github.com/codeherentuk/terraform@v0.11.12-beta1/backend/remote/backend_mock.go (about)

     1  package remote
     2  
     3  import (
     4  	"bytes"
     5  	"context"
     6  	"encoding/base64"
     7  	"errors"
     8  	"fmt"
     9  	"io"
    10  	"io/ioutil"
    11  	"math/rand"
    12  	"os"
    13  	"path/filepath"
    14  	"strings"
    15  	"time"
    16  
    17  	tfe "github.com/hashicorp/go-tfe"
    18  	"github.com/hashicorp/terraform/terraform"
    19  )
    20  
    21  type mockClient struct {
    22  	Applies               *mockApplies
    23  	ConfigurationVersions *mockConfigurationVersions
    24  	Organizations         *mockOrganizations
    25  	Plans                 *mockPlans
    26  	PolicyChecks          *mockPolicyChecks
    27  	Runs                  *mockRuns
    28  	StateVersions         *mockStateVersions
    29  	Workspaces            *mockWorkspaces
    30  }
    31  
    32  func newMockClient() *mockClient {
    33  	c := &mockClient{}
    34  	c.Applies = newMockApplies(c)
    35  	c.ConfigurationVersions = newMockConfigurationVersions(c)
    36  	c.Organizations = newMockOrganizations(c)
    37  	c.Plans = newMockPlans(c)
    38  	c.PolicyChecks = newMockPolicyChecks(c)
    39  	c.Runs = newMockRuns(c)
    40  	c.StateVersions = newMockStateVersions(c)
    41  	c.Workspaces = newMockWorkspaces(c)
    42  	return c
    43  }
    44  
    45  type mockApplies struct {
    46  	client  *mockClient
    47  	applies map[string]*tfe.Apply
    48  	logs    map[string]string
    49  }
    50  
    51  func newMockApplies(client *mockClient) *mockApplies {
    52  	return &mockApplies{
    53  		client:  client,
    54  		applies: make(map[string]*tfe.Apply),
    55  		logs:    make(map[string]string),
    56  	}
    57  }
    58  
    59  // create is a helper function to create a mock apply that uses the configured
    60  // working directory to find the logfile.
    61  func (m *mockApplies) create(cvID, workspaceID string) (*tfe.Apply, error) {
    62  	c, ok := m.client.ConfigurationVersions.configVersions[cvID]
    63  	if !ok {
    64  		return nil, tfe.ErrResourceNotFound
    65  	}
    66  	if c.Speculative {
    67  		// Speculative means its plan-only so we don't create a Apply.
    68  		return nil, nil
    69  	}
    70  
    71  	id := generateID("apply-")
    72  	url := fmt.Sprintf("https://app.terraform.io/_archivist/%s", id)
    73  
    74  	a := &tfe.Apply{
    75  		ID:         id,
    76  		LogReadURL: url,
    77  		Status:     tfe.ApplyPending,
    78  	}
    79  
    80  	w, ok := m.client.Workspaces.workspaceIDs[workspaceID]
    81  	if !ok {
    82  		return nil, tfe.ErrResourceNotFound
    83  	}
    84  
    85  	if w.AutoApply {
    86  		a.Status = tfe.ApplyRunning
    87  	}
    88  
    89  	m.logs[url] = filepath.Join(
    90  		m.client.ConfigurationVersions.uploadPaths[cvID],
    91  		w.WorkingDirectory,
    92  		"apply.log",
    93  	)
    94  	m.applies[a.ID] = a
    95  
    96  	return a, nil
    97  }
    98  
    99  func (m *mockApplies) Read(ctx context.Context, applyID string) (*tfe.Apply, error) {
   100  	a, ok := m.applies[applyID]
   101  	if !ok {
   102  		return nil, tfe.ErrResourceNotFound
   103  	}
   104  	// Together with the mockLogReader this allows testing queued runs.
   105  	if a.Status == tfe.ApplyRunning {
   106  		a.Status = tfe.ApplyFinished
   107  	}
   108  	return a, nil
   109  }
   110  
   111  func (m *mockApplies) Logs(ctx context.Context, applyID string) (io.Reader, error) {
   112  	a, err := m.Read(ctx, applyID)
   113  	if err != nil {
   114  		return nil, err
   115  	}
   116  
   117  	logfile, ok := m.logs[a.LogReadURL]
   118  	if !ok {
   119  		return nil, tfe.ErrResourceNotFound
   120  	}
   121  
   122  	if _, err := os.Stat(logfile); os.IsNotExist(err) {
   123  		return bytes.NewBufferString("logfile does not exist"), nil
   124  	}
   125  
   126  	logs, err := ioutil.ReadFile(logfile)
   127  	if err != nil {
   128  		return nil, err
   129  	}
   130  
   131  	done := func() (bool, error) {
   132  		a, err := m.Read(ctx, applyID)
   133  		if err != nil {
   134  			return false, err
   135  		}
   136  		if a.Status != tfe.ApplyFinished {
   137  			return false, nil
   138  		}
   139  		return true, nil
   140  	}
   141  
   142  	return &mockLogReader{
   143  		done: done,
   144  		logs: bytes.NewBuffer(logs),
   145  	}, nil
   146  }
   147  
   148  type mockConfigurationVersions struct {
   149  	client         *mockClient
   150  	configVersions map[string]*tfe.ConfigurationVersion
   151  	uploadPaths    map[string]string
   152  	uploadURLs     map[string]*tfe.ConfigurationVersion
   153  }
   154  
   155  func newMockConfigurationVersions(client *mockClient) *mockConfigurationVersions {
   156  	return &mockConfigurationVersions{
   157  		client:         client,
   158  		configVersions: make(map[string]*tfe.ConfigurationVersion),
   159  		uploadPaths:    make(map[string]string),
   160  		uploadURLs:     make(map[string]*tfe.ConfigurationVersion),
   161  	}
   162  }
   163  
   164  func (m *mockConfigurationVersions) List(ctx context.Context, workspaceID string, options tfe.ConfigurationVersionListOptions) (*tfe.ConfigurationVersionList, error) {
   165  	cvl := &tfe.ConfigurationVersionList{}
   166  	for _, cv := range m.configVersions {
   167  		cvl.Items = append(cvl.Items, cv)
   168  	}
   169  
   170  	cvl.Pagination = &tfe.Pagination{
   171  		CurrentPage:  1,
   172  		NextPage:     1,
   173  		PreviousPage: 1,
   174  		TotalPages:   1,
   175  		TotalCount:   len(cvl.Items),
   176  	}
   177  
   178  	return cvl, nil
   179  }
   180  
   181  func (m *mockConfigurationVersions) Create(ctx context.Context, workspaceID string, options tfe.ConfigurationVersionCreateOptions) (*tfe.ConfigurationVersion, error) {
   182  	id := generateID("cv-")
   183  	url := fmt.Sprintf("https://app.terraform.io/_archivist/%s", id)
   184  
   185  	cv := &tfe.ConfigurationVersion{
   186  		ID:        id,
   187  		Status:    tfe.ConfigurationPending,
   188  		UploadURL: url,
   189  	}
   190  
   191  	m.configVersions[cv.ID] = cv
   192  	m.uploadURLs[url] = cv
   193  
   194  	return cv, nil
   195  }
   196  
   197  func (m *mockConfigurationVersions) Read(ctx context.Context, cvID string) (*tfe.ConfigurationVersion, error) {
   198  	cv, ok := m.configVersions[cvID]
   199  	if !ok {
   200  		return nil, tfe.ErrResourceNotFound
   201  	}
   202  	return cv, nil
   203  }
   204  
   205  func (m *mockConfigurationVersions) Upload(ctx context.Context, url, path string) error {
   206  	cv, ok := m.uploadURLs[url]
   207  	if !ok {
   208  		return errors.New("404 not found")
   209  	}
   210  	m.uploadPaths[cv.ID] = path
   211  	cv.Status = tfe.ConfigurationUploaded
   212  	return nil
   213  }
   214  
   215  // mockInput is a mock implementation of terraform.UIInput.
   216  type mockInput struct {
   217  	answers map[string]string
   218  }
   219  
   220  func (m *mockInput) Input(opts *terraform.InputOpts) (string, error) {
   221  	v, ok := m.answers[opts.Id]
   222  	if !ok {
   223  		return "", fmt.Errorf("unexpected input request in test: %s", opts.Id)
   224  	}
   225  	delete(m.answers, opts.Id)
   226  	return v, nil
   227  }
   228  
   229  type mockOrganizations struct {
   230  	client        *mockClient
   231  	organizations map[string]*tfe.Organization
   232  }
   233  
   234  func newMockOrganizations(client *mockClient) *mockOrganizations {
   235  	return &mockOrganizations{
   236  		client:        client,
   237  		organizations: make(map[string]*tfe.Organization),
   238  	}
   239  }
   240  
   241  func (m *mockOrganizations) List(ctx context.Context, options tfe.OrganizationListOptions) (*tfe.OrganizationList, error) {
   242  	orgl := &tfe.OrganizationList{}
   243  	for _, org := range m.organizations {
   244  		orgl.Items = append(orgl.Items, org)
   245  	}
   246  
   247  	orgl.Pagination = &tfe.Pagination{
   248  		CurrentPage:  1,
   249  		NextPage:     1,
   250  		PreviousPage: 1,
   251  		TotalPages:   1,
   252  		TotalCount:   len(orgl.Items),
   253  	}
   254  
   255  	return orgl, nil
   256  }
   257  
   258  // mockLogReader is a mock logreader that enables testing queued runs.
   259  type mockLogReader struct {
   260  	done func() (bool, error)
   261  	logs *bytes.Buffer
   262  }
   263  
   264  func (m *mockLogReader) Read(l []byte) (int, error) {
   265  	for {
   266  		if written, err := m.read(l); err != io.ErrNoProgress {
   267  			return written, err
   268  		}
   269  		time.Sleep(500 * time.Millisecond)
   270  	}
   271  }
   272  
   273  func (m *mockLogReader) read(l []byte) (int, error) {
   274  	done, err := m.done()
   275  	if err != nil {
   276  		return 0, err
   277  	}
   278  	if !done {
   279  		return 0, io.ErrNoProgress
   280  	}
   281  	return m.logs.Read(l)
   282  }
   283  
   284  func (m *mockOrganizations) Create(ctx context.Context, options tfe.OrganizationCreateOptions) (*tfe.Organization, error) {
   285  	org := &tfe.Organization{Name: *options.Name}
   286  	m.organizations[org.Name] = org
   287  	return org, nil
   288  }
   289  
   290  func (m *mockOrganizations) Read(ctx context.Context, name string) (*tfe.Organization, error) {
   291  	org, ok := m.organizations[name]
   292  	if !ok {
   293  		return nil, tfe.ErrResourceNotFound
   294  	}
   295  	return org, nil
   296  }
   297  
   298  func (m *mockOrganizations) Update(ctx context.Context, name string, options tfe.OrganizationUpdateOptions) (*tfe.Organization, error) {
   299  	org, ok := m.organizations[name]
   300  	if !ok {
   301  		return nil, tfe.ErrResourceNotFound
   302  	}
   303  	org.Name = *options.Name
   304  	return org, nil
   305  
   306  }
   307  
   308  func (m *mockOrganizations) Delete(ctx context.Context, name string) error {
   309  	delete(m.organizations, name)
   310  	return nil
   311  }
   312  
   313  func (m *mockOrganizations) Capacity(ctx context.Context, name string) (*tfe.Capacity, error) {
   314  	var pending, running int
   315  	for _, r := range m.client.Runs.runs {
   316  		if r.Status == tfe.RunPending {
   317  			pending++
   318  			continue
   319  		}
   320  		running++
   321  	}
   322  	return &tfe.Capacity{Pending: pending, Running: running}, nil
   323  }
   324  
   325  func (m *mockOrganizations) Entitlements(ctx context.Context, name string) (*tfe.Entitlements, error) {
   326  	return &tfe.Entitlements{
   327  		Operations:            true,
   328  		PrivateModuleRegistry: true,
   329  		Sentinel:              true,
   330  		StateStorage:          true,
   331  		Teams:                 true,
   332  		VCSIntegrations:       true,
   333  	}, nil
   334  }
   335  
   336  func (m *mockOrganizations) RunQueue(ctx context.Context, name string, options tfe.RunQueueOptions) (*tfe.RunQueue, error) {
   337  	rq := &tfe.RunQueue{}
   338  
   339  	for _, r := range m.client.Runs.runs {
   340  		rq.Items = append(rq.Items, r)
   341  	}
   342  
   343  	rq.Pagination = &tfe.Pagination{
   344  		CurrentPage:  1,
   345  		NextPage:     1,
   346  		PreviousPage: 1,
   347  		TotalPages:   1,
   348  		TotalCount:   len(rq.Items),
   349  	}
   350  
   351  	return rq, nil
   352  }
   353  
   354  type mockPlans struct {
   355  	client *mockClient
   356  	logs   map[string]string
   357  	plans  map[string]*tfe.Plan
   358  }
   359  
   360  func newMockPlans(client *mockClient) *mockPlans {
   361  	return &mockPlans{
   362  		client: client,
   363  		logs:   make(map[string]string),
   364  		plans:  make(map[string]*tfe.Plan),
   365  	}
   366  }
   367  
   368  // create is a helper function to create a mock plan that uses the configured
   369  // working directory to find the logfile.
   370  func (m *mockPlans) create(cvID, workspaceID string) (*tfe.Plan, error) {
   371  	id := generateID("plan-")
   372  	url := fmt.Sprintf("https://app.terraform.io/_archivist/%s", id)
   373  
   374  	p := &tfe.Plan{
   375  		ID:         id,
   376  		LogReadURL: url,
   377  		Status:     tfe.PlanPending,
   378  	}
   379  
   380  	w, ok := m.client.Workspaces.workspaceIDs[workspaceID]
   381  	if !ok {
   382  		return nil, tfe.ErrResourceNotFound
   383  	}
   384  
   385  	m.logs[url] = filepath.Join(
   386  		m.client.ConfigurationVersions.uploadPaths[cvID],
   387  		w.WorkingDirectory,
   388  		"plan.log",
   389  	)
   390  	m.plans[p.ID] = p
   391  
   392  	return p, nil
   393  }
   394  
   395  func (m *mockPlans) Read(ctx context.Context, planID string) (*tfe.Plan, error) {
   396  	p, ok := m.plans[planID]
   397  	if !ok {
   398  		return nil, tfe.ErrResourceNotFound
   399  	}
   400  	// Together with the mockLogReader this allows testing queued runs.
   401  	if p.Status == tfe.PlanRunning {
   402  		p.Status = tfe.PlanFinished
   403  	}
   404  	return p, nil
   405  }
   406  
   407  func (m *mockPlans) Logs(ctx context.Context, planID string) (io.Reader, error) {
   408  	p, err := m.Read(ctx, planID)
   409  	if err != nil {
   410  		return nil, err
   411  	}
   412  
   413  	logfile, ok := m.logs[p.LogReadURL]
   414  	if !ok {
   415  		return nil, tfe.ErrResourceNotFound
   416  	}
   417  
   418  	if _, err := os.Stat(logfile); os.IsNotExist(err) {
   419  		return bytes.NewBufferString("logfile does not exist"), nil
   420  	}
   421  
   422  	logs, err := ioutil.ReadFile(logfile)
   423  	if err != nil {
   424  		return nil, err
   425  	}
   426  
   427  	done := func() (bool, error) {
   428  		p, err := m.Read(ctx, planID)
   429  		if err != nil {
   430  			return false, err
   431  		}
   432  		if p.Status != tfe.PlanFinished {
   433  			return false, nil
   434  		}
   435  		return true, nil
   436  	}
   437  
   438  	return &mockLogReader{
   439  		done: done,
   440  		logs: bytes.NewBuffer(logs),
   441  	}, nil
   442  }
   443  
   444  type mockPolicyChecks struct {
   445  	client *mockClient
   446  	checks map[string]*tfe.PolicyCheck
   447  	logs   map[string]string
   448  }
   449  
   450  func newMockPolicyChecks(client *mockClient) *mockPolicyChecks {
   451  	return &mockPolicyChecks{
   452  		client: client,
   453  		checks: make(map[string]*tfe.PolicyCheck),
   454  		logs:   make(map[string]string),
   455  	}
   456  }
   457  
   458  // create is a helper function to create a mock policy check that uses the
   459  // configured working directory to find the logfile.
   460  func (m *mockPolicyChecks) create(cvID, workspaceID string) (*tfe.PolicyCheck, error) {
   461  	id := generateID("pc-")
   462  
   463  	pc := &tfe.PolicyCheck{
   464  		ID:          id,
   465  		Actions:     &tfe.PolicyActions{},
   466  		Permissions: &tfe.PolicyPermissions{},
   467  		Scope:       tfe.PolicyScopeOrganization,
   468  		Status:      tfe.PolicyPending,
   469  	}
   470  
   471  	w, ok := m.client.Workspaces.workspaceIDs[workspaceID]
   472  	if !ok {
   473  		return nil, tfe.ErrResourceNotFound
   474  	}
   475  
   476  	logfile := filepath.Join(
   477  		m.client.ConfigurationVersions.uploadPaths[cvID],
   478  		w.WorkingDirectory,
   479  		"policy.log",
   480  	)
   481  
   482  	if _, err := os.Stat(logfile); os.IsNotExist(err) {
   483  		return nil, nil
   484  	}
   485  
   486  	m.logs[pc.ID] = logfile
   487  	m.checks[pc.ID] = pc
   488  
   489  	return pc, nil
   490  }
   491  
   492  func (m *mockPolicyChecks) List(ctx context.Context, runID string, options tfe.PolicyCheckListOptions) (*tfe.PolicyCheckList, error) {
   493  	_, ok := m.client.Runs.runs[runID]
   494  	if !ok {
   495  		return nil, tfe.ErrResourceNotFound
   496  	}
   497  
   498  	pcl := &tfe.PolicyCheckList{}
   499  	for _, pc := range m.checks {
   500  		pcl.Items = append(pcl.Items, pc)
   501  	}
   502  
   503  	pcl.Pagination = &tfe.Pagination{
   504  		CurrentPage:  1,
   505  		NextPage:     1,
   506  		PreviousPage: 1,
   507  		TotalPages:   1,
   508  		TotalCount:   len(pcl.Items),
   509  	}
   510  
   511  	return pcl, nil
   512  }
   513  
   514  func (m *mockPolicyChecks) Read(ctx context.Context, policyCheckID string) (*tfe.PolicyCheck, error) {
   515  	pc, ok := m.checks[policyCheckID]
   516  	if !ok {
   517  		return nil, tfe.ErrResourceNotFound
   518  	}
   519  
   520  	logfile, ok := m.logs[pc.ID]
   521  	if !ok {
   522  		return nil, tfe.ErrResourceNotFound
   523  	}
   524  
   525  	if _, err := os.Stat(logfile); os.IsNotExist(err) {
   526  		return nil, fmt.Errorf("logfile does not exist")
   527  	}
   528  
   529  	logs, err := ioutil.ReadFile(logfile)
   530  	if err != nil {
   531  		return nil, err
   532  	}
   533  
   534  	switch {
   535  	case bytes.Contains(logs, []byte("Sentinel Result: true")):
   536  		pc.Status = tfe.PolicyPasses
   537  	case bytes.Contains(logs, []byte("Sentinel Result: false")):
   538  		switch {
   539  		case bytes.Contains(logs, []byte("hard-mandatory")):
   540  			pc.Status = tfe.PolicyHardFailed
   541  		case bytes.Contains(logs, []byte("soft-mandatory")):
   542  			pc.Actions.IsOverridable = true
   543  			pc.Permissions.CanOverride = true
   544  			pc.Status = tfe.PolicySoftFailed
   545  		}
   546  	default:
   547  		// As this is an unexpected state, we say the policy errored.
   548  		pc.Status = tfe.PolicyErrored
   549  	}
   550  
   551  	return pc, nil
   552  }
   553  
   554  func (m *mockPolicyChecks) Override(ctx context.Context, policyCheckID string) (*tfe.PolicyCheck, error) {
   555  	pc, ok := m.checks[policyCheckID]
   556  	if !ok {
   557  		return nil, tfe.ErrResourceNotFound
   558  	}
   559  	pc.Status = tfe.PolicyOverridden
   560  	return pc, nil
   561  }
   562  
   563  func (m *mockPolicyChecks) Logs(ctx context.Context, policyCheckID string) (io.Reader, error) {
   564  	pc, ok := m.checks[policyCheckID]
   565  	if !ok {
   566  		return nil, tfe.ErrResourceNotFound
   567  	}
   568  
   569  	logfile, ok := m.logs[pc.ID]
   570  	if !ok {
   571  		return nil, tfe.ErrResourceNotFound
   572  	}
   573  
   574  	if _, err := os.Stat(logfile); os.IsNotExist(err) {
   575  		return bytes.NewBufferString("logfile does not exist"), nil
   576  	}
   577  
   578  	logs, err := ioutil.ReadFile(logfile)
   579  	if err != nil {
   580  		return nil, err
   581  	}
   582  
   583  	switch {
   584  	case bytes.Contains(logs, []byte("Sentinel Result: true")):
   585  		pc.Status = tfe.PolicyPasses
   586  	case bytes.Contains(logs, []byte("Sentinel Result: false")):
   587  		switch {
   588  		case bytes.Contains(logs, []byte("hard-mandatory")):
   589  			pc.Status = tfe.PolicyHardFailed
   590  		case bytes.Contains(logs, []byte("soft-mandatory")):
   591  			pc.Actions.IsOverridable = true
   592  			pc.Permissions.CanOverride = true
   593  			pc.Status = tfe.PolicySoftFailed
   594  		}
   595  	default:
   596  		// As this is an unexpected state, we say the policy errored.
   597  		pc.Status = tfe.PolicyErrored
   598  	}
   599  
   600  	return bytes.NewBuffer(logs), nil
   601  }
   602  
   603  type mockRuns struct {
   604  	client     *mockClient
   605  	runs       map[string]*tfe.Run
   606  	workspaces map[string][]*tfe.Run
   607  }
   608  
   609  func newMockRuns(client *mockClient) *mockRuns {
   610  	return &mockRuns{
   611  		client:     client,
   612  		runs:       make(map[string]*tfe.Run),
   613  		workspaces: make(map[string][]*tfe.Run),
   614  	}
   615  }
   616  
   617  func (m *mockRuns) List(ctx context.Context, workspaceID string, options tfe.RunListOptions) (*tfe.RunList, error) {
   618  	w, ok := m.client.Workspaces.workspaceIDs[workspaceID]
   619  	if !ok {
   620  		return nil, tfe.ErrResourceNotFound
   621  	}
   622  
   623  	rl := &tfe.RunList{}
   624  	for _, r := range m.workspaces[w.ID] {
   625  		rl.Items = append(rl.Items, r)
   626  	}
   627  
   628  	rl.Pagination = &tfe.Pagination{
   629  		CurrentPage:  1,
   630  		NextPage:     1,
   631  		PreviousPage: 1,
   632  		TotalPages:   1,
   633  		TotalCount:   len(rl.Items),
   634  	}
   635  
   636  	return rl, nil
   637  }
   638  
   639  func (m *mockRuns) Create(ctx context.Context, options tfe.RunCreateOptions) (*tfe.Run, error) {
   640  	a, err := m.client.Applies.create(options.ConfigurationVersion.ID, options.Workspace.ID)
   641  	if err != nil {
   642  		return nil, err
   643  	}
   644  
   645  	p, err := m.client.Plans.create(options.ConfigurationVersion.ID, options.Workspace.ID)
   646  	if err != nil {
   647  		return nil, err
   648  	}
   649  
   650  	pc, err := m.client.PolicyChecks.create(options.ConfigurationVersion.ID, options.Workspace.ID)
   651  	if err != nil {
   652  		return nil, err
   653  	}
   654  
   655  	r := &tfe.Run{
   656  		ID:          generateID("run-"),
   657  		Actions:     &tfe.RunActions{IsCancelable: true},
   658  		Apply:       a,
   659  		HasChanges:  false,
   660  		Permissions: &tfe.RunPermissions{},
   661  		Plan:        p,
   662  		Status:      tfe.RunPending,
   663  	}
   664  
   665  	if pc != nil {
   666  		r.PolicyChecks = []*tfe.PolicyCheck{pc}
   667  	}
   668  
   669  	if options.IsDestroy != nil {
   670  		r.IsDestroy = *options.IsDestroy
   671  	}
   672  
   673  	w, ok := m.client.Workspaces.workspaceIDs[options.Workspace.ID]
   674  	if !ok {
   675  		return nil, tfe.ErrResourceNotFound
   676  	}
   677  	if w.CurrentRun == nil {
   678  		w.CurrentRun = r
   679  	}
   680  
   681  	m.runs[r.ID] = r
   682  	m.workspaces[options.Workspace.ID] = append(m.workspaces[options.Workspace.ID], r)
   683  
   684  	return r, nil
   685  }
   686  
   687  func (m *mockRuns) Read(ctx context.Context, runID string) (*tfe.Run, error) {
   688  	r, ok := m.runs[runID]
   689  	if !ok {
   690  		return nil, tfe.ErrResourceNotFound
   691  	}
   692  
   693  	pending := false
   694  	for _, r := range m.runs {
   695  		if r.ID != runID && r.Status == tfe.RunPending {
   696  			pending = true
   697  			break
   698  		}
   699  	}
   700  
   701  	if !pending && r.Status == tfe.RunPending {
   702  		// Only update the status if there are no other pending runs.
   703  		r.Status = tfe.RunPlanning
   704  		r.Plan.Status = tfe.PlanRunning
   705  	}
   706  
   707  	logs, _ := ioutil.ReadFile(m.client.Plans.logs[r.Plan.LogReadURL])
   708  	if r.Plan.Status == tfe.PlanFinished {
   709  		if r.IsDestroy || bytes.Contains(logs, []byte("1 to add, 0 to change, 0 to destroy")) {
   710  			r.Actions.IsCancelable = false
   711  			r.Actions.IsConfirmable = true
   712  			r.HasChanges = true
   713  			r.Permissions.CanApply = true
   714  		}
   715  
   716  		if bytes.Contains(logs, []byte("null_resource.foo: 1 error")) {
   717  			r.Actions.IsCancelable = false
   718  			r.HasChanges = false
   719  			r.Status = tfe.RunErrored
   720  		}
   721  	}
   722  
   723  	return r, nil
   724  }
   725  
   726  func (m *mockRuns) Apply(ctx context.Context, runID string, options tfe.RunApplyOptions) error {
   727  	r, ok := m.runs[runID]
   728  	if !ok {
   729  		return tfe.ErrResourceNotFound
   730  	}
   731  	if r.Status != tfe.RunPending {
   732  		// Only update the status if the run is not pending anymore.
   733  		r.Status = tfe.RunApplying
   734  		r.Apply.Status = tfe.ApplyRunning
   735  	}
   736  	return nil
   737  }
   738  
   739  func (m *mockRuns) Cancel(ctx context.Context, runID string, options tfe.RunCancelOptions) error {
   740  	panic("not implemented")
   741  }
   742  
   743  func (m *mockRuns) ForceCancel(ctx context.Context, runID string, options tfe.RunForceCancelOptions) error {
   744  	panic("not implemented")
   745  }
   746  
   747  func (m *mockRuns) Discard(ctx context.Context, runID string, options tfe.RunDiscardOptions) error {
   748  	panic("not implemented")
   749  }
   750  
   751  type mockStateVersions struct {
   752  	client        *mockClient
   753  	states        map[string][]byte
   754  	stateVersions map[string]*tfe.StateVersion
   755  	workspaces    map[string][]string
   756  }
   757  
   758  func newMockStateVersions(client *mockClient) *mockStateVersions {
   759  	return &mockStateVersions{
   760  		client:        client,
   761  		states:        make(map[string][]byte),
   762  		stateVersions: make(map[string]*tfe.StateVersion),
   763  		workspaces:    make(map[string][]string),
   764  	}
   765  }
   766  
   767  func (m *mockStateVersions) List(ctx context.Context, options tfe.StateVersionListOptions) (*tfe.StateVersionList, error) {
   768  	svl := &tfe.StateVersionList{}
   769  	for _, sv := range m.stateVersions {
   770  		svl.Items = append(svl.Items, sv)
   771  	}
   772  
   773  	svl.Pagination = &tfe.Pagination{
   774  		CurrentPage:  1,
   775  		NextPage:     1,
   776  		PreviousPage: 1,
   777  		TotalPages:   1,
   778  		TotalCount:   len(svl.Items),
   779  	}
   780  
   781  	return svl, nil
   782  }
   783  
   784  func (m *mockStateVersions) Create(ctx context.Context, workspaceID string, options tfe.StateVersionCreateOptions) (*tfe.StateVersion, error) {
   785  	id := generateID("sv-")
   786  	runID := os.Getenv("TFE_RUN_ID")
   787  	url := fmt.Sprintf("https://app.terraform.io/_archivist/%s", id)
   788  
   789  	if runID != "" && (options.Run == nil || runID != options.Run.ID) {
   790  		return nil, fmt.Errorf("option.Run.ID does not contain the ID exported by TFE_RUN_ID")
   791  	}
   792  
   793  	sv := &tfe.StateVersion{
   794  		ID:          id,
   795  		DownloadURL: url,
   796  		Serial:      *options.Serial,
   797  	}
   798  
   799  	state, err := base64.StdEncoding.DecodeString(*options.State)
   800  	if err != nil {
   801  		return nil, err
   802  	}
   803  
   804  	m.states[sv.DownloadURL] = state
   805  	m.stateVersions[sv.ID] = sv
   806  	m.workspaces[workspaceID] = append(m.workspaces[workspaceID], sv.ID)
   807  
   808  	return sv, nil
   809  }
   810  
   811  func (m *mockStateVersions) Read(ctx context.Context, svID string) (*tfe.StateVersion, error) {
   812  	sv, ok := m.stateVersions[svID]
   813  	if !ok {
   814  		return nil, tfe.ErrResourceNotFound
   815  	}
   816  	return sv, nil
   817  }
   818  
   819  func (m *mockStateVersions) Current(ctx context.Context, workspaceID string) (*tfe.StateVersion, error) {
   820  	w, ok := m.client.Workspaces.workspaceIDs[workspaceID]
   821  	if !ok {
   822  		return nil, tfe.ErrResourceNotFound
   823  	}
   824  
   825  	svs, ok := m.workspaces[w.ID]
   826  	if !ok || len(svs) == 0 {
   827  		return nil, tfe.ErrResourceNotFound
   828  	}
   829  
   830  	sv, ok := m.stateVersions[svs[len(svs)-1]]
   831  	if !ok {
   832  		return nil, tfe.ErrResourceNotFound
   833  	}
   834  
   835  	return sv, nil
   836  }
   837  
   838  func (m *mockStateVersions) Download(ctx context.Context, url string) ([]byte, error) {
   839  	state, ok := m.states[url]
   840  	if !ok {
   841  		return nil, tfe.ErrResourceNotFound
   842  	}
   843  	return state, nil
   844  }
   845  
   846  type mockWorkspaces struct {
   847  	client         *mockClient
   848  	workspaceIDs   map[string]*tfe.Workspace
   849  	workspaceNames map[string]*tfe.Workspace
   850  }
   851  
   852  func newMockWorkspaces(client *mockClient) *mockWorkspaces {
   853  	return &mockWorkspaces{
   854  		client:         client,
   855  		workspaceIDs:   make(map[string]*tfe.Workspace),
   856  		workspaceNames: make(map[string]*tfe.Workspace),
   857  	}
   858  }
   859  
   860  func (m *mockWorkspaces) List(ctx context.Context, organization string, options tfe.WorkspaceListOptions) (*tfe.WorkspaceList, error) {
   861  	dummyWorkspaces := 10
   862  	wl := &tfe.WorkspaceList{}
   863  
   864  	// Get the prefix from the search options.
   865  	prefix := ""
   866  	if options.Search != nil {
   867  		prefix = *options.Search
   868  	}
   869  
   870  	// Get all the workspaces that match the prefix.
   871  	var ws []*tfe.Workspace
   872  	for _, w := range m.workspaceIDs {
   873  		if strings.HasPrefix(w.Name, prefix) {
   874  			ws = append(ws, w)
   875  		}
   876  	}
   877  
   878  	// Return an empty result if we have no matches.
   879  	if len(ws) == 0 {
   880  		wl.Pagination = &tfe.Pagination{
   881  			CurrentPage: 1,
   882  		}
   883  		return wl, nil
   884  	}
   885  
   886  	// Return dummy workspaces for the first page to test pagination.
   887  	if options.PageNumber <= 1 {
   888  		for i := 0; i < dummyWorkspaces; i++ {
   889  			wl.Items = append(wl.Items, &tfe.Workspace{
   890  				ID:   generateID("ws-"),
   891  				Name: fmt.Sprintf("dummy-workspace-%d", i),
   892  			})
   893  		}
   894  
   895  		wl.Pagination = &tfe.Pagination{
   896  			CurrentPage: 1,
   897  			NextPage:    2,
   898  			TotalPages:  2,
   899  			TotalCount:  len(wl.Items) + len(ws),
   900  		}
   901  
   902  		return wl, nil
   903  	}
   904  
   905  	// Return the actual workspaces that matched as the second page.
   906  	wl.Items = ws
   907  	wl.Pagination = &tfe.Pagination{
   908  		CurrentPage:  2,
   909  		PreviousPage: 1,
   910  		TotalPages:   2,
   911  		TotalCount:   len(wl.Items) + dummyWorkspaces,
   912  	}
   913  
   914  	return wl, nil
   915  }
   916  
   917  func (m *mockWorkspaces) Create(ctx context.Context, organization string, options tfe.WorkspaceCreateOptions) (*tfe.Workspace, error) {
   918  	w := &tfe.Workspace{
   919  		ID:         generateID("ws-"),
   920  		Name:       *options.Name,
   921  		Operations: !strings.HasSuffix(*options.Name, "no-operations"),
   922  		Permissions: &tfe.WorkspacePermissions{
   923  			CanQueueRun: true,
   924  			CanUpdate:   true,
   925  		},
   926  	}
   927  	if options.AutoApply != nil {
   928  		w.AutoApply = *options.AutoApply
   929  	}
   930  	if options.VCSRepo != nil {
   931  		w.VCSRepo = &tfe.VCSRepo{}
   932  	}
   933  	m.workspaceIDs[w.ID] = w
   934  	m.workspaceNames[w.Name] = w
   935  	return w, nil
   936  }
   937  
   938  func (m *mockWorkspaces) Read(ctx context.Context, organization, workspace string) (*tfe.Workspace, error) {
   939  	w, ok := m.workspaceNames[workspace]
   940  	if !ok {
   941  		return nil, tfe.ErrResourceNotFound
   942  	}
   943  	return w, nil
   944  }
   945  
   946  func (m *mockWorkspaces) Update(ctx context.Context, organization, workspace string, options tfe.WorkspaceUpdateOptions) (*tfe.Workspace, error) {
   947  	w, ok := m.workspaceNames[workspace]
   948  	if !ok {
   949  		return nil, tfe.ErrResourceNotFound
   950  	}
   951  
   952  	if options.Name != nil {
   953  		w.Name = *options.Name
   954  	}
   955  	if options.TerraformVersion != nil {
   956  		w.TerraformVersion = *options.TerraformVersion
   957  	}
   958  	if options.WorkingDirectory != nil {
   959  		w.WorkingDirectory = *options.WorkingDirectory
   960  	}
   961  
   962  	delete(m.workspaceNames, workspace)
   963  	m.workspaceNames[w.Name] = w
   964  
   965  	return w, nil
   966  }
   967  
   968  func (m *mockWorkspaces) Delete(ctx context.Context, organization, workspace string) error {
   969  	if w, ok := m.workspaceNames[workspace]; ok {
   970  		delete(m.workspaceIDs, w.ID)
   971  	}
   972  	delete(m.workspaceNames, workspace)
   973  	return nil
   974  }
   975  
   976  func (m *mockWorkspaces) Lock(ctx context.Context, workspaceID string, options tfe.WorkspaceLockOptions) (*tfe.Workspace, error) {
   977  	w, ok := m.workspaceIDs[workspaceID]
   978  	if !ok {
   979  		return nil, tfe.ErrResourceNotFound
   980  	}
   981  	if w.Locked {
   982  		return nil, tfe.ErrWorkspaceLocked
   983  	}
   984  	w.Locked = true
   985  	return w, nil
   986  }
   987  
   988  func (m *mockWorkspaces) Unlock(ctx context.Context, workspaceID string) (*tfe.Workspace, error) {
   989  	w, ok := m.workspaceIDs[workspaceID]
   990  	if !ok {
   991  		return nil, tfe.ErrResourceNotFound
   992  	}
   993  	if !w.Locked {
   994  		return nil, tfe.ErrWorkspaceNotLocked
   995  	}
   996  	w.Locked = false
   997  	return w, nil
   998  }
   999  
  1000  func (m *mockWorkspaces) ForceUnlock(ctx context.Context, workspaceID string) (*tfe.Workspace, error) {
  1001  	w, ok := m.workspaceIDs[workspaceID]
  1002  	if !ok {
  1003  		return nil, tfe.ErrResourceNotFound
  1004  	}
  1005  	if !w.Locked {
  1006  		return nil, tfe.ErrWorkspaceNotLocked
  1007  	}
  1008  	w.Locked = false
  1009  	return w, nil
  1010  }
  1011  
  1012  func (m *mockWorkspaces) AssignSSHKey(ctx context.Context, workspaceID string, options tfe.WorkspaceAssignSSHKeyOptions) (*tfe.Workspace, error) {
  1013  	panic("not implemented")
  1014  }
  1015  
  1016  func (m *mockWorkspaces) UnassignSSHKey(ctx context.Context, workspaceID string) (*tfe.Workspace, error) {
  1017  	panic("not implemented")
  1018  }
  1019  
  1020  const alphanumeric = "abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789"
  1021  
  1022  func generateID(s string) string {
  1023  	b := make([]byte, 16)
  1024  	for i := range b {
  1025  		b[i] = alphanumeric[rand.Intn(len(alphanumeric))]
  1026  	}
  1027  	return s + string(b)
  1028  }