-
Notifications
You must be signed in to change notification settings - Fork 149
/
fake_terraform_provider.go
123 lines (103 loc) · 3.4 KB
/
fake_terraform_provider.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
package terraform
import (
"crypto/sha1"
gojson "encoding/json"
"fmt"
"io"
"sort"
"github.com/hashicorp/terraform/providers"
"github.com/pkg/errors"
"github.com/snyk/driftctl/pkg/terraform"
"github.com/snyk/driftctl/test/goldenfile"
"github.com/snyk/driftctl/test/mocks"
"github.com/snyk/driftctl/test/schemas"
"github.com/zclconf/go-cty/cty"
)
type FakeTerraformProvider struct {
realProvider terraform.TerraformProvider
shouldUpdate bool
response string
}
func NewFakeTerraformProvider(realProvider terraform.TerraformProvider) *FakeTerraformProvider {
return &FakeTerraformProvider{realProvider: realProvider}
}
func (p *FakeTerraformProvider) ShouldUpdate() {
p.shouldUpdate = true
}
func (p *FakeTerraformProvider) Schema() map[string]providers.Schema {
return p.readSchema()
}
func (p *FakeTerraformProvider) WithResponse(response string) *FakeTerraformProvider {
p.response = response
return p
}
func (p *FakeTerraformProvider) ReadResource(args terraform.ReadResourceArgs) (*cty.Value, error) {
if p.response == "" {
return nil, errors.New("WithResponse should be called before ReadResource to specify a directory to fetch fake response")
}
if p.shouldUpdate {
readResource, err := p.realProvider.ReadResource(args)
p.writeResource(args, readResource, err)
return readResource, err
}
return p.readResource(args)
}
func (p *FakeTerraformProvider) readSchema() map[string]providers.Schema {
schema, err := schemas.ReadTestSchema(p.realProvider.Name(), p.realProvider.Version())
if err != nil {
panic(err)
}
return schema
}
func (p *FakeTerraformProvider) writeResource(args terraform.ReadResourceArgs, readResource *cty.Value, err error) {
var readRes = mocks.ReadResource{
Value: readResource,
Err: err,
}
marshalled, err := gojson.Marshal(&readRes)
if err != nil {
panic(err)
}
fileName := p.getFileName(args)
goldenfile.WriteFile(p.response, marshalled, fileName)
}
func (p *FakeTerraformProvider) readResource(args terraform.ReadResourceArgs) (*cty.Value, error) {
fileName := p.getFileName(args)
content := goldenfile.ReadFile(p.response, fileName)
var readRes mocks.ReadResource
if err := gojson.Unmarshal(content, &readRes); err != nil {
panic(err)
}
return readRes.Value, readRes.Err
}
func (p *FakeTerraformProvider) getFileName(args terraform.ReadResourceArgs) string {
suffix := ""
keys := make([]string, 0, len(args.Attributes))
for k := range args.Attributes {
keys = append(keys, k)
}
sort.Strings(keys)
for _, k := range keys {
suffix = fmt.Sprintf("%s-%s", suffix, args.Attributes[k])
}
// ext4 and many other filesystems has a maximum filename length of 255 bytes
// See https://en.wikipedia.org/wiki/Comparison_of_file_systems#Limits
// Solution: we create a SHA1 hash of the filename so the length stay constant
// We should do that no matter the length, but it requires to regenerate every single file
// TODO: Use SHA1 filenames for all resource golden files
resourceUID := fmt.Sprintf("%s-%s%s", args.Ty, args.ID, suffix)
if len(resourceUID) > 239 {
h := sha1.New()
_, _ = io.WriteString(h, resourceUID)
resourceUID = fmt.Sprintf("%x", h.Sum(nil))
}
fileName := fmt.Sprintf("%s.res.golden.json", resourceUID)
return fileName
}
func (p *FakeTerraformProvider) Cleanup() {}
func (p *FakeTerraformProvider) Name() string {
return p.realProvider.Name()
}
func (p *FakeTerraformProvider) Version() string {
return p.realProvider.Version()
}