LEFT | RIGHT |
(no file at all) | |
1 package dummy_test | 1 package dummy_test |
2 | 2 |
3 import ( | 3 import ( |
4 . "launchpad.net/gocheck" | 4 . "launchpad.net/gocheck" |
5 "launchpad.net/juju-core/environs" | 5 "launchpad.net/juju-core/environs" |
6 "launchpad.net/juju-core/environs/config" | 6 "launchpad.net/juju-core/environs/config" |
7 _ "launchpad.net/juju-core/environs/dummy" | 7 _ "launchpad.net/juju-core/environs/dummy" |
8 "launchpad.net/juju-core/testing" | 8 "launchpad.net/juju-core/testing" |
9 ) | 9 ) |
10 | 10 |
11 var _ = Suite(&ConfigSuite{}) | 11 var _ = Suite(&ConfigSuite{}) |
12 | 12 |
13 type ConfigSuite struct{} | 13 type ConfigSuite struct{} |
14 | 14 |
15 func (*ConfigSuite) TestSecretAttrs(c *C) { | 15 func (*ConfigSuite) TestSecretAttrs(c *C) { |
16 cfg, err := config.New(map[string]interface{}{ | 16 cfg, err := config.New(map[string]interface{}{ |
17 "name": "only", // must match the name in environs_te
st.go | 17 "name": "only", // must match the name in environs_te
st.go |
18 "type": "dummy", | 18 "type": "dummy", |
19 "state-server": true, | 19 "state-server": true, |
20 "authorized-keys": "i-am-a-key", | 20 "authorized-keys": "i-am-a-key", |
21 » » "ca-cert": testing.CACertPEM, | 21 » » "ca-cert": testing.CACert, |
22 "ca-private-key": "", | 22 "ca-private-key": "", |
23 }) | 23 }) |
24 c.Assert(err, IsNil) | 24 c.Assert(err, IsNil) |
25 env, err := environs.New(cfg) | 25 env, err := environs.New(cfg) |
26 c.Assert(err, IsNil) | 26 c.Assert(err, IsNil) |
27 expected := map[string]interface{}{ | 27 expected := map[string]interface{}{ |
28 "secret": "pork", | 28 "secret": "pork", |
29 } | 29 } |
30 actual, err := env.Provider().SecretAttrs(cfg) | 30 actual, err := env.Provider().SecretAttrs(cfg) |
31 c.Assert(err, IsNil) | 31 c.Assert(err, IsNil) |
(...skipping 28 matching lines...) Expand all Loading... |
60 } | 60 } |
61 | 61 |
62 func (*ConfigSuite) TestFirewallMode(c *C) { | 62 func (*ConfigSuite) TestFirewallMode(c *C) { |
63 for _, test := range firewallModeTests { | 63 for _, test := range firewallModeTests { |
64 c.Logf("test firewall mode %q", test.configFirewallMode) | 64 c.Logf("test firewall mode %q", test.configFirewallMode) |
65 cfgMap := map[string]interface{}{ | 65 cfgMap := map[string]interface{}{ |
66 "name": "only", | 66 "name": "only", |
67 "type": "dummy", | 67 "type": "dummy", |
68 "state-server": true, | 68 "state-server": true, |
69 "authorized-keys": "none", | 69 "authorized-keys": "none", |
70 » » » "ca-cert": testing.CACertPEM, | 70 » » » "ca-cert": testing.CACert, |
71 "ca-private-key": "", | 71 "ca-private-key": "", |
72 } | 72 } |
73 if test.configFirewallMode != "" { | 73 if test.configFirewallMode != "" { |
74 cfgMap["firewall-mode"] = test.configFirewallMode | 74 cfgMap["firewall-mode"] = test.configFirewallMode |
75 } | 75 } |
76 cfg, err := config.New(cfgMap) | 76 cfg, err := config.New(cfgMap) |
77 if err != nil { | 77 if err != nil { |
78 c.Assert(err, ErrorMatches, test.errorMsg) | 78 c.Assert(err, ErrorMatches, test.errorMsg) |
79 continue | 79 continue |
80 } | 80 } |
81 | 81 |
82 env, err := environs.New(cfg) | 82 env, err := environs.New(cfg) |
83 if err != nil { | 83 if err != nil { |
84 c.Assert(err, ErrorMatches, test.errorMsg) | 84 c.Assert(err, ErrorMatches, test.errorMsg) |
85 continue | 85 continue |
86 } | 86 } |
87 | 87 |
88 firewallMode := env.Config().FirewallMode() | 88 firewallMode := env.Config().FirewallMode() |
89 c.Assert(firewallMode, Equals, test.firewallMode) | 89 c.Assert(firewallMode, Equals, test.firewallMode) |
90 } | 90 } |
91 } | 91 } |
LEFT | RIGHT |