github.com/loicalbertin/terraform@v0.6.15-0.20170626182346-8e2583055467/backend/testing.go (about)

     1  package backend
     2  
     3  import (
     4  	"reflect"
     5  	"sort"
     6  	"testing"
     7  
     8  	"github.com/hashicorp/terraform/config"
     9  	"github.com/hashicorp/terraform/state"
    10  	"github.com/hashicorp/terraform/terraform"
    11  )
    12  
    13  // TestBackendConfig validates and configures the backend with the
    14  // given configuration.
    15  func TestBackendConfig(t *testing.T, b Backend, c map[string]interface{}) Backend {
    16  	// Get the proper config structure
    17  	rc, err := config.NewRawConfig(c)
    18  	if err != nil {
    19  		t.Fatalf("bad: %s", err)
    20  	}
    21  	conf := terraform.NewResourceConfig(rc)
    22  
    23  	// Validate
    24  	warns, errs := b.Validate(conf)
    25  	if len(warns) > 0 {
    26  		t.Fatalf("warnings: %s", warns)
    27  	}
    28  	if len(errs) > 0 {
    29  		t.Fatalf("errors: %s", errs)
    30  	}
    31  
    32  	// Configure
    33  	if err := b.Configure(conf); err != nil {
    34  		t.Fatalf("err: %s", err)
    35  	}
    36  
    37  	return b
    38  }
    39  
    40  // TestBackend will test the functionality of a Backend. The backend is
    41  // assumed to already be configured. This will test state functionality.
    42  // If the backend reports it doesn't support multi-state by returning the
    43  // error ErrNamedStatesNotSupported, then it will not test that.
    44  //
    45  // If you want to test locking, two backends must be given. If b2 is nil,
    46  // then state lockign won't be tested.
    47  func TestBackend(t *testing.T, b1, b2 Backend) {
    48  	testBackendStates(t, b1)
    49  
    50  	if b2 != nil {
    51  		testBackendStateLock(t, b1, b2)
    52  	}
    53  }
    54  
    55  func testBackendStates(t *testing.T, b Backend) {
    56  	states, err := b.States()
    57  	if err == ErrNamedStatesNotSupported {
    58  		t.Logf("TestBackend: named states not supported in %T, skipping", b)
    59  		return
    60  	}
    61  
    62  	// Test it starts with only the default
    63  	if len(states) != 1 || states[0] != DefaultStateName {
    64  		t.Fatalf("should only have default to start: %#v", states)
    65  	}
    66  
    67  	// Create a couple states
    68  	foo, err := b.State("foo")
    69  	if err != nil {
    70  		t.Fatalf("error: %s", err)
    71  	}
    72  	if err := foo.RefreshState(); err != nil {
    73  		t.Fatalf("bad: %s", err)
    74  	}
    75  	if v := foo.State(); v.HasResources() {
    76  		t.Fatalf("should be empty: %s", v)
    77  	}
    78  
    79  	bar, err := b.State("bar")
    80  	if err != nil {
    81  		t.Fatalf("error: %s", err)
    82  	}
    83  	if err := bar.RefreshState(); err != nil {
    84  		t.Fatalf("bad: %s", err)
    85  	}
    86  	if v := bar.State(); v.HasResources() {
    87  		t.Fatalf("should be empty: %s", v)
    88  	}
    89  
    90  	// Verify they are distinct states that can be read back from storage
    91  	{
    92  		// start with a fresh state, and record the lineage being
    93  		// written to "bar"
    94  		barState := terraform.NewState()
    95  		barLineage := barState.Lineage
    96  
    97  		// the foo lineage should be distinct from bar, and unchanged after
    98  		// modifying bar
    99  		fooState := terraform.NewState()
   100  		fooLineage := fooState.Lineage
   101  
   102  		// write a known state to foo
   103  		if err := foo.WriteState(fooState); err != nil {
   104  			t.Fatal("error writing foo state:", err)
   105  		}
   106  		if err := foo.PersistState(); err != nil {
   107  			t.Fatal("error persisting foo state:", err)
   108  		}
   109  
   110  		// write a distinct known state to bar
   111  		if err := bar.WriteState(barState); err != nil {
   112  			t.Fatalf("bad: %s", err)
   113  		}
   114  		if err := bar.PersistState(); err != nil {
   115  			t.Fatalf("bad: %s", err)
   116  		}
   117  
   118  		// verify that foo is unchanged with the existing state manager
   119  		if err := foo.RefreshState(); err != nil {
   120  			t.Fatal("error refreshing foo:", err)
   121  		}
   122  		fooState = foo.State()
   123  		switch {
   124  		case fooState == nil:
   125  			t.Fatal("nil state read from foo")
   126  		case fooState.Lineage == barLineage:
   127  			t.Fatalf("bar lineage read from foo: %#v", fooState)
   128  		case fooState.Lineage != fooLineage:
   129  			t.Fatal("foo lineage alterred")
   130  		}
   131  
   132  		// fetch foo again from the backend
   133  		foo, err = b.State("foo")
   134  		if err != nil {
   135  			t.Fatal("error re-fetching state:", err)
   136  		}
   137  		if err := foo.RefreshState(); err != nil {
   138  			t.Fatal("error refreshing foo:", err)
   139  		}
   140  		fooState = foo.State()
   141  		switch {
   142  		case fooState == nil:
   143  			t.Fatal("nil state read from foo")
   144  		case fooState.Lineage != fooLineage:
   145  			t.Fatal("incorrect state returned from backend")
   146  		}
   147  
   148  		// fetch the bar  again from the backend
   149  		bar, err = b.State("bar")
   150  		if err != nil {
   151  			t.Fatal("error re-fetching state:", err)
   152  		}
   153  		if err := bar.RefreshState(); err != nil {
   154  			t.Fatal("error refreshing bar:", err)
   155  		}
   156  		barState = bar.State()
   157  		switch {
   158  		case barState == nil:
   159  			t.Fatal("nil state read from bar")
   160  		case barState.Lineage != barLineage:
   161  			t.Fatal("incorrect state returned from backend")
   162  		}
   163  	}
   164  
   165  	// Verify we can now list them
   166  	{
   167  		// we determined that named stated are supported earlier
   168  		states, err := b.States()
   169  		if err != nil {
   170  			t.Fatal(err)
   171  		}
   172  
   173  		sort.Strings(states)
   174  		expected := []string{"bar", "default", "foo"}
   175  		if !reflect.DeepEqual(states, expected) {
   176  			t.Fatalf("bad: %#v", states)
   177  		}
   178  	}
   179  
   180  	// Delete some states
   181  	if err := b.DeleteState("foo"); err != nil {
   182  		t.Fatalf("err: %s", err)
   183  	}
   184  
   185  	// Verify the default state can't be deleted
   186  	if err := b.DeleteState(DefaultStateName); err == nil {
   187  		t.Fatal("expected error")
   188  	}
   189  
   190  	// Create and delete the foo state again.
   191  	// Make sure that there are no leftover artifacts from a deleted state
   192  	// preventing re-creation.
   193  	foo, err = b.State("foo")
   194  	if err != nil {
   195  		t.Fatalf("error: %s", err)
   196  	}
   197  	if err := foo.RefreshState(); err != nil {
   198  		t.Fatalf("bad: %s", err)
   199  	}
   200  	if v := foo.State(); v.HasResources() {
   201  		t.Fatalf("should be empty: %s", v)
   202  	}
   203  	// and delete it again
   204  	if err := b.DeleteState("foo"); err != nil {
   205  		t.Fatalf("err: %s", err)
   206  	}
   207  
   208  	// Verify deletion
   209  	{
   210  		states, err := b.States()
   211  		if err == ErrNamedStatesNotSupported {
   212  			t.Logf("TestBackend: named states not supported in %T, skipping", b)
   213  			return
   214  		}
   215  
   216  		sort.Strings(states)
   217  		expected := []string{"bar", "default"}
   218  		if !reflect.DeepEqual(states, expected) {
   219  			t.Fatalf("bad: %#v", states)
   220  		}
   221  	}
   222  }
   223  
   224  func testBackendStateLock(t *testing.T, b1, b2 Backend) {
   225  	// Get the default state for each
   226  	b1StateMgr, err := b1.State(DefaultStateName)
   227  	if err != nil {
   228  		t.Fatalf("error: %s", err)
   229  	}
   230  	if err := b1StateMgr.RefreshState(); err != nil {
   231  		t.Fatalf("bad: %s", err)
   232  	}
   233  
   234  	// Fast exit if this doesn't support locking at all
   235  	if _, ok := b1StateMgr.(state.Locker); !ok {
   236  		t.Logf("TestBackend: backend %T doesn't support state locking, not testing", b1)
   237  		return
   238  	}
   239  
   240  	t.Logf("TestBackend: testing state locking for %T", b1)
   241  
   242  	b2StateMgr, err := b2.State(DefaultStateName)
   243  	if err != nil {
   244  		t.Fatalf("error: %s", err)
   245  	}
   246  	if err := b2StateMgr.RefreshState(); err != nil {
   247  		t.Fatalf("bad: %s", err)
   248  	}
   249  
   250  	// Reassign so its obvious whats happening
   251  	lockerA := b1StateMgr.(state.Locker)
   252  	lockerB := b2StateMgr.(state.Locker)
   253  
   254  	infoA := state.NewLockInfo()
   255  	infoA.Operation = "test"
   256  	infoA.Who = "clientA"
   257  
   258  	infoB := state.NewLockInfo()
   259  	infoB.Operation = "test"
   260  	infoB.Who = "clientB"
   261  
   262  	lockIDA, err := lockerA.Lock(infoA)
   263  	if err != nil {
   264  		t.Fatal("unable to get initial lock:", err)
   265  	}
   266  
   267  	// If the lock ID is blank, assume locking is disabled
   268  	if lockIDA == "" {
   269  		t.Logf("TestBackend: %T: empty string returned for lock, assuming disabled", b1)
   270  		return
   271  	}
   272  
   273  	_, err = lockerB.Lock(infoB)
   274  	if err == nil {
   275  		lockerA.Unlock(lockIDA)
   276  		t.Fatal("client B obtained lock while held by client A")
   277  	}
   278  
   279  	if err := lockerA.Unlock(lockIDA); err != nil {
   280  		t.Fatal("error unlocking client A", err)
   281  	}
   282  
   283  	lockIDB, err := lockerB.Lock(infoB)
   284  	if err != nil {
   285  		t.Fatal("unable to obtain lock from client B")
   286  	}
   287  
   288  	if lockIDB == lockIDA {
   289  		t.Fatalf("duplicate lock IDs: %q", lockIDB)
   290  	}
   291  
   292  	if err = lockerB.Unlock(lockIDB); err != nil {
   293  		t.Fatal("error unlocking client B:", err)
   294  	}
   295  
   296  }