2017-08-16 15:48:51 +02:00
|
|
|
package e2e
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"path/filepath"
|
|
|
|
|
2019-04-29 19:03:25 +02:00
|
|
|
"github.com/hashicorp/terraform/plans"
|
|
|
|
"github.com/hashicorp/terraform/plans/planfile"
|
|
|
|
"github.com/hashicorp/terraform/states"
|
|
|
|
"github.com/hashicorp/terraform/states/statefile"
|
2017-08-16 15:48:51 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
// Type binary represents the combination of a compiled binary
|
|
|
|
// and a temporary working directory to run it in.
|
|
|
|
type binary struct {
|
|
|
|
binPath string
|
|
|
|
workDir string
|
2017-09-19 20:31:18 +02:00
|
|
|
env []string
|
2017-08-16 15:48:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// NewBinary prepares a temporary directory containing the files from the
|
|
|
|
// given fixture and returns an instance of type binary that can run
|
|
|
|
// the generated binary in that directory.
|
|
|
|
//
|
|
|
|
// If the temporary directory cannot be created, a fixture of the given name
|
|
|
|
// cannot be found, or if an error occurs while _copying_ the fixture files,
|
|
|
|
// this function will panic. Tests should be written to assume that this
|
|
|
|
// function always succeeds.
|
|
|
|
func NewBinary(binaryPath, workingDir string) *binary {
|
|
|
|
tmpDir, err := ioutil.TempDir("", "binary-e2etest")
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2020-09-08 19:46:20 +02:00
|
|
|
tmpDir, err = filepath.EvalSymlinks(tmpDir)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
2017-08-16 15:48:51 +02:00
|
|
|
// For our purposes here we do a very simplistic file copy that doesn't
|
|
|
|
// attempt to preserve file permissions, attributes, alternate data
|
|
|
|
// streams, etc. Since we only have to deal with our own fixtures in
|
2019-06-30 09:38:36 +02:00
|
|
|
// the testdata subdir, we know we don't need to deal with anything
|
2017-08-16 15:48:51 +02:00
|
|
|
// of this nature.
|
|
|
|
err = filepath.Walk(workingDir, func(path string, info os.FileInfo, err error) error {
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if path == workingDir {
|
|
|
|
// nothing to do at the root
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2019-04-29 19:03:25 +02:00
|
|
|
if filepath.Base(path) == ".exists" {
|
|
|
|
// We use this file just to let git know the "empty" fixture
|
|
|
|
// exists. It is not used by any test.
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-08-16 15:48:51 +02:00
|
|
|
srcFn := path
|
|
|
|
|
|
|
|
path, err = filepath.Rel(workingDir, path)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
dstFn := filepath.Join(tmpDir, path)
|
|
|
|
|
|
|
|
if info.IsDir() {
|
|
|
|
return os.Mkdir(dstFn, os.ModePerm)
|
|
|
|
}
|
|
|
|
|
|
|
|
src, err := os.Open(srcFn)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
dst, err := os.OpenFile(dstFn, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, os.ModePerm)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
_, err = io.Copy(dst, src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := src.Close(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := dst.Close(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
return &binary{
|
|
|
|
binPath: binaryPath,
|
|
|
|
workDir: tmpDir,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-09-19 20:31:18 +02:00
|
|
|
// AddEnv appends an entry to the environment variable table passed to any
|
|
|
|
// commands subsequently run.
|
|
|
|
func (b *binary) AddEnv(entry string) {
|
|
|
|
b.env = append(b.env, entry)
|
|
|
|
}
|
|
|
|
|
2017-08-16 15:48:51 +02:00
|
|
|
// Cmd returns an exec.Cmd pre-configured to run the generated Terraform
|
|
|
|
// binary with the given arguments in the temporary working directory.
|
|
|
|
//
|
|
|
|
// The returned object can be mutated by the caller to customize how the
|
|
|
|
// process will be run, before calling Run.
|
|
|
|
func (b *binary) Cmd(args ...string) *exec.Cmd {
|
|
|
|
cmd := exec.Command(b.binPath, args...)
|
|
|
|
cmd.Dir = b.workDir
|
|
|
|
cmd.Env = os.Environ()
|
|
|
|
|
|
|
|
// Disable checkpoint since we don't want to harass that service when
|
|
|
|
// our tests run. (This does, of course, mean we can't actually do
|
|
|
|
// end-to-end testing of our Checkpoint interactions.)
|
|
|
|
cmd.Env = append(cmd.Env, "CHECKPOINT_DISABLE=1")
|
|
|
|
|
2017-09-19 20:31:18 +02:00
|
|
|
cmd.Env = append(cmd.Env, b.env...)
|
|
|
|
|
2017-08-16 15:48:51 +02:00
|
|
|
return cmd
|
|
|
|
}
|
|
|
|
|
|
|
|
// Run executes the generated Terraform binary with the given arguments
|
|
|
|
// and returns the bytes that it wrote to both stdout and stderr.
|
|
|
|
//
|
|
|
|
// This is a simple way to run Terraform for non-interactive commands
|
|
|
|
// that don't need any special environment variables. For more complex
|
|
|
|
// situations, use Cmd and customize the command before running it.
|
|
|
|
func (b *binary) Run(args ...string) (stdout, stderr string, err error) {
|
|
|
|
cmd := b.Cmd(args...)
|
|
|
|
cmd.Stdin = nil
|
|
|
|
cmd.Stdout = &bytes.Buffer{}
|
|
|
|
cmd.Stderr = &bytes.Buffer{}
|
|
|
|
err = cmd.Run()
|
|
|
|
stdout = cmd.Stdout.(*bytes.Buffer).String()
|
|
|
|
stderr = cmd.Stderr.(*bytes.Buffer).String()
|
|
|
|
return
|
|
|
|
}
|
|
|
|
|
|
|
|
// Path returns a file path within the temporary working directory by
|
|
|
|
// appending the given arguments as path segments.
|
|
|
|
func (b *binary) Path(parts ...string) string {
|
|
|
|
args := make([]string, len(parts)+1)
|
|
|
|
args[0] = b.workDir
|
|
|
|
args = append(args, parts...)
|
|
|
|
return filepath.Join(args...)
|
|
|
|
}
|
|
|
|
|
|
|
|
// OpenFile is a helper for easily opening a file from the working directory
|
|
|
|
// for reading.
|
|
|
|
func (b *binary) OpenFile(path ...string) (*os.File, error) {
|
|
|
|
flatPath := b.Path(path...)
|
|
|
|
return os.Open(flatPath)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ReadFile is a helper for easily reading a whole file from the working
|
|
|
|
// directory.
|
|
|
|
func (b *binary) ReadFile(path ...string) ([]byte, error) {
|
|
|
|
flatPath := b.Path(path...)
|
|
|
|
return ioutil.ReadFile(flatPath)
|
|
|
|
}
|
|
|
|
|
|
|
|
// FileExists is a helper for easily testing whether a particular file
|
|
|
|
// exists in the working directory.
|
|
|
|
func (b *binary) FileExists(path ...string) bool {
|
|
|
|
flatPath := b.Path(path...)
|
|
|
|
_, err := os.Stat(flatPath)
|
|
|
|
return !os.IsNotExist(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// LocalState is a helper for easily reading the local backend's state file
|
|
|
|
// terraform.tfstate from the working directory.
|
2019-04-29 19:03:25 +02:00
|
|
|
func (b *binary) LocalState() (*states.State, error) {
|
main: new global option -chdir
This new option is intended to address the previous inconsistencies where
some older subcommands supported partially changing the target directory
(where Terraform would use the new directory inconsistently) where newer
commands did not support that override at all.
Instead, now Terraform will accept a -chdir command at the start of the
command line (before the subcommand) and will interpret it as a request
to direct all actions that would normally be taken in the current working
directory into the target directory instead. This is similar to options
offered by some other similar tools, such as the -C option in "make".
The new option is only accepted at the start of the command line (before
the subcommand) as a way to reflect that it is a global command (not
specific to a particular subcommand) and that it takes effect _before_
executing the subcommand. This also means it'll be forced to appear before
any other command-specific arguments that take file paths, which hopefully
communicates that those other arguments are interpreted relative to the
overridden path.
As a measure of pragmatism for existing uses, the path.cwd object in
the Terraform language will continue to return the _original_ working
directory (ignoring -chdir), in case that is important in some exceptional
workflows. The path.root object gives the root module directory, which
will always match the overriden working directory unless the user
simultaneously uses one of the legacy directory override arguments, which
is not a pattern we intend to support in the long run.
As a first step down the deprecation path, this commit adjusts the
documentation to de-emphasize the inconsistent old command line arguments,
including specific guidance on what to use instead for the main three
workflow commands, but all of those options remain supported in the same
way as they were before. In a later commit we'll make those arguments
produce a visible deprecation warning in Terraform's output, and then
in an even later commit we'll remove them entirely so that -chdir is the
single supported way to run Terraform from a directory other than the
one containing the root module configuration.
2020-09-02 00:45:12 +02:00
|
|
|
return b.StateFromFile("terraform.tfstate")
|
|
|
|
}
|
|
|
|
|
|
|
|
// StateFromFile is a helper for easily reading a state snapshot from a file
|
|
|
|
// on disk relative to the working directory.
|
|
|
|
func (b *binary) StateFromFile(filename string) (*states.State, error) {
|
|
|
|
f, err := b.OpenFile(filename)
|
2017-08-16 15:48:51 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
2019-04-29 19:03:25 +02:00
|
|
|
|
|
|
|
stateFile, err := statefile.Read(f)
|
|
|
|
if err != nil {
|
|
|
|
return nil, fmt.Errorf("Error reading statefile: %s", err)
|
|
|
|
}
|
|
|
|
return stateFile.State, nil
|
2017-08-16 15:48:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Plan is a helper for easily reading a plan file from the working directory.
|
2019-04-29 19:03:25 +02:00
|
|
|
func (b *binary) Plan(path string) (*plans.Plan, error) {
|
|
|
|
path = b.Path(path)
|
|
|
|
pr, err := planfile.Open(path)
|
2017-08-16 15:48:51 +02:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2019-04-29 19:03:25 +02:00
|
|
|
plan, err := pr.ReadPlan()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
return plan, nil
|
2017-08-16 15:48:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// SetLocalState is a helper for easily writing to the file the local backend
|
|
|
|
// uses for state in the working directory. This does not go through the
|
|
|
|
// actual local backend code, so processing such as management of serials
|
|
|
|
// does not apply and the given state will simply be written verbatim.
|
2019-04-29 19:03:25 +02:00
|
|
|
func (b *binary) SetLocalState(state *states.State) error {
|
2017-08-16 15:48:51 +02:00
|
|
|
path := b.Path("terraform.tfstate")
|
|
|
|
f, err := os.OpenFile(path, os.O_TRUNC|os.O_CREATE|os.O_WRONLY, os.ModePerm)
|
|
|
|
if err != nil {
|
2019-04-29 19:03:25 +02:00
|
|
|
return fmt.Errorf("failed to create temporary state file %s: %s", path, err)
|
2017-08-16 15:48:51 +02:00
|
|
|
}
|
2019-04-29 19:03:25 +02:00
|
|
|
defer f.Close()
|
2017-08-16 15:48:51 +02:00
|
|
|
|
2019-04-29 19:03:25 +02:00
|
|
|
sf := &statefile.File{
|
|
|
|
Serial: 0,
|
|
|
|
Lineage: "fake-for-testing",
|
|
|
|
State: state,
|
|
|
|
}
|
|
|
|
return statefile.Write(sf, f)
|
2017-08-16 15:48:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close cleans up the temporary resources associated with the object,
|
|
|
|
// including its working directory. It is not valid to call Cmd or Run
|
|
|
|
// after Close returns.
|
|
|
|
//
|
|
|
|
// This method does _not_ stop any running child processes. It's the
|
|
|
|
// caller's responsibility to also terminate those _before_ closing the
|
|
|
|
// underlying binary object.
|
|
|
|
//
|
|
|
|
// This function is designed to run under "defer", so it doesn't actually
|
|
|
|
// do any error handling and will leave dangling temporary files on disk
|
|
|
|
// if any errors occur while cleaning up.
|
|
|
|
func (b *binary) Close() {
|
|
|
|
os.RemoveAll(b.workDir)
|
|
|
|
}
|
|
|
|
|
|
|
|
func GoBuild(pkgPath, tmpPrefix string) string {
|
|
|
|
tmpFile, err := ioutil.TempFile("", tmpPrefix)
|
|
|
|
if err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
tmpFilename := tmpFile.Name()
|
|
|
|
if err = tmpFile.Close(); err != nil {
|
|
|
|
panic(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
cmd := exec.Command(
|
|
|
|
"go", "build",
|
2018-11-19 20:15:58 +01:00
|
|
|
"-mod=vendor",
|
2017-08-16 15:48:51 +02:00
|
|
|
"-o", tmpFilename,
|
|
|
|
pkgPath,
|
|
|
|
)
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
|
|
|
|
err = cmd.Run()
|
|
|
|
if err != nil {
|
|
|
|
// The go compiler will have already produced some error messages
|
|
|
|
// on stderr by the time we get here.
|
|
|
|
panic(fmt.Sprintf("failed to build executable: %s", err))
|
|
|
|
}
|
|
|
|
|
|
|
|
return tmpFilename
|
|
|
|
}
|
2020-04-21 23:09:29 +02:00
|
|
|
|
|
|
|
// WorkDir() returns the binary workdir
|
|
|
|
func (b *binary) WorkDir() string {
|
|
|
|
return b.workDir
|
|
|
|
}
|