mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-23 07:02:57 -06:00
4f58099a0e
Fixes: #11824 A full set of acceptance tests for *all* OpsWorks tests are below. There is a single issue, opsworks_instance isn't ordering the layer_ids so it's non-deterministic which can come back. This introduces a false positive. The opsworks tests are running both against us-east-1 for some and us-west-2 for others. This must be marked as a backwards incompatibility in 0.9 just incase people are using the opsworks region parameter to try and override the provider region ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksApplication' 2 ↵ ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:11:36 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksApplication -timeout 120m === RUN TestAccAWSOpsworksApplication --- PASS: TestAccAWSOpsworksApplication (164.29s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 164.319s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksCustomLayer' ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:16:18 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksCustomLayer -timeout 120m === RUN TestAccAWSOpsworksCustomLayerImportBasic --- PASS: TestAccAWSOpsworksCustomLayerImportBasic (105.98s) === RUN TestAccAWSOpsworksCustomLayer --- PASS: TestAccAWSOpsworksCustomLayer (92.68s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 198.684s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksPermission' ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:23:28 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksPermission -timeout 120m === RUN TestAccAWSOpsworksPermission --- PASS: TestAccAWSOpsworksPermission (226.36s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 226.386s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksRailsAppLayer' ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:28:01 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksRailsAppLayer -timeout 120m === RUN TestAccAWSOpsworksRailsAppLayer --- PASS: TestAccAWSOpsworksRailsAppLayer (129.39s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 129.426s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksUserProfile' ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:37:46 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksUserProfile -timeout 120m === RUN TestAccAWSOpsworksUserProfile --- PASS: TestAccAWSOpsworksUserProfile (42.60s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 42.624s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksStack' 2 ↵ ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 18:00:50 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksStack -timeout 120m === RUN TestAccAWSOpsworksStackImportBasic --- PASS: TestAccAWSOpsworksStackImportBasic (50.28s) === RUN TestAccAWSOpsworksStackNoVpc --- PASS: TestAccAWSOpsworksStackNoVpc (25.92s) === RUN TestAccAWSOpsworksStackVpc --- PASS: TestAccAWSOpsworksStackVpc (76.80s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 153.025s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksRdsDbInstance' ✹ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:38:36 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksRdsDbInstance -timeout 120m === RUN TestAccAWSOpsworksRdsDbInstance --- PASS: TestAccAWSOpsworksRdsDbInstance (916.15s) PASS ok github.com/hashicorp/terraform/builtin/providers/aws 916.177s ``` ``` % make testacc TEST=./builtin/providers/aws TESTARGS='-run=TestAccAWSOpsworksInstance' 2 ↵ ==> Checking that code complies with gofmt requirements... go generate $(go list ./... | grep -v /terraform/vendor/) 2017/03/14 17:26:45 Generated command/internal_plugin_list.go TF_ACC=1 go test ./builtin/providers/aws -v -run=TestAccAWSOpsworksInstance -timeout 120m === RUN TestAccAWSOpsworksInstance_importBasic --- PASS: TestAccAWSOpsworksInstance_importBasic (85.52s) === RUN TestAccAWSOpsworksInstance --- FAIL: TestAccAWSOpsworksInstance (114.09s) testing.go:268: Step 1 error: After applying this step, the plan was not empty: DIFF: UPDATE: aws_opsworks_instance.tf-acc layer_ids.0: "4c29b76f-df72-409e-a5c4-9459b7d9b4a4" => "a4a859cf-2a07-447e-a151-a97a6d827db7" layer_ids.1: "a4a859cf-2a07-447e-a151-a97a6d827db7" => "4c29b76f-df72-409e-a5c4-9459b7d9b4a4" FAIL exit status 1 FAIL github.com/hashicorp/terraform/builtin/providers/aws 199.643s make: *** [testacc] Error 1 ```
387 lines
15 KiB
Go
387 lines
15 KiB
Go
package aws
|
|
|
|
import (
|
|
"fmt"
|
|
"reflect"
|
|
"testing"
|
|
|
|
"github.com/aws/aws-sdk-go/aws"
|
|
"github.com/aws/aws-sdk-go/aws/awserr"
|
|
"github.com/aws/aws-sdk-go/service/opsworks"
|
|
"github.com/hashicorp/terraform/helper/acctest"
|
|
"github.com/hashicorp/terraform/helper/resource"
|
|
"github.com/hashicorp/terraform/terraform"
|
|
)
|
|
|
|
func TestAccAWSOpsworksApplication(t *testing.T) {
|
|
var opsapp opsworks.App
|
|
|
|
rInt := acctest.RandInt()
|
|
name := fmt.Sprintf("tf-ops-acc-application-%d", rInt)
|
|
|
|
resource.Test(t, resource.TestCase{
|
|
PreCheck: func() { testAccPreCheck(t) },
|
|
Providers: testAccProviders,
|
|
CheckDestroy: testAccCheckAwsOpsworksApplicationDestroy,
|
|
Steps: []resource.TestStep{
|
|
{
|
|
Config: testAccAwsOpsworksApplicationCreate(name),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckAWSOpsworksApplicationExists(
|
|
"aws_opsworks_application.tf-acc-app", &opsapp),
|
|
testAccCheckAWSOpsworksCreateAppAttributes(&opsapp),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "name", name,
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "type", "other",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "enable_ssl", "false",
|
|
),
|
|
resource.TestCheckNoResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "ssl_configuration",
|
|
),
|
|
resource.TestCheckNoResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "domains",
|
|
),
|
|
resource.TestCheckNoResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.key", "key1",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.value", "value1",
|
|
),
|
|
resource.TestCheckNoResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.secret",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "document_root", "foo",
|
|
),
|
|
),
|
|
},
|
|
{
|
|
Config: testAccAwsOpsworksApplicationUpdate(name),
|
|
Check: resource.ComposeTestCheckFunc(
|
|
testAccCheckAWSOpsworksApplicationExists(
|
|
"aws_opsworks_application.tf-acc-app", &opsapp),
|
|
testAccCheckAWSOpsworksUpdateAppAttributes(&opsapp),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "name", name,
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "type", "rails",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "enable_ssl", "true",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "ssl_configuration.0.certificate", "-----BEGIN CERTIFICATE-----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\nV/YEvOqdAiy5NEWBztHx8HvB9G4=\n-----END CERTIFICATE-----",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "ssl_configuration.0.private_key", "-----BEGIN RSA PRIVATE KEY-----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\n5rkuduVGP7tK3uIp00Its3aEyKF8mLGWYszVGeeLxAMH\n-----END RSA PRIVATE KEY-----",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "domains.0", "example.com",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "domains.1", "sub.example.com",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.password", "",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.revision", "master",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.ssh_key", "",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.type", "git",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.url", "https://github.com/aws/example.git",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "app_source.0.username", "",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.2107898637.key", "key2",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.2107898637.value", "value2",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.2107898637.secure", "true",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.key", "key1",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.value", "value1",
|
|
),
|
|
resource.TestCheckNoResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "environment.3077298702.secret",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "document_root", "root",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "auto_bundle_on_deploy", "true",
|
|
),
|
|
resource.TestCheckResourceAttr(
|
|
"aws_opsworks_application.tf-acc-app", "rails_env", "staging",
|
|
),
|
|
),
|
|
},
|
|
},
|
|
})
|
|
}
|
|
|
|
func testAccCheckAWSOpsworksApplicationExists(
|
|
n string, opsapp *opsworks.App) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
rs, ok := s.RootModule().Resources[n]
|
|
if !ok {
|
|
return fmt.Errorf("Not found: %s", n)
|
|
}
|
|
|
|
if rs.Primary.ID == "" {
|
|
return fmt.Errorf("No ID is set")
|
|
}
|
|
|
|
conn := testAccProvider.Meta().(*AWSClient).opsworksconn
|
|
|
|
params := &opsworks.DescribeAppsInput{
|
|
AppIds: []*string{&rs.Primary.ID},
|
|
}
|
|
resp, err := conn.DescribeApps(params)
|
|
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if v := len(resp.Apps); v != 1 {
|
|
return fmt.Errorf("Expected 1 response returned, got %d", v)
|
|
}
|
|
|
|
*opsapp = *resp.Apps[0]
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckAWSOpsworksCreateAppAttributes(
|
|
opsapp *opsworks.App) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if *opsapp.EnableSsl {
|
|
return fmt.Errorf("Unexpected enable ssl: %t", *opsapp.EnableSsl)
|
|
}
|
|
|
|
if *opsapp.Attributes["DocumentRoot"] != "foo" {
|
|
return fmt.Errorf("Unnexpected document root: %s", *opsapp.Attributes["DocumentRoot"])
|
|
}
|
|
|
|
if *opsapp.Type != "other" {
|
|
return fmt.Errorf("Unnexpected type: %s", *opsapp.Type)
|
|
}
|
|
|
|
if *opsapp.AppSource.Type != "other" {
|
|
return fmt.Errorf("Unnexpected appsource type: %s", *opsapp.AppSource.Type)
|
|
}
|
|
|
|
expectedEnv := []*opsworks.EnvironmentVariable{
|
|
{
|
|
Key: aws.String("key1"),
|
|
Value: aws.String("value1"),
|
|
Secure: aws.Bool(false),
|
|
},
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedEnv, opsapp.Environment) {
|
|
return fmt.Errorf("Unnexpected environment: %s", opsapp.Environment)
|
|
}
|
|
|
|
if v := len(opsapp.Domains); v != 0 {
|
|
return fmt.Errorf("Expected 0 domains returned, got %d", v)
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckAWSOpsworksUpdateAppAttributes(
|
|
opsapp *opsworks.App) resource.TestCheckFunc {
|
|
return func(s *terraform.State) error {
|
|
if *opsapp.Type != "rails" {
|
|
return fmt.Errorf("Unnexpected type: %s", *opsapp.Type)
|
|
}
|
|
|
|
if !*opsapp.EnableSsl {
|
|
return fmt.Errorf("Unexpected enable ssl: %t", *opsapp.EnableSsl)
|
|
}
|
|
|
|
if *opsapp.SslConfiguration.Certificate != "-----BEGIN CERTIFICATE-----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\nV/YEvOqdAiy5NEWBztHx8HvB9G4=\n-----END CERTIFICATE-----" {
|
|
return fmt.Errorf("Unexpected ssl configuration certificate: %s", *opsapp.SslConfiguration.Certificate)
|
|
}
|
|
|
|
if *opsapp.SslConfiguration.PrivateKey != "-----BEGIN RSA PRIVATE KEY-----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\n5rkuduVGP7tK3uIp00Its3aEyKF8mLGWYszVGeeLxAMH\n-----END RSA PRIVATE KEY-----" {
|
|
return fmt.Errorf("Unexpected ssl configuration private key: %s", *opsapp.SslConfiguration.PrivateKey)
|
|
}
|
|
|
|
expectedAttrs := map[string]*string{
|
|
"DocumentRoot": aws.String("root"),
|
|
"RailsEnv": aws.String("staging"),
|
|
"AutoBundleOnDeploy": aws.String("true"),
|
|
"AwsFlowRubySettings": nil,
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedAttrs, opsapp.Attributes) {
|
|
return fmt.Errorf("Unnexpected Attributes: %v", aws.StringValueMap(opsapp.Attributes))
|
|
}
|
|
|
|
expectedAppSource := &opsworks.Source{
|
|
Type: aws.String("git"),
|
|
Revision: aws.String("master"),
|
|
Url: aws.String("https://github.com/aws/example.git"),
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedAppSource, opsapp.AppSource) {
|
|
return fmt.Errorf("Unnexpected appsource: %s", opsapp.AppSource)
|
|
}
|
|
|
|
expectedEnv := []*opsworks.EnvironmentVariable{
|
|
{
|
|
Key: aws.String("key2"),
|
|
Value: aws.String("*****FILTERED*****"),
|
|
Secure: aws.Bool(true),
|
|
},
|
|
{
|
|
Key: aws.String("key1"),
|
|
Value: aws.String("value1"),
|
|
Secure: aws.Bool(false),
|
|
},
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedEnv, opsapp.Environment) {
|
|
return fmt.Errorf("Unnexpected environment: %s", opsapp.Environment)
|
|
}
|
|
|
|
expectedDomains := []*string{
|
|
aws.String("example.com"),
|
|
aws.String("sub.example.com"),
|
|
}
|
|
|
|
if !reflect.DeepEqual(expectedDomains, opsapp.Domains) {
|
|
return fmt.Errorf("Unnexpected Daomins : %v", aws.StringValueSlice(opsapp.Domains))
|
|
}
|
|
|
|
return nil
|
|
}
|
|
}
|
|
|
|
func testAccCheckAwsOpsworksApplicationDestroy(s *terraform.State) error {
|
|
client := testAccProvider.Meta().(*AWSClient).opsworksconn
|
|
|
|
for _, rs := range s.RootModule().Resources {
|
|
if rs.Type != "aws_opsworks_application" {
|
|
continue
|
|
}
|
|
|
|
req := &opsworks.DescribeAppsInput{
|
|
AppIds: []*string{
|
|
aws.String(rs.Primary.ID),
|
|
},
|
|
}
|
|
|
|
resp, err := client.DescribeApps(req)
|
|
if err == nil {
|
|
if len(resp.Apps) > 0 {
|
|
return fmt.Errorf("OpsWorks App still exist.")
|
|
}
|
|
}
|
|
|
|
if awserr, ok := err.(awserr.Error); ok {
|
|
if awserr.Code() != "ResourceNotFoundException" {
|
|
return err
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|
|
|
|
func testAccAwsOpsworksApplicationCreate(name string) string {
|
|
return testAccAwsOpsworksStackConfigVpcCreate(name) +
|
|
fmt.Sprintf(`
|
|
resource "aws_opsworks_application" "tf-acc-app" {
|
|
stack_id = "${aws_opsworks_stack.tf-acc.id}"
|
|
name = "%s"
|
|
type = "other"
|
|
enable_ssl = false
|
|
app_source ={
|
|
type = "other"
|
|
}
|
|
environment = { key = "key1" value = "value1" secure = false}
|
|
document_root = "foo"
|
|
}
|
|
`, name)
|
|
}
|
|
|
|
func testAccAwsOpsworksApplicationUpdate(name string) string {
|
|
return testAccAwsOpsworksStackConfigVpcCreate(name) +
|
|
fmt.Sprintf(`
|
|
resource "aws_opsworks_application" "tf-acc-app" {
|
|
stack_id = "${aws_opsworks_stack.tf-acc.id}"
|
|
name = "%s"
|
|
type = "rails"
|
|
domains = ["example.com", "sub.example.com"]
|
|
enable_ssl = true
|
|
ssl_configuration = {
|
|
private_key = <<EOS
|
|
-----BEGIN RSA PRIVATE KEY-----
|
|
MIICXQIBAAKBgQCikCm00x/ybpc9esWOwK2JcyWAj3nUwsdW6Kbq8gsf/ndYAveD
|
|
LUXZT0qUJfJn3PYgXbV2yaaae90Ifw8y8zvTbNucWfpFEDIWyMi7Gggc7hBi4AGl
|
|
XRqTb0QcPvlKGLXdFO0HMxQK3kxix/J/PhSM7iOTHPjCdUym27eYBX0UswIDAQAB
|
|
AoGBAIYcrvuqDboguI8U4TUjCkfSAgds1pLLWk79wu8jXkA329d1IyNKT0y3WIye
|
|
PbyoEzmidZmZROQ/+ZsPz8c12Y0DrX73WSVzKNyJeP7XMk9HSzA1D9RX0U0S+5Kh
|
|
FAMc2NEVVFIfQtVtoVmHdKDpnRYtOCHLW9rRpvqOOjd4mYk5AkEAzeiFr1mtlnsa
|
|
67shMxzDaOTAFMchRz6G7aSovvCztxcB63ulFI/w9OTUMdTQ7ff7pet+lVihLc2W
|
|
efIL0HvsjQJBAMocNTKaR/TnsV5GSk2kPAdR+zFP5sQy8sfMy0lEXTylc7zN4ajX
|
|
MeHVoxp+GZgpfDcZ3ya808H1umyXh+xA1j8CQE9x9ZKQYT98RAjL7KVR5btk9w+N
|
|
PTPF1j1+mHUDXfO4ds8qp6jlWKzEVXLcj7ghRADiebaZuaZ4eiSW1SQdjEkCQQC4
|
|
wDhQ3X9RfEpCp3ZcqvjEqEg6t5N3XitYQPjDLN8eBRBbUsgpEy3iBuxl10eGNMX7
|
|
iIbYXlwkPYAArDPv3wT5AkAwp4vym+YKmDqh6gseKfRDuJqRiW9yD5A8VGr/w88k
|
|
5rkuduVGP7tK3uIp00Its3aEyKF8mLGWYszVGeeLxAMH
|
|
-----END RSA PRIVATE KEY-----
|
|
EOS
|
|
certificate = <<EOS
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIBkDCB+gIJALoScFD0sJq3MA0GCSqGSIb3DQEBBQUAMA0xCzAJBgNVBAYTAkRF
|
|
MB4XDTE1MTIxOTIwMzU1MVoXDTE2MDExODIwMzU1MVowDTELMAkGA1UEBhMCREUw
|
|
gZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAKKQKbTTH/Julz16xY7ArYlzJYCP
|
|
edTCx1bopuryCx/+d1gC94MtRdlPSpQl8mfc9iBdtXbJppp73Qh/DzLzO9Ns25xZ
|
|
+kUQMhbIyLsaCBzuEGLgAaVdGpNvRBw++UoYtd0U7QczFAreTGLH8n8+FIzuI5Mc
|
|
+MJ1TKbbt5gFfRSzAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEALARo96wCDmaHKCaX
|
|
S0IGLGnZCfiIUfCmBxOXBSJxDBwter95QHR0dMGxYIujee5n4vvavpVsqZnfMC3I
|
|
OZWPlwiUJbNIpK+04Bg2vd5m/NMMrvi75RfmyeMtSfq/NrIX2Q3+nyWI7DLq7yZI
|
|
V/YEvOqdAiy5NEWBztHx8HvB9G4=
|
|
-----END CERTIFICATE-----
|
|
EOS
|
|
}
|
|
app_source = {
|
|
type = "git"
|
|
revision = "master"
|
|
url = "https://github.com/aws/example.git"
|
|
}
|
|
environment = { key = "key1" value = "value1" secure = false}
|
|
environment = { key = "key2" value = "value2" }
|
|
document_root = "root"
|
|
auto_bundle_on_deploy = "true"
|
|
rails_env = "staging"
|
|
}
|
|
`, name)
|
|
}
|