158 lines
3.3 KiB
Go
158 lines
3.3 KiB
Go
package ssh
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/hashicorp/terraform/terraform"
|
|
)
|
|
|
|
func TestProvisioner_connInfo(t *testing.T) {
|
|
r := &terraform.InstanceState{
|
|
Ephemeral: terraform.EphemeralState{
|
|
ConnInfo: map[string]string{
|
|
"type": "ssh",
|
|
"user": "root",
|
|
"password": "supersecret",
|
|
"private_key": "someprivatekeycontents",
|
|
"certificate": "somecertificate",
|
|
"host": "127.0.0.1",
|
|
"port": "22",
|
|
"timeout": "30s",
|
|
|
|
"bastion_host": "127.0.1.1",
|
|
},
|
|
},
|
|
}
|
|
|
|
conf, err := parseConnectionInfo(r)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.User != "root" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Password != "supersecret" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.PrivateKey != "someprivatekeycontents" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Certificate != "somecertificate" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Host != "127.0.0.1" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Port != 22 {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Timeout != "30s" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.ScriptPath != DefaultUnixScriptPath {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.TargetPlatform != TargetPlatformUnix {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionHost != "127.0.1.1" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPort != 22 {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionUser != "root" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPassword != "supersecret" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPrivateKey != "someprivatekeycontents" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoIpv6(t *testing.T) {
|
|
r := &terraform.InstanceState{
|
|
Ephemeral: terraform.EphemeralState{
|
|
ConnInfo: map[string]string{
|
|
"type": "ssh",
|
|
"user": "root",
|
|
"password": "supersecret",
|
|
"private_key": "someprivatekeycontents",
|
|
"certificate": "somecertificate",
|
|
"host": "::1",
|
|
"port": "22",
|
|
"timeout": "30s",
|
|
|
|
"bastion_host": "::1",
|
|
},
|
|
},
|
|
}
|
|
|
|
conf, err := parseConnectionInfo(r)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.Host != "[::1]" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
|
|
if conf.BastionHost != "[::1]" {
|
|
t.Fatalf("bad %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoHostname(t *testing.T) {
|
|
r := &terraform.InstanceState{
|
|
Ephemeral: terraform.EphemeralState{
|
|
ConnInfo: map[string]string{
|
|
"type": "ssh",
|
|
"user": "root",
|
|
"password": "supersecret",
|
|
"private_key": "someprivatekeycontents",
|
|
"host": "example.com",
|
|
"port": "22",
|
|
"timeout": "30s",
|
|
"bastion_host": "example.com",
|
|
},
|
|
},
|
|
}
|
|
|
|
conf, err := parseConnectionInfo(r)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.Host != "example.com" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
|
|
if conf.BastionHost != "example.com" {
|
|
t.Fatalf("bad %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoEmptyHostname(t *testing.T) {
|
|
r := &terraform.InstanceState{
|
|
Ephemeral: terraform.EphemeralState{
|
|
ConnInfo: map[string]string{
|
|
"type": "ssh",
|
|
"user": "root",
|
|
"password": "supersecret",
|
|
"private_key": "someprivatekeycontents",
|
|
"host": "",
|
|
"port": "22",
|
|
"timeout": "30s",
|
|
},
|
|
},
|
|
}
|
|
|
|
_, err := parseConnectionInfo(r)
|
|
if err == nil {
|
|
t.Fatalf("bad: should not allow empty host")
|
|
}
|
|
}
|