489 lines
15 KiB
Go
489 lines
15 KiB
Go
package terraform
|
|
|
|
import (
|
|
"errors"
|
|
"strings"
|
|
"testing"
|
|
|
|
"github.com/hashicorp/hcl/v2"
|
|
"github.com/hashicorp/hcl/v2/hcltest"
|
|
"github.com/hashicorp/terraform/addrs"
|
|
"github.com/hashicorp/terraform/configs"
|
|
"github.com/hashicorp/terraform/configs/configschema"
|
|
"github.com/hashicorp/terraform/providers"
|
|
"github.com/hashicorp/terraform/provisioners"
|
|
"github.com/hashicorp/terraform/tfdiags"
|
|
"github.com/zclconf/go-cty/cty"
|
|
)
|
|
|
|
func TestNodeValidatableResource_ValidateProvisioner_valid(t *testing.T) {
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
mp := &MockProvisioner{}
|
|
ps := &configschema.Block{}
|
|
ctx.ProvisionerSchemaSchema = ps
|
|
ctx.ProvisionerProvisioner = mp
|
|
|
|
pc := &configs.Provisioner{
|
|
Type: "baz",
|
|
Config: hcl.EmptyBody(),
|
|
Connection: &configs.Connection{
|
|
Config: configs.SynthBody("", map[string]cty.Value{
|
|
"host": cty.StringVal("localhost"),
|
|
"type": cty.StringVal("ssh"),
|
|
}),
|
|
},
|
|
}
|
|
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_foo",
|
|
Name: "bar",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
}
|
|
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
},
|
|
}
|
|
|
|
diags := node.validateProvisioner(ctx, pc, false, false)
|
|
if diags.HasErrors() {
|
|
t.Fatalf("node.Eval failed: %s", diags.Err())
|
|
}
|
|
if !mp.ValidateProvisionerConfigCalled {
|
|
t.Fatalf("p.ValidateProvisionerConfig not called")
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateProvisioner__warning(t *testing.T) {
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
mp := &MockProvisioner{}
|
|
ps := &configschema.Block{}
|
|
ctx.ProvisionerSchemaSchema = ps
|
|
ctx.ProvisionerProvisioner = mp
|
|
|
|
pc := &configs.Provisioner{
|
|
Type: "baz",
|
|
Config: hcl.EmptyBody(),
|
|
}
|
|
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_foo",
|
|
Name: "bar",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
Managed: &configs.ManagedResource{},
|
|
}
|
|
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
},
|
|
}
|
|
|
|
{
|
|
var diags tfdiags.Diagnostics
|
|
diags = diags.Append(tfdiags.SimpleWarning("foo is deprecated"))
|
|
mp.ValidateProvisionerConfigResponse = provisioners.ValidateProvisionerConfigResponse{
|
|
Diagnostics: diags,
|
|
}
|
|
}
|
|
|
|
diags := node.validateProvisioner(ctx, pc, false, false)
|
|
if len(diags) != 1 {
|
|
t.Fatalf("wrong number of diagnostics in %s; want one warning", diags.ErrWithWarnings())
|
|
}
|
|
|
|
if got, want := diags[0].Description().Summary, mp.ValidateProvisionerConfigResponse.Diagnostics[0].Description().Summary; got != want {
|
|
t.Fatalf("wrong warning %q; want %q", got, want)
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateProvisioner__conntectionInvalid(t *testing.T) {
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
mp := &MockProvisioner{}
|
|
ps := &configschema.Block{}
|
|
ctx.ProvisionerSchemaSchema = ps
|
|
ctx.ProvisionerProvisioner = mp
|
|
|
|
pc := &configs.Provisioner{
|
|
Type: "baz",
|
|
Config: hcl.EmptyBody(),
|
|
Connection: &configs.Connection{
|
|
Config: configs.SynthBody("", map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"bananananananana": cty.StringVal("foo"),
|
|
"bazaz": cty.StringVal("bar"),
|
|
}),
|
|
},
|
|
}
|
|
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_foo",
|
|
Name: "bar",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
Managed: &configs.ManagedResource{},
|
|
}
|
|
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
},
|
|
}
|
|
|
|
diags := node.validateProvisioner(ctx, pc, false, false)
|
|
if !diags.HasErrors() {
|
|
t.Fatalf("node.Eval succeeded; want error")
|
|
}
|
|
if len(diags) != 3 {
|
|
t.Fatalf("wrong number of diagnostics; want two errors\n\n%s", diags.Err())
|
|
}
|
|
|
|
errStr := diags.Err().Error()
|
|
if !(strings.Contains(errStr, "bananananananana") && strings.Contains(errStr, "bazaz")) {
|
|
t.Fatalf("wrong errors %q; want something about each of our invalid connInfo keys", errStr)
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_managedResource(t *testing.T) {
|
|
mp := simpleMockProvider()
|
|
mp.ValidateResourceTypeConfigFn = func(req providers.ValidateResourceTypeConfigRequest) providers.ValidateResourceTypeConfigResponse {
|
|
if got, want := req.TypeName, "test_object"; got != want {
|
|
t.Fatalf("wrong resource type\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
if got, want := req.Config.GetAttr("test_string"), cty.StringVal("bar"); !got.RawEquals(want) {
|
|
t.Fatalf("wrong value for test_string\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
if got, want := req.Config.GetAttr("test_number"), cty.NumberIntVal(2); !got.RawEquals(want) {
|
|
t.Fatalf("wrong value for test_number\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
return providers.ValidateResourceTypeConfigResponse{}
|
|
}
|
|
|
|
p := providers.Interface(mp)
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Config: configs.SynthBody("", map[string]cty.Value{
|
|
"test_string": cty.StringVal("bar"),
|
|
"test_number": cty.NumberIntVal(2).Mark("sensitive"),
|
|
}),
|
|
}
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
err := node.validateResource(ctx)
|
|
if err != nil {
|
|
t.Fatalf("err: %s", err)
|
|
}
|
|
|
|
if !mp.ValidateResourceTypeConfigCalled {
|
|
t.Fatal("Expected ValidateResourceTypeConfig to be called, but it was not!")
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_managedResourceCount(t *testing.T) {
|
|
// Setup
|
|
mp := simpleMockProvider()
|
|
mp.ValidateResourceTypeConfigFn = func(req providers.ValidateResourceTypeConfigRequest) providers.ValidateResourceTypeConfigResponse {
|
|
if got, want := req.TypeName, "test_object"; got != want {
|
|
t.Fatalf("wrong resource type\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
if got, want := req.Config.GetAttr("test_string"), cty.StringVal("bar"); !got.RawEquals(want) {
|
|
t.Fatalf("wrong value for test_string\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
return providers.ValidateResourceTypeConfigResponse{}
|
|
}
|
|
|
|
p := providers.Interface(mp)
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
tests := []struct {
|
|
name string
|
|
count hcl.Expression
|
|
}{
|
|
{
|
|
"simple count",
|
|
hcltest.MockExprLiteral(cty.NumberIntVal(2)),
|
|
},
|
|
{
|
|
"marked count value",
|
|
hcltest.MockExprLiteral(cty.NumberIntVal(3).Mark("marked")),
|
|
},
|
|
}
|
|
|
|
for _, test := range tests {
|
|
t.Run(test.name, func(t *testing.T) {
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Count: test.count,
|
|
Config: configs.SynthBody("", map[string]cty.Value{
|
|
"test_string": cty.StringVal("bar"),
|
|
}),
|
|
}
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
diags := node.validateResource(ctx)
|
|
if diags.HasErrors() {
|
|
t.Fatalf("err: %s", diags.Err())
|
|
}
|
|
|
|
if !mp.ValidateResourceTypeConfigCalled {
|
|
t.Fatal("Expected ValidateResourceTypeConfig to be called, but it was not!")
|
|
}
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_dataSource(t *testing.T) {
|
|
mp := simpleMockProvider()
|
|
mp.ValidateDataSourceConfigFn = func(req providers.ValidateDataSourceConfigRequest) providers.ValidateDataSourceConfigResponse {
|
|
if got, want := req.TypeName, "test_object"; got != want {
|
|
t.Fatalf("wrong resource type\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
if got, want := req.Config.GetAttr("test_string"), cty.StringVal("bar"); !got.RawEquals(want) {
|
|
t.Fatalf("wrong value for test_string\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
if got, want := req.Config.GetAttr("test_number"), cty.NumberIntVal(2); !got.RawEquals(want) {
|
|
t.Fatalf("wrong value for test_number\ngot: %#v\nwant: %#v", got, want)
|
|
}
|
|
return providers.ValidateDataSourceConfigResponse{}
|
|
}
|
|
|
|
p := providers.Interface(mp)
|
|
rc := &configs.Resource{
|
|
Mode: addrs.DataResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Config: configs.SynthBody("", map[string]cty.Value{
|
|
"test_string": cty.StringVal("bar"),
|
|
"test_number": cty.NumberIntVal(2).Mark("sensitive"),
|
|
}),
|
|
}
|
|
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
diags := node.validateResource(ctx)
|
|
if diags.HasErrors() {
|
|
t.Fatalf("err: %s", diags.Err())
|
|
}
|
|
|
|
if !mp.ValidateDataSourceConfigCalled {
|
|
t.Fatal("Expected ValidateDataSourceConfig to be called, but it was not!")
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_valid(t *testing.T) {
|
|
mp := simpleMockProvider()
|
|
mp.ValidateResourceTypeConfigFn = func(req providers.ValidateResourceTypeConfigRequest) providers.ValidateResourceTypeConfigResponse {
|
|
return providers.ValidateResourceTypeConfigResponse{}
|
|
}
|
|
|
|
p := providers.Interface(mp)
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
}
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_object.foo"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
diags := node.validateResource(ctx)
|
|
if diags.HasErrors() {
|
|
t.Fatalf("err: %s", diags.Err())
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_warningsAndErrorsPassedThrough(t *testing.T) {
|
|
mp := simpleMockProvider()
|
|
mp.ValidateResourceTypeConfigFn = func(req providers.ValidateResourceTypeConfigRequest) providers.ValidateResourceTypeConfigResponse {
|
|
var diags tfdiags.Diagnostics
|
|
diags = diags.Append(tfdiags.SimpleWarning("warn"))
|
|
diags = diags.Append(errors.New("err"))
|
|
return providers.ValidateResourceTypeConfigResponse{
|
|
Diagnostics: diags,
|
|
}
|
|
}
|
|
|
|
p := providers.Interface(mp)
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
}
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
diags := node.validateResource(ctx)
|
|
if !diags.HasErrors() {
|
|
t.Fatal("unexpected success; want error")
|
|
}
|
|
|
|
bySeverity := map[tfdiags.Severity]tfdiags.Diagnostics{}
|
|
for _, diag := range diags {
|
|
bySeverity[diag.Severity()] = append(bySeverity[diag.Severity()], diag)
|
|
}
|
|
if len(bySeverity[tfdiags.Warning]) != 1 || bySeverity[tfdiags.Warning][0].Description().Summary != "warn" {
|
|
t.Errorf("Expected 1 warning 'warn', got: %s", bySeverity[tfdiags.Warning].ErrWithWarnings())
|
|
}
|
|
if len(bySeverity[tfdiags.Error]) != 1 || bySeverity[tfdiags.Error][0].Description().Summary != "err" {
|
|
t.Errorf("Expected 1 error 'err', got: %s", bySeverity[tfdiags.Error].Err())
|
|
}
|
|
}
|
|
|
|
func TestNodeValidatableResource_ValidateResource_invalidDependsOn(t *testing.T) {
|
|
mp := simpleMockProvider()
|
|
mp.ValidateResourceTypeConfigFn = func(req providers.ValidateResourceTypeConfigRequest) providers.ValidateResourceTypeConfigResponse {
|
|
return providers.ValidateResourceTypeConfigResponse{}
|
|
}
|
|
|
|
// We'll check a _valid_ config first, to make sure we're not failing
|
|
// for some other reason, and then make it invalid.
|
|
p := providers.Interface(mp)
|
|
rc := &configs.Resource{
|
|
Mode: addrs.ManagedResourceMode,
|
|
Type: "test_object",
|
|
Name: "foo",
|
|
Config: configs.SynthBody("", map[string]cty.Value{}),
|
|
DependsOn: []hcl.Traversal{
|
|
// Depending on path.module is pointless, since it is immediately
|
|
// available, but we allow all of the referencable addrs here
|
|
// for consistency: referencing them is harmless, and avoids the
|
|
// need for us to document a different subset of addresses that
|
|
// are valid in depends_on.
|
|
// For the sake of this test, it's a valid address we can use that
|
|
// doesn't require something else to exist in the configuration.
|
|
{
|
|
hcl.TraverseRoot{
|
|
Name: "path",
|
|
},
|
|
hcl.TraverseAttr{
|
|
Name: "module",
|
|
},
|
|
},
|
|
},
|
|
}
|
|
node := NodeValidatableResource{
|
|
NodeAbstractResource: &NodeAbstractResource{
|
|
Addr: mustConfigResourceAddr("test_foo.bar"),
|
|
Config: rc,
|
|
ResolvedProvider: mustProviderConfig(`provider["registry.terraform.io/hashicorp/aws"]`),
|
|
},
|
|
}
|
|
|
|
ctx := &MockEvalContext{}
|
|
ctx.installSimpleEval()
|
|
|
|
ctx.ProviderSchemaSchema = mp.ProviderSchema()
|
|
ctx.ProviderProvider = p
|
|
|
|
diags := node.validateResource(ctx)
|
|
if diags.HasErrors() {
|
|
t.Fatalf("error for supposedly-valid config: %s", diags.ErrWithWarnings())
|
|
}
|
|
|
|
// Now we'll make it invalid by adding additional traversal steps at
|
|
// the end of what we're referencing. This is intended to catch the
|
|
// situation where the user tries to depend on e.g. a specific resource
|
|
// attribute, rather than the whole resource, like aws_instance.foo.id.
|
|
rc.DependsOn = append(rc.DependsOn, hcl.Traversal{
|
|
hcl.TraverseRoot{
|
|
Name: "path",
|
|
},
|
|
hcl.TraverseAttr{
|
|
Name: "module",
|
|
},
|
|
hcl.TraverseAttr{
|
|
Name: "extra",
|
|
},
|
|
})
|
|
|
|
diags = node.validateResource(ctx)
|
|
if !diags.HasErrors() {
|
|
t.Fatal("no error for invalid depends_on")
|
|
}
|
|
if got, want := diags.Err().Error(), "Invalid depends_on reference"; !strings.Contains(got, want) {
|
|
t.Fatalf("wrong error\ngot: %s\nwant: Message containing %q", got, want)
|
|
}
|
|
|
|
// Test for handling an unknown root without attribute, like a
|
|
// typo that omits the dot inbetween "path.module".
|
|
rc.DependsOn = append(rc.DependsOn, hcl.Traversal{
|
|
hcl.TraverseRoot{
|
|
Name: "pathmodule",
|
|
},
|
|
})
|
|
|
|
diags = node.validateResource(ctx)
|
|
if !diags.HasErrors() {
|
|
t.Fatal("no error for invalid depends_on")
|
|
}
|
|
if got, want := diags.Err().Error(), "Invalid depends_on reference"; !strings.Contains(got, want) {
|
|
t.Fatalf("wrong error\ngot: %s\nwant: Message containing %q", got, want)
|
|
}
|
|
}
|