2017-03-21 18:43:31 +01:00
|
|
|
package s3
|
|
|
|
|
|
|
|
import (
|
2017-05-19 17:51:46 +02:00
|
|
|
"bytes"
|
|
|
|
"crypto/md5"
|
2017-03-21 18:43:31 +01:00
|
|
|
"fmt"
|
2017-05-24 19:51:33 +02:00
|
|
|
"strings"
|
2017-03-21 18:43:31 +01:00
|
|
|
"testing"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/hashicorp/terraform/backend"
|
2017-05-19 20:39:42 +02:00
|
|
|
"github.com/hashicorp/terraform/state"
|
2017-03-21 18:43:31 +01:00
|
|
|
"github.com/hashicorp/terraform/state/remote"
|
2018-10-01 23:35:23 +02:00
|
|
|
"github.com/hashicorp/terraform/states/statefile"
|
2017-03-21 18:43:31 +01:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestRemoteClient_impl(t *testing.T) {
|
2017-03-22 20:52:55 +01:00
|
|
|
var _ remote.Client = new(RemoteClient)
|
|
|
|
var _ remote.ClientLocker = new(RemoteClient)
|
2017-03-21 18:43:31 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestRemoteClient(t *testing.T) {
|
|
|
|
testACC(t)
|
|
|
|
bucketName := fmt.Sprintf("terraform-remote-s3-test-%x", time.Now().Unix())
|
|
|
|
keyName := "testState"
|
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-03-21 18:43:31 +01:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"encrypt": true,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-03-21 18:43:31 +01:00
|
|
|
|
2017-05-19 20:39:42 +02:00
|
|
|
createS3Bucket(t, b.s3Client, bucketName)
|
|
|
|
defer deleteS3Bucket(t, b.s3Client, bucketName)
|
|
|
|
|
2018-10-01 23:35:23 +02:00
|
|
|
state, err := b.StateMgr(backend.DefaultStateName)
|
2017-03-21 18:43:31 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
remote.TestClient(t, state.(*remote.State).Client)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestRemoteClientLocks(t *testing.T) {
|
|
|
|
testACC(t)
|
|
|
|
bucketName := fmt.Sprintf("terraform-remote-s3-test-%x", time.Now().Unix())
|
|
|
|
keyName := "testState"
|
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b1 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"encrypt": true,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-03-21 18:43:31 +01:00
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b2 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"encrypt": true,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-03-21 18:43:31 +01:00
|
|
|
|
2017-05-19 20:39:42 +02:00
|
|
|
createS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
defer deleteS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
createDynamoDBTable(t, b1.dynClient, bucketName)
|
|
|
|
defer deleteDynamoDBTable(t, b1.dynClient, bucketName)
|
|
|
|
|
2018-10-01 23:35:23 +02:00
|
|
|
s1, err := b1.StateMgr(backend.DefaultStateName)
|
2017-03-21 18:43:31 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2018-10-01 23:35:23 +02:00
|
|
|
s2, err := b2.StateMgr(backend.DefaultStateName)
|
2017-03-21 18:43:31 +01:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2017-05-19 20:39:42 +02:00
|
|
|
remote.TestRemoteLocks(t, s1.(*remote.State).Client, s2.(*remote.State).Client)
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify that we can unlock a state with an existing lock
|
|
|
|
func TestForceUnlock(t *testing.T) {
|
|
|
|
testACC(t)
|
|
|
|
bucketName := fmt.Sprintf("terraform-remote-s3-test-force-%x", time.Now().Unix())
|
|
|
|
keyName := "testState"
|
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b1 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"encrypt": true,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-05-19 20:39:42 +02:00
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b2 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"encrypt": true,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-05-19 20:39:42 +02:00
|
|
|
|
2017-03-22 20:52:55 +01:00
|
|
|
createS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
defer deleteS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
createDynamoDBTable(t, b1.dynClient, bucketName)
|
|
|
|
defer deleteDynamoDBTable(t, b1.dynClient, bucketName)
|
2017-03-21 18:43:31 +01:00
|
|
|
|
2017-05-19 20:39:42 +02:00
|
|
|
// first test with default
|
2018-10-01 23:35:23 +02:00
|
|
|
s1, err := b1.StateMgr(backend.DefaultStateName)
|
2017-05-19 20:39:42 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
info := state.NewLockInfo()
|
|
|
|
info.Operation = "test"
|
|
|
|
info.Who = "clientA"
|
|
|
|
|
|
|
|
lockID, err := s1.Lock(info)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("unable to get initial lock:", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// s1 is now locked, get the same state through s2 and unlock it
|
2018-10-01 23:35:23 +02:00
|
|
|
s2, err := b2.StateMgr(backend.DefaultStateName)
|
2017-05-19 20:39:42 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("failed to get default state to force unlock:", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := s2.Unlock(lockID); err != nil {
|
|
|
|
t.Fatal("failed to force-unlock default state")
|
|
|
|
}
|
|
|
|
|
|
|
|
// now try the same thing with a named state
|
|
|
|
// first test with default
|
2018-10-01 23:35:23 +02:00
|
|
|
s1, err = b1.StateMgr("test")
|
2017-05-19 20:39:42 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
info = state.NewLockInfo()
|
|
|
|
info.Operation = "test"
|
|
|
|
info.Who = "clientA"
|
|
|
|
|
|
|
|
lockID, err = s1.Lock(info)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal("unable to get initial lock:", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// s1 is now locked, get the same state through s2 and unlock it
|
2018-10-01 23:35:23 +02:00
|
|
|
s2, err = b2.StateMgr("test")
|
2017-05-19 20:39:42 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal("failed to get named state to force unlock:", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err = s2.Unlock(lockID); err != nil {
|
|
|
|
t.Fatal("failed to force-unlock named state")
|
|
|
|
}
|
2017-03-21 18:43:31 +01:00
|
|
|
}
|
2017-05-19 17:51:46 +02:00
|
|
|
|
|
|
|
func TestRemoteClient_clientMD5(t *testing.T) {
|
|
|
|
testACC(t)
|
|
|
|
|
|
|
|
bucketName := fmt.Sprintf("terraform-remote-s3-test-%x", time.Now().Unix())
|
|
|
|
keyName := "testState"
|
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-05-19 17:51:46 +02:00
|
|
|
|
2017-05-30 19:59:16 +02:00
|
|
|
createS3Bucket(t, b.s3Client, bucketName)
|
|
|
|
defer deleteS3Bucket(t, b.s3Client, bucketName)
|
2017-05-19 17:51:46 +02:00
|
|
|
createDynamoDBTable(t, b.dynClient, bucketName)
|
|
|
|
defer deleteDynamoDBTable(t, b.dynClient, bucketName)
|
|
|
|
|
2018-10-01 23:35:23 +02:00
|
|
|
s, err := b.StateMgr(backend.DefaultStateName)
|
2017-05-19 17:51:46 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
client := s.(*remote.State).Client.(*RemoteClient)
|
|
|
|
|
|
|
|
sum := md5.Sum([]byte("test"))
|
|
|
|
|
|
|
|
if err := client.putMD5(sum[:]); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
getSum, err := client.getMD5()
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if !bytes.Equal(getSum, sum[:]) {
|
|
|
|
t.Fatalf("getMD5 returned the wrong checksum: expected %x, got %x", sum[:], getSum)
|
|
|
|
}
|
|
|
|
|
|
|
|
if err := client.deleteMD5(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if getSum, err := client.getMD5(); err == nil {
|
|
|
|
t.Fatalf("expected getMD5 error, got none. checksum: %x", getSum)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify that a client won't return a state with an incorrect checksum.
|
|
|
|
func TestRemoteClient_stateChecksum(t *testing.T) {
|
|
|
|
testACC(t)
|
|
|
|
|
|
|
|
bucketName := fmt.Sprintf("terraform-remote-s3-test-%x", time.Now().Unix())
|
|
|
|
keyName := "testState"
|
|
|
|
|
2018-03-21 02:43:02 +01:00
|
|
|
b1 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-26 01:12:20 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
|
|
|
"dynamodb_table": bucketName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2017-05-19 17:51:46 +02:00
|
|
|
|
|
|
|
createS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
defer deleteS3Bucket(t, b1.s3Client, bucketName)
|
|
|
|
createDynamoDBTable(t, b1.dynClient, bucketName)
|
|
|
|
defer deleteDynamoDBTable(t, b1.dynClient, bucketName)
|
|
|
|
|
2018-10-01 23:35:23 +02:00
|
|
|
s1, err := b1.StateMgr(backend.DefaultStateName)
|
2017-05-19 17:51:46 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
client1 := s1.(*remote.State).Client
|
|
|
|
|
2019-03-21 22:05:41 +01:00
|
|
|
// create an old and new state version to persist
|
2017-05-19 17:51:46 +02:00
|
|
|
s := state.TestStateInitial()
|
2018-10-01 23:35:23 +02:00
|
|
|
sf := &statefile.File{State: s}
|
2017-05-19 17:51:46 +02:00
|
|
|
var oldState bytes.Buffer
|
2018-10-01 23:35:23 +02:00
|
|
|
if err := statefile.Write(sf, &oldState); err != nil {
|
2017-05-19 17:51:46 +02:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2018-10-01 23:35:23 +02:00
|
|
|
sf.Serial++
|
2017-05-19 17:51:46 +02:00
|
|
|
var newState bytes.Buffer
|
2018-10-01 23:35:23 +02:00
|
|
|
if err := statefile.Write(sf, &newState); err != nil {
|
2017-05-19 17:51:46 +02:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2017-05-26 01:12:20 +02:00
|
|
|
// Use b2 without a dynamodb_table to bypass the lock table to write the state directly.
|
2017-05-19 17:51:46 +02:00
|
|
|
// client2 will write the "incorrect" state, simulating s3 eventually consistency delays
|
2018-03-21 02:43:02 +01:00
|
|
|
b2 := backend.TestBackendConfig(t, New(), backend.TestWrapConfig(map[string]interface{}{
|
2017-05-19 17:51:46 +02:00
|
|
|
"bucket": bucketName,
|
|
|
|
"key": keyName,
|
2018-03-21 02:43:02 +01:00
|
|
|
})).(*Backend)
|
2018-10-01 23:35:23 +02:00
|
|
|
s2, err := b2.StateMgr(backend.DefaultStateName)
|
2017-05-19 17:51:46 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
client2 := s2.(*remote.State).Client
|
|
|
|
|
|
|
|
// write the new state through client2 so that there is no checksum yet
|
|
|
|
if err := client2.Put(newState.Bytes()); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// verify that we can pull a state without a checksum
|
|
|
|
if _, err := client1.Get(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// write the new state back with its checksum
|
|
|
|
if err := client1.Put(newState.Bytes()); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
2017-05-30 19:59:16 +02:00
|
|
|
// put an empty state in place to check for panics during get
|
|
|
|
if err := client2.Put([]byte{}); err != nil {
|
2017-05-19 17:51:46 +02:00
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove the timeouts so we can fail immediately
|
|
|
|
origTimeout := consistencyRetryTimeout
|
|
|
|
origInterval := consistencyRetryPollInterval
|
|
|
|
defer func() {
|
|
|
|
consistencyRetryTimeout = origTimeout
|
|
|
|
consistencyRetryPollInterval = origInterval
|
|
|
|
}()
|
|
|
|
consistencyRetryTimeout = 0
|
|
|
|
consistencyRetryPollInterval = 0
|
|
|
|
|
2017-05-30 19:59:16 +02:00
|
|
|
// fetching an empty state through client1 should now error out due to a
|
|
|
|
// mismatched checksum.
|
|
|
|
if _, err := client1.Get(); !strings.HasPrefix(err.Error(), errBadChecksumFmt[:80]) {
|
|
|
|
t.Fatalf("expected state checksum error: got %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// put the old state in place of the new, without updating the checksum
|
|
|
|
if err := client2.Put(oldState.Bytes()); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// fetching the wrong state through client1 should now error out due to a
|
2017-05-19 17:51:46 +02:00
|
|
|
// mismatched checksum.
|
2017-05-24 19:51:33 +02:00
|
|
|
if _, err := client1.Get(); !strings.HasPrefix(err.Error(), errBadChecksumFmt[:80]) {
|
2017-05-19 17:51:46 +02:00
|
|
|
t.Fatalf("expected state checksum error: got %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// update the state with the correct one after we Get again
|
|
|
|
testChecksumHook = func() {
|
|
|
|
if err := client2.Put(newState.Bytes()); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
testChecksumHook = nil
|
|
|
|
}
|
|
|
|
|
|
|
|
consistencyRetryTimeout = origTimeout
|
|
|
|
|
|
|
|
// this final Get will fail to fail the checksum verification, the above
|
|
|
|
// callback will update the state with the correct version, and Get should
|
|
|
|
// retry automatically.
|
|
|
|
if _, err := client1.Get(); err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
}
|