187 lines
5.0 KiB
Go
187 lines
5.0 KiB
Go
package common
|
|
|
|
import (
|
|
"reflect"
|
|
"testing"
|
|
)
|
|
|
|
func testAMIConfig() *AMIConfig {
|
|
return &AMIConfig{
|
|
AMIName: "foo",
|
|
}
|
|
}
|
|
|
|
func getFakeAccessConfig(region string) *AccessConfig {
|
|
return &AccessConfig{
|
|
RawRegion: region,
|
|
}
|
|
}
|
|
|
|
func TestAMIConfigPrepare_name(t *testing.T) {
|
|
c := testAMIConfig()
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatalf("shouldn't have err: %s", err)
|
|
}
|
|
|
|
c.AMIName = ""
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have error")
|
|
}
|
|
}
|
|
|
|
func TestAMIConfigPrepare_regions(t *testing.T) {
|
|
c := testAMIConfig()
|
|
c.AMIRegions = nil
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatalf("shouldn't have err: %s", err)
|
|
}
|
|
|
|
c.AMIRegions = listEC2Regions()
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatalf("shouldn't have err: %s", err)
|
|
}
|
|
|
|
c.AMIRegions = []string{"foo"}
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have error")
|
|
}
|
|
|
|
c.AMIRegions = []string{"us-east-1", "us-west-1", "us-east-1"}
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatalf("bad: %s", err)
|
|
}
|
|
|
|
expected := []string{"us-east-1", "us-west-1"}
|
|
if !reflect.DeepEqual(c.AMIRegions, expected) {
|
|
t.Fatalf("bad: %#v", c.AMIRegions)
|
|
}
|
|
|
|
c.AMIRegions = []string{"custom"}
|
|
c.AMISkipRegionValidation = true
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatal("shouldn't have error")
|
|
}
|
|
c.AMISkipRegionValidation = false
|
|
|
|
c.AMIRegions = []string{"us-east-1", "us-east-2", "us-west-1"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "789-012-3456",
|
|
"us-east-2": "456-789-0123",
|
|
}
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatal("shouldn't have error")
|
|
}
|
|
|
|
c.AMIRegions = []string{"us-east-1", "us-east-2", "us-west-1"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "789-012-3456",
|
|
"us-east-2": "",
|
|
}
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatal("should have passed; we are able to use default KMS key if not sharing")
|
|
}
|
|
|
|
c.SnapshotUsers = []string{"user-foo", "user-bar"}
|
|
c.AMIRegions = []string{"us-east-1", "us-east-2", "us-west-1"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "789-012-3456",
|
|
"us-east-2": "",
|
|
}
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have an error b/c can't use default KMS key if sharing")
|
|
}
|
|
|
|
c.AMIRegions = []string{"us-east-1", "us-west-1"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "789-012-3456",
|
|
"us-east-2": "456-789-0123",
|
|
}
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have error b/c theres a region in the key map that isn't in ami_regions")
|
|
}
|
|
|
|
c.AMIRegions = []string{"us-east-1", "us-west-1", "us-east-2"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "789-012-3456",
|
|
}
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have error b/c theres a region in in ami_regions that isn't in the key map")
|
|
}
|
|
|
|
c.SnapshotUsers = []string{"foo", "bar"}
|
|
c.AMIKmsKeyId = "123-abc-456"
|
|
c.AMIEncryptBootVolume = true
|
|
c.AMIRegions = []string{"us-east-1", "us-west-1"}
|
|
c.AMIRegionKMSKeyIDs = map[string]string{
|
|
"us-east-1": "123-456-7890",
|
|
"us-west-1": "",
|
|
}
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("should have error b/c theres a region in in ami_regions that isn't in the key map")
|
|
}
|
|
|
|
// allow rawregion to exist in ami_regions list.
|
|
accessConf := getFakeAccessConfig("us-east-1")
|
|
c.AMIRegions = []string{"us-east-1", "us-west-1", "us-east-2"}
|
|
c.AMIRegionKMSKeyIDs = nil
|
|
if err := c.Prepare(accessConf, nil); err != nil {
|
|
t.Fatal("should allow user to have the raw region in ami_regions")
|
|
}
|
|
|
|
}
|
|
|
|
func TestAMIConfigPrepare_Share_EncryptedBoot(t *testing.T) {
|
|
c := testAMIConfig()
|
|
c.AMIUsers = []string{"testAccountID"}
|
|
c.AMIEncryptBootVolume = true
|
|
|
|
c.AMIKmsKeyId = ""
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("shouldn't be able to share ami with encrypted boot volume")
|
|
}
|
|
|
|
c.AMIKmsKeyId = "89c3fb9a-de87-4f2a-aedc-fddc5138193c"
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("shouldn't be able to share ami with encrypted boot volume")
|
|
}
|
|
}
|
|
|
|
func TestAMINameValidation(t *testing.T) {
|
|
c := testAMIConfig()
|
|
|
|
c.AMIName = "aa"
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("shouldn't be able to have an ami name with less than 3 characters")
|
|
}
|
|
|
|
var longAmiName string
|
|
for i := 0; i < 129; i++ {
|
|
longAmiName += "a"
|
|
}
|
|
c.AMIName = longAmiName
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("shouldn't be able to have an ami name with great than 128 characters")
|
|
}
|
|
|
|
c.AMIName = "+aaa"
|
|
if err := c.Prepare(nil, nil); err == nil {
|
|
t.Fatal("shouldn't be able to have an ami name with invalid characters")
|
|
}
|
|
|
|
c.AMIName = "fooBAR1()[] ./-'@_"
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatal("should be able to use all of the allowed AMI characters")
|
|
}
|
|
|
|
c.AMIName = `xyz-base-2017-04-05-1934`
|
|
if err := c.Prepare(nil, nil); err != nil {
|
|
t.Fatalf("expected `xyz-base-2017-04-05-1934` to pass validation.")
|
|
}
|
|
|
|
}
|