mirror of
https://github.com/opentofu/opentofu.git
synced 2025-01-06 14:13:16 -06:00
ec85fb1960
This is part of a general effort to move all of Terraform's non-library package surface under internal in order to reinforce that these are for internal use within Terraform only. If you were previously importing packages under this prefix into an external codebase, you could pin to an earlier release tag as an interim solution until you've make a plan to achieve the same functionality some other way.
181 lines
4.7 KiB
Go
181 lines
4.7 KiB
Go
package ssh
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/zclconf/go-cty/cty"
|
|
)
|
|
|
|
func TestProvisioner_connInfo(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"certificate": cty.StringVal("somecertificate"),
|
|
"host": cty.StringVal("127.0.0.1"),
|
|
"port": cty.StringVal("22"),
|
|
"timeout": cty.StringVal("30s"),
|
|
"bastion_host": cty.StringVal("127.0.1.1"),
|
|
"bastion_port": cty.NumberIntVal(20022),
|
|
})
|
|
|
|
conf, err := parseConnectionInfo(v)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.User != "root" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Password != "supersecret" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.PrivateKey != "someprivatekeycontents" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Certificate != "somecertificate" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Host != "127.0.0.1" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Port != 22 {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.Timeout != "30s" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.ScriptPath != DefaultUnixScriptPath {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.TargetPlatform != TargetPlatformUnix {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionHost != "127.0.1.1" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPort != 20022 {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionUser != "root" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPassword != "supersecret" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
if conf.BastionPrivateKey != "someprivatekeycontents" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoIpv6(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"host": cty.StringVal("::1"),
|
|
"port": cty.StringVal("22"),
|
|
"timeout": cty.StringVal("30s"),
|
|
"bastion_host": cty.StringVal("::1"),
|
|
})
|
|
|
|
conf, err := parseConnectionInfo(v)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.Host != "[::1]" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
|
|
if conf.BastionHost != "[::1]" {
|
|
t.Fatalf("bad %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoHostname(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"host": cty.StringVal("example.com"),
|
|
"port": cty.StringVal("22"),
|
|
"timeout": cty.StringVal("30s"),
|
|
"bastion_host": cty.StringVal("example.com"),
|
|
})
|
|
|
|
conf, err := parseConnectionInfo(v)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.Host != "example.com" {
|
|
t.Fatalf("bad: %v", conf)
|
|
}
|
|
|
|
if conf.BastionHost != "example.com" {
|
|
t.Fatalf("bad %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_connInfoEmptyHostname(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"port": cty.StringVal("22"),
|
|
"timeout": cty.StringVal("30s"),
|
|
})
|
|
|
|
_, err := parseConnectionInfo(v)
|
|
if err == nil {
|
|
t.Fatalf("bad: should not allow empty host")
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_stringBastionPort(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"host": cty.StringVal("example.com"),
|
|
"port": cty.StringVal("22"),
|
|
"timeout": cty.StringVal("30s"),
|
|
"bastion_host": cty.StringVal("example.com"),
|
|
"bastion_port": cty.StringVal("12345"),
|
|
})
|
|
|
|
conf, err := parseConnectionInfo(v)
|
|
if err != nil {
|
|
t.Fatalf("err: %v", err)
|
|
}
|
|
|
|
if conf.BastionPort != 12345 {
|
|
t.Fatalf("bad %v", conf)
|
|
}
|
|
}
|
|
|
|
func TestProvisioner_invalidPortNumber(t *testing.T) {
|
|
v := cty.ObjectVal(map[string]cty.Value{
|
|
"type": cty.StringVal("ssh"),
|
|
"user": cty.StringVal("root"),
|
|
"password": cty.StringVal("supersecret"),
|
|
"private_key": cty.StringVal("someprivatekeycontents"),
|
|
"host": cty.StringVal("example.com"),
|
|
"port": cty.NumberIntVal(123456789),
|
|
})
|
|
|
|
_, err := parseConnectionInfo(v)
|
|
if err == nil {
|
|
t.Fatalf("bad: should not allow invalid port number")
|
|
}
|
|
if got, want := err.Error(), "value must be a whole number, between 0 and 65535 inclusive"; got != want {
|
|
t.Errorf("unexpected error\n got: %s\nwant: %s", got, want)
|
|
}
|
|
}
|