180 lines
3.8 KiB
Go
180 lines
3.8 KiB
Go
package common
|
|
|
|
import (
|
|
"io/ioutil"
|
|
"os"
|
|
"regexp"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/packer/helper/communicator"
|
|
)
|
|
|
|
func init() {
|
|
// Clear out the AWS access key env vars so they don't
|
|
// affect our tests.
|
|
os.Setenv("AWS_ACCESS_KEY_ID", "")
|
|
os.Setenv("AWS_ACCESS_KEY", "")
|
|
os.Setenv("AWS_SECRET_ACCESS_KEY", "")
|
|
os.Setenv("AWS_SECRET_KEY", "")
|
|
}
|
|
|
|
func testConfig() *RunConfig {
|
|
return &RunConfig{
|
|
SourceAmi: "abcd",
|
|
InstanceType: "m1.small",
|
|
|
|
Comm: communicator.Config{
|
|
SSHUsername: "foo",
|
|
},
|
|
}
|
|
}
|
|
|
|
func testConfigFilter() *RunConfig {
|
|
config := testConfig()
|
|
config.SourceAmi = ""
|
|
config.SourceAmiFilter = AmiFilterOptions{}
|
|
return config
|
|
}
|
|
|
|
func TestRunConfigPrepare(t *testing.T) {
|
|
c := testConfig()
|
|
err := c.Prepare(nil)
|
|
if len(err) > 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_InstanceType(t *testing.T) {
|
|
c := testConfig()
|
|
c.InstanceType = ""
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_SourceAmi(t *testing.T) {
|
|
c := testConfig()
|
|
c.SourceAmi = ""
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_SourceAmiFilterBlank(t *testing.T) {
|
|
c := testConfigFilter()
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_SourceAmiFilterGood(t *testing.T) {
|
|
c := testConfigFilter()
|
|
owner := "123"
|
|
filter_key := "name"
|
|
filter_value := "foo"
|
|
goodFilter := AmiFilterOptions{Owners: []*string{&owner}, Filters: map[*string]*string{&filter_key: &filter_value}}
|
|
c.SourceAmiFilter = goodFilter
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_SpotAuto(t *testing.T) {
|
|
c := testConfig()
|
|
c.SpotPrice = "auto"
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
c.SpotPriceAutoProduct = "foo"
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_SSHPort(t *testing.T) {
|
|
c := testConfig()
|
|
c.Comm.SSHPort = 0
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if c.Comm.SSHPort != 22 {
|
|
t.Fatalf("invalid value: %d", c.Comm.SSHPort)
|
|
}
|
|
|
|
c.Comm.SSHPort = 44
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if c.Comm.SSHPort != 44 {
|
|
t.Fatalf("invalid value: %d", c.Comm.SSHPort)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_UserData(t *testing.T) {
|
|
c := testConfig()
|
|
tf, err := ioutil.TempFile("", "packer")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
defer tf.Close()
|
|
|
|
c.UserData = "foo"
|
|
c.UserDataFile = tf.Name()
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_UserDataFile(t *testing.T) {
|
|
c := testConfig()
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
c.UserDataFile = "idontexistidontthink"
|
|
if err := c.Prepare(nil); len(err) != 1 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
tf, err := ioutil.TempFile("", "packer")
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
defer tf.Close()
|
|
|
|
c.UserDataFile = tf.Name()
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
}
|
|
|
|
func TestRunConfigPrepare_TemporaryKeyPairName(t *testing.T) {
|
|
c := testConfig()
|
|
c.TemporaryKeyPairName = ""
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if c.TemporaryKeyPairName == "" {
|
|
t.Fatal("keypair name is empty")
|
|
}
|
|
|
|
// Match prefix and UUID, e.g. "packer_5790d491-a0b8-c84c-c9d2-2aea55086550".
|
|
r := regexp.MustCompile(`\Apacker_(?:(?i)[a-f\d]{8}(?:-[a-f\d]{4}){3}-[a-f\d]{12}?)\z`)
|
|
if !r.MatchString(c.TemporaryKeyPairName) {
|
|
t.Fatal("keypair name is not valid")
|
|
}
|
|
|
|
c.TemporaryKeyPairName = "ssh-key-123"
|
|
if err := c.Prepare(nil); len(err) != 0 {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if c.TemporaryKeyPairName != "ssh-key-123" {
|
|
t.Fatal("keypair name does not match")
|
|
}
|
|
}
|