replace(comm.StartCmd.Command, expectedCommandPrefix, "", -1) actualCommandDecoded, err = powershellDecode(actualCommandWithoutPrefix) if err != nil { t.Fatal("should not have error when base64 decoding") } // Should run the command without alteration if comm.StartCmd.Command != expectedCommandEncoded { t.Fatalf("Expect command to be: %s, got %s.", expectedCommandEncoded, comm.StartCmd.Command) } if actualCommandDecoded != expectedCommandUtf8 { t.Fatalf("Expected decoded: %s, got %s", expectedCommandUtf8, actualCommandDecoded) } } func TestProvisionerProvision_Scripts(t *testing.T) { tempFile, _ := ioutil.TempFile("", "packer") defer os.Remove(tempFile.Name()) config := testConfig() delete(config, "inline") config["scripts"] = []string{tempFile.Name()} config["packer_build_name"] = "foobuild" config["packer_builder_type"] = "footype" ui := testUi() p := new(Provisioner) comm := new(packer.MockCommunicator) p.Prepare(config) err := p.Provision(ui, comm) if err != nil { t.Fatal("should not have error") } expectedCommand := `if (Test-Path variable:global:ProgressPreference){$ProgressPreference="SilentlyContinue"}; $env:PACKER_BUILDER_TYPE="footype"; $env:PACKER_BUILD_NAME="foobuild"; c:/Windows/Temp/script.ps1; exit $LastExitCode` expectedCommandUtf8, err := powershellUtf8(expectedCommand) if err != nil { t.Fatal("should not have error when Utf 8 encoding") } expectedCommandBase64Encoded := `aWYgKFRlc3QtUGF0aCB2YXJpYWJsZTpnbG9iYWw6UHJvZ3Jlc3NQcmVmZXJlbmNlKXskUHJvZ3Jlc3NQcmVmZXJlbmNlPSJTaWxlbnRseUNvbnRpbnVlIn07ICRlbnY6UEFDS0VSX0JVSUxERVJfVFlQRT0iZm9vdHlwZSI7ICRlbnY6UEFDS0VSX0JVSUxEX05BTUU9ImZvb2J1aWxkIjsgYzovV2luZG93cy9UZW1wL3NjcmlwdC5wczE7IGV4aXQgJExhc3RFeGl0Q29kZQ==` expectedCommandPrefix := `powershell -executionpolicy bypass -encodedCommand ` expectedCommandEncoded := expectedCommandPrefix + expectedCommandBase64Encoded actualCommandWithoutPrefix := strings.Replace(comm.StartCmd.Command, expectedCommandPrefix, "", -1) actualCommandDecoded, err := powershellDecode(actualCommandWithoutPrefix) if err != nil { t.Fatal("should not have error when base64 decoding") } // Should run the command without alteration if comm.StartCmd.Command != expectedCommandEncoded { t.Fatalf("Expect command to be: %s, got %s.", expectedCommandEncoded, comm.StartCmd.Command) } if actualCommandDecoded != expectedCommandUtf8 { t.Fatalf("Expected decoded: %n, got %n", len(expectedCommandUtf8), len(actualCommandDecoded)) } } func TestProvisionerProvision_ScriptsWithEnvVars(t *testing.T) { tempFile, _ := ioutil.TempFile("", "packer") config := testConfig() ui := testUi() defer os.Remove(tempFile.Name()) delete(config, "inline") config["scripts"] = []string{tempFile.Name()} config["packer_build_name"] = "foobuild" config["packer_builder_type"] = "footype" // Env vars - currently should not effect them envVars := make([]string, 2) envVars[0] = "FOO=BAR" envVars[1] = "BAR=BAZ" config["environment_vars"] = envVars p := new(Provisioner) comm := new(packer.MockCommunicator) p.Prepare(config) err := p.Provision(ui, comm) if err != nil { t.Fatal("should not have error") } expectedCommand := `if (Test-Path variable:global:ProgressPreference){$ProgressPreference="SilentlyContinue"}; $env:BAR="BAZ"; $env:FOO="BAR"; $env:PACKER_BUILDER_TYPE="footype"; $env:PACKER_BUILD_NAME="foobuild"; c:/Windows/Temp/script.ps1; exit $LastExitCode` expectedCommandUtf8, err := powershellUtf8(expectedCommand) if err != nil { t.Fatal("should not have error when Utf 8 encoding") } expectedCommandBase64Encoded := `aWYgKFRlc3QtUGF0aCB2YXJpYWJsZTpnbG9iYWw6UHJvZ3Jlc3NQcmVmZXJlbmNlKXskUHJvZ3Jlc3NQcmVmZXJlbmNlPSJTaWxlbnRseUNvbnRpbnVlIn07ICRlbnY6QkFSPSJCQVoiOyAkZW52OkZPTz0iQkFSIjsgJGVudjpQQUNLRVJfQlVJTERFUl9UWVBFPSJmb290eXBlIjsgJGVudjpQQUNLRVJfQlVJTERfTkFNRT0iZm9vYnVpbGQiOyBjOi9XaW5kb3dzL1RlbXAvc2NyaXB0LnBzMTsgZXhpdCAkTGFzdEV4aXRDb2Rl` expectedCommandPrefix := `powershell -executionpolicy bypass -encodedCommand ` expectedCommandEncoded := expectedCommandPrefix + expectedCommandBase64Encoded actualCommandWithoutPrefix := strings.Replace(comm.StartCmd.Command, expectedCommandPrefix, "", -1) actualCommandDecoded, err := powershellDecode(actualCommandWithoutPrefix) if err != nil { t.Fatal("should not have error when base64 decoding") } // Should run the command without alteration if comm.StartCmd.Command != expectedCommandEncoded { t.Fatalf("Expect command to be: %s, got %s.", expectedCommandEncoded, comm.StartCmd.Command) } if actualCommandDecoded != expectedCommandUtf8 { t.Fatalf("Expected decoded: %s, got %s", expectedCommandUtf8, actualCommandDecoded) } } func TestProvisionerProvision_UISlurp(t *testing.T) { // UI should be called n times // UI should receive following messages / output } func TestProvisioner_createFlattenedElevatedEnvVars_windows(t *testing.T) { config := testConfig() p := new(Provisioner) err := p.Prepare(config) if err != nil { t.Fatalf("should not have error preparing config: %s", err) } // Defaults provided by Packer p.config.PackerBuildName = "vmware" p.config.PackerBuilderType = "iso" // no user env var flattenedEnvVars, err := p.createFlattenedEnvVars(true) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } // single user env var p.config.Vars = []string{"FOO=bar"} flattenedEnvVars, err = p.createFlattenedEnvVars(true) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:FOO="bar"; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } // multiple user env vars p.config.Vars = []string{"FOO=bar", "BAZ=qux"} flattenedEnvVars, err = p.createFlattenedEnvVars(true) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:BAZ="qux"; $env:FOO="bar"; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } } func TestProvisioner_createFlattenedEnvVars_windows(t *testing.T) { config := testConfig() p := new(Provisioner) err := p.Prepare(config) if err != nil { t.Fatalf("should not have error preparing config: %s", err) } // Defaults provided by Packer p.config.PackerBuildName = "vmware" p.config.PackerBuilderType = "iso" // no user env var flattenedEnvVars, err := p.createFlattenedEnvVars(false) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } // single user env var p.config.Vars = []string{"FOO=bar"} flattenedEnvVars, err = p.createFlattenedEnvVars(false) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:FOO="bar"; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } // multiple user env vars p.config.Vars = []string{"FOO=bar", "BAZ=qux"} flattenedEnvVars, err = p.createFlattenedEnvVars(false) if err != nil { t.Fatalf("should not have error creating flattened env vars: %s", err) } if flattenedEnvVars != `$env:BAZ="qux"; $env:FOO="bar"; $env:PACKER_BUILDER_TYPE="iso"; $env:PACKER_BUILD_NAME="vmware"; ` { t.Fatalf("unexpected flattened env vars: %s", flattenedEnvVars) } } func TestProvision_createCommandText(t *testing.T) { config := testConfig() p := new(Provisioner) comm := new(packer.MockCommunicator) p.communicator = comm _ = p.Prepare(config) // Non-elevated cmd, _ := p.createCommandText() expectedCommand := `if (Test-Path variable:global:ProgressPreference){$ProgressPreference="SilentlyContinue"}; $env:PACKER_BUILDER_TYPE=""; $env:PACKER_BUILD_NAME=""; c:/Windows/Temp/script.ps1; exit $LastExitCode` expectedCommandBase64Encoded := `aWYgKFRlc3QtUGF0aCB2YXJpYWJsZTpnbG9iYWw6UHJvZ3Jlc3NQcmVmZXJlbmNlKXskUHJvZ3Jlc3NQcmVmZXJlbmNlPSJTaWxlbnRseUNvbnRpbnVlIn07ICRlbnY6UEFDS0VSX0JVSUxERVJfVFlQRT0iIjsgJGVudjpQQUNLRVJfQlVJTERfTkFNRT0iIjsgYzovV2luZG93cy9UZW1wL3NjcmlwdC5wczE7IGV4aXQgJExhc3RFeGl0Q29kZQ==` expectedCommandPrefix := `powershell -executionpolicy bypass -encodedCommand ` expectedCommandEncoded := expectedCommandPrefix + expectedCommandBase64Encoded actualCommandWithoutPrefix := strings.Replace(cmd, expectedCommandPrefix, "", -1) actualCommandDecoded, err := powershellDecode(actualCommandWithoutPrefix) if err != nil { t.Fatal("should not have error when base64 decoding") } // Should run the command without alteration if cmd != expectedCommandEncoded { t.Fatalf("Expect command to be: %s, got %s.", expectedCommandEncoded, cmd) } if actualCommandDecoded != expectedCommand { t.Fatalf("Expected decoded: %s, got %s", expectedCommand, actualCommandDecoded) } // Elevated p.config.ElevatedUser = "vagrant" p.config.ElevatedPassword = "vagrant" cmd, _ = p.createCommandText() matched, _ := regexp.MatchString("powershell -executionpolicy bypass -file \"%TEMP%(.{1})packer-elevated-shell.*", cmd) if !matched { t.Fatalf("Got unexpected elevated command: %s", cmd) } } func TestProvision_generateElevatedShellRunner(t *testing.T) { // Non-elevated config := testConfig() p := new(Provisioner) p.Prepare(config) comm := new(packer.MockCommunicator) p.communicator = comm path, err := p.generateElevatedRunner("whoami") if err != nil { t.Fatalf("Did not expect error: %s", err.Error()) } if comm.UploadCalled != true { t.Fatalf("Should have uploaded file") } matched, _ := regexp.MatchString("%TEMP%(.{1})packer-elevated-shell.*", path) if !matched { t.Fatalf("Got unexpected file: %s", path) } } func TestRetryable(t *testing.T) { config := testConfig() count := 0 retryMe := func() error { t.Logf("RetryMe, attempt number %d", count) if count == 2 { return nil } count++ return errors.New(fmt.Sprintf("Still waiting %d more times...", 2-count)) } retryableSleep = 50 * time.Millisecond p := new(Provisioner) p.config.StartRetryTimeout = 155 * time.Millisecond err := p.Prepare(config) err = p.retryable(retryMe) if err != nil { t.Fatalf("should not have error retrying funuction") } count = 0 p.config.StartRetryTimeout = 10 * time.Millisecond err = p.Prepare(config) err = p.retryable(retryMe) if err == nil { t.Fatalf("should have error retrying funuction") } } func TestCancel(t *testing.T) { // Don't actually call Cancel() as it performs an os.Exit(0) // which kills the 'go test' tool }