2018-02-07 03:05:14 +01:00
|
|
|
package configs
|
|
|
|
|
|
|
|
import (
|
|
|
|
"testing"
|
|
|
|
|
2020-01-13 17:31:47 +01:00
|
|
|
version "github.com/hashicorp/go-version"
|
2019-09-10 00:58:44 +02:00
|
|
|
"github.com/hashicorp/hcl/v2"
|
|
|
|
"github.com/hashicorp/hcl/v2/gohcl"
|
2020-01-13 17:31:47 +01:00
|
|
|
"github.com/hashicorp/terraform/addrs"
|
2018-02-07 03:05:14 +01:00
|
|
|
"github.com/zclconf/go-cty/cty"
|
|
|
|
)
|
|
|
|
|
|
|
|
func TestModuleOverrideVariable(t *testing.T) {
|
2019-06-30 09:38:36 +02:00
|
|
|
mod, diags := testModuleFromDir("testdata/valid-modules/override-variable")
|
2018-02-07 03:05:14 +01:00
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
if mod == nil {
|
|
|
|
t.Fatalf("module is nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
got := mod.Variables
|
|
|
|
want := map[string]*Variable{
|
|
|
|
"fully_overridden": {
|
|
|
|
Name: "fully_overridden",
|
|
|
|
Description: "b_override description",
|
|
|
|
DescriptionSet: true,
|
|
|
|
Default: cty.StringVal("b_override"),
|
configs: allow full type constraints for variables
Previously we just ported over the simple "string", "list", and "map" type
hint keywords from the old loader, which exist primarily as hints to the
CLI for whether to treat -var=... arguments and environment variables as
literal strings or as HCL expressions.
However, we've been requested before to allow more specific constraints
here because it's generally better UX for a type error to be detected
within an expression in a calling "module" block rather than at some point
deep inside a third-party module.
To allow for more specific constraints, here we use the type constraint
expression syntax defined as an extension within HCL, which uses the
variable and function call syntaxes to represent types rather than values,
like this:
- string
- number
- bool
- list(string)
- list(any)
- list(map(string))
- object({id=string,name=string})
In native HCL syntax this looks like:
variable "foo" {
type = map(string)
}
In JSON, this looks like:
{
"variable": {
"foo": {
"type": "map(string)"
}
}
}
The selection of literal processing or HCL parsing of CLI-set values is
now explicit in the model and separate from the type, though it's still
derived from the type constraint and thus not directly controllable in
configuration.
Since this syntax is more complex than the keywords that replaced it, for
now the simpler keywords are still supported and "list" and "map" are
interpreted as list(any) and map(any) respectively, mimicking how they
were interpreted by Terraform 0.11 and earlier. For the time being our
documentation should continue to recommend these shorthand versions until
we gain more experience with the more-specific type constraints; most
users should just make use of the additional primitive type constraints
this enables: bool and number.
As a result of these more-complete type constraints, we can now type-check
the default value at config load time, which has the nice side-effect of
allowing us to produce a tailored error message if an override file
produces an invalid situation; previously the result was rather confusing
because the error message referred to the original definition of the
variable and not the overridden parts.
2018-03-07 02:37:51 +01:00
|
|
|
Type: cty.String,
|
|
|
|
ParsingMode: VariableParseLiteral,
|
2018-02-07 03:05:14 +01:00
|
|
|
DeclRange: hcl.Range{
|
2019-06-30 09:38:36 +02:00
|
|
|
Filename: "testdata/valid-modules/override-variable/primary.tf",
|
2018-02-07 03:05:14 +01:00
|
|
|
Start: hcl.Pos{
|
|
|
|
Line: 1,
|
|
|
|
Column: 1,
|
|
|
|
Byte: 0,
|
|
|
|
},
|
|
|
|
End: hcl.Pos{
|
|
|
|
Line: 1,
|
|
|
|
Column: 28,
|
|
|
|
Byte: 27,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"partially_overridden": {
|
|
|
|
Name: "partially_overridden",
|
|
|
|
Description: "base description",
|
|
|
|
DescriptionSet: true,
|
|
|
|
Default: cty.StringVal("b_override partial"),
|
configs: allow full type constraints for variables
Previously we just ported over the simple "string", "list", and "map" type
hint keywords from the old loader, which exist primarily as hints to the
CLI for whether to treat -var=... arguments and environment variables as
literal strings or as HCL expressions.
However, we've been requested before to allow more specific constraints
here because it's generally better UX for a type error to be detected
within an expression in a calling "module" block rather than at some point
deep inside a third-party module.
To allow for more specific constraints, here we use the type constraint
expression syntax defined as an extension within HCL, which uses the
variable and function call syntaxes to represent types rather than values,
like this:
- string
- number
- bool
- list(string)
- list(any)
- list(map(string))
- object({id=string,name=string})
In native HCL syntax this looks like:
variable "foo" {
type = map(string)
}
In JSON, this looks like:
{
"variable": {
"foo": {
"type": "map(string)"
}
}
}
The selection of literal processing or HCL parsing of CLI-set values is
now explicit in the model and separate from the type, though it's still
derived from the type constraint and thus not directly controllable in
configuration.
Since this syntax is more complex than the keywords that replaced it, for
now the simpler keywords are still supported and "list" and "map" are
interpreted as list(any) and map(any) respectively, mimicking how they
were interpreted by Terraform 0.11 and earlier. For the time being our
documentation should continue to recommend these shorthand versions until
we gain more experience with the more-specific type constraints; most
users should just make use of the additional primitive type constraints
this enables: bool and number.
As a result of these more-complete type constraints, we can now type-check
the default value at config load time, which has the nice side-effect of
allowing us to produce a tailored error message if an override file
produces an invalid situation; previously the result was rather confusing
because the error message referred to the original definition of the
variable and not the overridden parts.
2018-03-07 02:37:51 +01:00
|
|
|
Type: cty.String,
|
|
|
|
ParsingMode: VariableParseLiteral,
|
2018-02-07 03:05:14 +01:00
|
|
|
DeclRange: hcl.Range{
|
2019-06-30 09:38:36 +02:00
|
|
|
Filename: "testdata/valid-modules/override-variable/primary.tf",
|
2018-02-07 03:05:14 +01:00
|
|
|
Start: hcl.Pos{
|
|
|
|
Line: 7,
|
|
|
|
Column: 1,
|
|
|
|
Byte: 103,
|
|
|
|
},
|
|
|
|
End: hcl.Pos{
|
|
|
|
Line: 7,
|
|
|
|
Column: 32,
|
|
|
|
Byte: 134,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
assertResultDeepEqual(t, got, want)
|
|
|
|
}
|
2018-02-07 03:30:12 +01:00
|
|
|
|
|
|
|
func TestModuleOverrideModule(t *testing.T) {
|
2019-06-30 09:38:36 +02:00
|
|
|
mod, diags := testModuleFromDir("testdata/valid-modules/override-module")
|
2018-02-07 03:30:12 +01:00
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
if mod == nil {
|
|
|
|
t.Fatalf("module is nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, exists := mod.ModuleCalls["example"]; !exists {
|
|
|
|
t.Fatalf("no module 'example'")
|
|
|
|
}
|
|
|
|
if len(mod.ModuleCalls) != 1 {
|
|
|
|
t.Fatalf("wrong number of module calls in result %d; want 1", len(mod.ModuleCalls))
|
|
|
|
}
|
|
|
|
|
|
|
|
got := mod.ModuleCalls["example"]
|
|
|
|
want := &ModuleCall{
|
|
|
|
Name: "example",
|
|
|
|
SourceAddr: "./example2-a_override",
|
|
|
|
SourceAddrRange: hcl.Range{
|
2019-06-30 09:38:36 +02:00
|
|
|
Filename: "testdata/valid-modules/override-module/a_override.tf",
|
2018-02-07 03:30:12 +01:00
|
|
|
Start: hcl.Pos{
|
|
|
|
Line: 3,
|
|
|
|
Column: 12,
|
|
|
|
Byte: 31,
|
|
|
|
},
|
|
|
|
End: hcl.Pos{
|
|
|
|
Line: 3,
|
|
|
|
Column: 35,
|
|
|
|
Byte: 54,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
SourceSet: true,
|
|
|
|
DeclRange: hcl.Range{
|
2019-06-30 09:38:36 +02:00
|
|
|
Filename: "testdata/valid-modules/override-module/primary.tf",
|
2018-02-07 03:30:12 +01:00
|
|
|
Start: hcl.Pos{
|
|
|
|
Line: 2,
|
|
|
|
Column: 1,
|
|
|
|
Byte: 1,
|
|
|
|
},
|
|
|
|
End: hcl.Pos{
|
|
|
|
Line: 2,
|
|
|
|
Column: 17,
|
|
|
|
Byte: 17,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
// We're going to extract and nil out our hcl.Body here because DeepEqual
|
|
|
|
// is not a useful way to assert on that.
|
|
|
|
gotConfig := got.Config
|
|
|
|
got.Config = nil
|
|
|
|
|
|
|
|
assertResultDeepEqual(t, got, want)
|
|
|
|
|
|
|
|
type content struct {
|
|
|
|
Kept *string `hcl:"kept"`
|
|
|
|
Foo *string `hcl:"foo"`
|
|
|
|
New *string `hcl:"new"`
|
|
|
|
Newer *string `hcl:"newer"`
|
|
|
|
}
|
|
|
|
var gotArgs content
|
|
|
|
diags = gohcl.DecodeBody(gotConfig, nil, &gotArgs)
|
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
|
|
|
|
wantArgs := content{
|
|
|
|
Kept: stringPtr("primary kept"),
|
|
|
|
Foo: stringPtr("a_override foo"),
|
|
|
|
New: stringPtr("b_override new"),
|
|
|
|
Newer: stringPtr("b_override newer"),
|
|
|
|
}
|
|
|
|
|
|
|
|
assertResultDeepEqual(t, gotArgs, wantArgs)
|
|
|
|
}
|
2019-04-16 00:25:00 +02:00
|
|
|
|
|
|
|
func TestModuleOverrideDynamic(t *testing.T) {
|
|
|
|
schema := &hcl.BodySchema{
|
|
|
|
Blocks: []hcl.BlockHeaderSchema{
|
|
|
|
{Type: "foo"},
|
|
|
|
{Type: "dynamic", LabelNames: []string{"type"}},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
t.Run("base is dynamic", func(t *testing.T) {
|
2019-06-30 09:38:36 +02:00
|
|
|
mod, diags := testModuleFromDir("testdata/valid-modules/override-dynamic-block-base")
|
2019-04-16 00:25:00 +02:00
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
if mod == nil {
|
|
|
|
t.Fatalf("module is nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, exists := mod.ManagedResources["test.foo"]; !exists {
|
|
|
|
t.Fatalf("no module 'example'")
|
|
|
|
}
|
|
|
|
if len(mod.ManagedResources) != 1 {
|
|
|
|
t.Fatalf("wrong number of managed resources in result %d; want 1", len(mod.ManagedResources))
|
|
|
|
}
|
|
|
|
|
|
|
|
body := mod.ManagedResources["test.foo"].Config
|
|
|
|
content, diags := body.Content(schema)
|
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
|
|
|
|
if len(content.Blocks) != 1 {
|
|
|
|
t.Fatalf("wrong number of blocks in result %d; want 1", len(content.Blocks))
|
|
|
|
}
|
|
|
|
if got, want := content.Blocks[0].Type, "foo"; got != want {
|
|
|
|
t.Fatalf("wrong block type %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
t.Run("override is dynamic", func(t *testing.T) {
|
2019-06-30 09:38:36 +02:00
|
|
|
mod, diags := testModuleFromDir("testdata/valid-modules/override-dynamic-block-override")
|
2019-04-16 00:25:00 +02:00
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
if mod == nil {
|
|
|
|
t.Fatalf("module is nil")
|
|
|
|
}
|
|
|
|
|
|
|
|
if _, exists := mod.ManagedResources["test.foo"]; !exists {
|
|
|
|
t.Fatalf("no module 'example'")
|
|
|
|
}
|
|
|
|
if len(mod.ManagedResources) != 1 {
|
|
|
|
t.Fatalf("wrong number of managed resources in result %d; want 1", len(mod.ManagedResources))
|
|
|
|
}
|
|
|
|
|
|
|
|
body := mod.ManagedResources["test.foo"].Config
|
|
|
|
content, diags := body.Content(schema)
|
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
|
|
|
|
if len(content.Blocks) != 1 {
|
|
|
|
t.Fatalf("wrong number of blocks in result %d; want 1", len(content.Blocks))
|
|
|
|
}
|
|
|
|
if got, want := content.Blocks[0].Type, "dynamic"; got != want {
|
|
|
|
t.Fatalf("wrong block type %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
if got, want := content.Blocks[0].Labels[0], "foo"; got != want {
|
|
|
|
t.Fatalf("wrong dynamic block label %q; want %q", got, want)
|
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
2020-01-13 17:31:47 +01:00
|
|
|
|
2020-03-16 19:36:16 +01:00
|
|
|
func TestModuleOverrideResourceFQNs(t *testing.T) {
|
|
|
|
mod, diags := testModuleFromDir("testdata/valid-modules/override-resource-provider")
|
|
|
|
assertNoDiagnostics(t, diags)
|
|
|
|
|
|
|
|
got := mod.ManagedResources["test_instance.explicit"]
|
|
|
|
wantProvider := addrs.NewProvider(addrs.DefaultRegistryHost, "bar", "test")
|
|
|
|
wantProviderCfg := &ProviderConfigRef{
|
|
|
|
Name: "bar-test",
|
|
|
|
NameRange: hcl.Range{
|
|
|
|
Filename: "testdata/valid-modules/override-resource-provider/a_override.tf",
|
|
|
|
Start: hcl.Pos{Line: 2, Column: 14, Byte: 51},
|
|
|
|
End: hcl.Pos{Line: 2, Column: 22, Byte: 59},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
if !got.Provider.Equals(wantProvider) {
|
|
|
|
t.Fatalf("wrong provider %s, want %s", got.Provider, wantProvider)
|
|
|
|
}
|
|
|
|
assertResultDeepEqual(t, got.ProviderConfigRef, wantProviderCfg)
|
|
|
|
|
|
|
|
// now verify that a resource with no provider config falls back to default
|
|
|
|
got = mod.ManagedResources["test_instance.default"]
|
|
|
|
wantProvider = addrs.NewLegacyProvider("test")
|
|
|
|
if !got.Provider.Equals(wantProvider) {
|
|
|
|
t.Fatalf("wrong provider %s, want %s", got.Provider, wantProvider)
|
|
|
|
}
|
|
|
|
if got.ProviderConfigRef != nil {
|
|
|
|
t.Fatalf("wrong result: found provider config ref %s, expected nil", got.ProviderConfigRef)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-01-13 17:31:47 +01:00
|
|
|
func TestMergeProviderVersionConstraints(t *testing.T) {
|
|
|
|
v1, _ := version.NewConstraint("1.0.0")
|
|
|
|
vc1 := VersionConstraint{
|
|
|
|
Required: v1,
|
|
|
|
}
|
|
|
|
v2, _ := version.NewConstraint("2.0.0")
|
|
|
|
vc2 := VersionConstraint{
|
|
|
|
Required: v2,
|
|
|
|
}
|
|
|
|
|
|
|
|
tests := map[string]struct {
|
|
|
|
Input map[string]ProviderRequirements
|
|
|
|
Override []*RequiredProvider
|
|
|
|
Want map[string]ProviderRequirements
|
|
|
|
}{
|
|
|
|
"basic merge": {
|
|
|
|
map[string]ProviderRequirements{
|
|
|
|
"random": ProviderRequirements{
|
|
|
|
Type: addrs.Provider{Type: "random"},
|
|
|
|
VersionConstraints: []VersionConstraint{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
[]*RequiredProvider{
|
|
|
|
&RequiredProvider{
|
|
|
|
Name: "null",
|
|
|
|
Requirement: VersionConstraint{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
map[string]ProviderRequirements{
|
|
|
|
"random": ProviderRequirements{
|
|
|
|
Type: addrs.Provider{Type: "random"},
|
|
|
|
VersionConstraints: []VersionConstraint{},
|
|
|
|
},
|
|
|
|
"null": ProviderRequirements{
|
|
|
|
Type: addrs.NewLegacyProvider("null"),
|
|
|
|
VersionConstraints: []VersionConstraint{
|
|
|
|
VersionConstraint{
|
|
|
|
Required: version.Constraints(nil),
|
|
|
|
DeclRange: hcl.Range{},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
"override version constraint": {
|
|
|
|
map[string]ProviderRequirements{
|
|
|
|
"random": ProviderRequirements{
|
|
|
|
Type: addrs.Provider{Type: "random"},
|
|
|
|
VersionConstraints: []VersionConstraint{vc1},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
[]*RequiredProvider{
|
|
|
|
&RequiredProvider{
|
|
|
|
Name: "random",
|
|
|
|
Requirement: vc2,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
map[string]ProviderRequirements{
|
|
|
|
"random": ProviderRequirements{
|
|
|
|
Type: addrs.NewLegacyProvider("random"),
|
|
|
|
VersionConstraints: []VersionConstraint{vc2},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for name, test := range tests {
|
|
|
|
t.Run(name, func(t *testing.T) {
|
|
|
|
mergeProviderVersionConstraints(test.Input, test.Override)
|
|
|
|
assertResultDeepEqual(t, test.Input, test.Want)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|