# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. def test_prefix(plan_runner): "Test project id prefix." _, resources = plan_runner() assert len(resources) == 1 assert resources[0]['values']['name'] == 'my-project' _, resources = plan_runner(prefix='foo') assert len(resources) == 1 assert resources[0]['values']['name'] == 'foo-my-project' def test_parent(plan_runner): "Test project parent." _, resources = plan_runner(parent='folders/12345678') assert len(resources) == 1 assert resources[0]['values']['folder_id'] == '12345678' assert resources[0]['values'].get('org_id') == None _, resources = plan_runner(parent='organizations/12345678') assert len(resources) == 1 assert resources[0]['values']['org_id'] == '12345678' assert resources[0]['values'].get('folder_id') == None def test_no_parent(plan_runner): "Test null project parent." _, resources = plan_runner() assert len(resources) == 1 assert resources[0]['values'].get('folder_id') == None assert resources[0]['values'].get('org_id') == None def test_service_encryption_keys(plan_runner): "Test service encryption keys with no dependencies." _, resources = plan_runner(service_encryption_key_ids=( '{compute=["key1"], storage=["key1", "key2"]}' )) key_bindings = [ r['index'] for r in resources if r['type'] == 'google_kms_crypto_key_iam_member' ] assert len(key_bindings), 3 assert key_bindings == ['compute.key1', 'storage.key1', 'storage.key2'] def test_service_encryption_key_dependencies(plan_runner): "Test service encryption keys with dependencies." _, resources = plan_runner(service_encryption_key_ids=( '{compute=["key1"], dataflow=["key1", "key2"]}' )) key_bindings = [ r['index'] for r in resources if r['type'] == 'google_kms_crypto_key_iam_member' ] assert len(key_bindings), 3 # compute.key1 cannot repeat or we'll get a duplicate key error in for_each assert key_bindings == [ 'compute.key1', 'compute.key2', 'dataflow.key1', 'dataflow.key2' ]