chef-dk 0.6.2 → 0.7.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/README.md +4 -0
- data/lib/chef-dk/builtin_commands.rb +7 -0
- data/lib/chef-dk/command/env.rb +90 -0
- data/lib/chef-dk/command/export.rb +22 -1
- data/lib/chef-dk/command/generate.rb +1 -1
- data/lib/chef-dk/command/provision.rb +43 -0
- data/lib/chef-dk/command/push_archive.rb +126 -0
- data/lib/chef-dk/command/show_policy.rb +166 -0
- data/lib/chef-dk/command/verify.rb +58 -1
- data/lib/chef-dk/cookbook_omnifetch.rb +3 -2
- data/lib/chef-dk/exceptions.rb +27 -0
- data/lib/chef-dk/helpers.rb +29 -0
- data/lib/chef-dk/policyfile/chef_repo_cookbook_source.rb +8 -0
- data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +8 -0
- data/lib/chef-dk/policyfile/community_cookbook_source.rb +8 -0
- data/lib/chef-dk/policyfile/cookbook_locks.rb +76 -6
- data/lib/chef-dk/policyfile/dsl.rb +10 -5
- data/lib/chef-dk/policyfile/lister.rb +230 -0
- data/lib/chef-dk/policyfile/null_cookbook_source.rb +8 -0
- data/lib/chef-dk/policyfile_compiler.rb +35 -2
- data/lib/chef-dk/policyfile_lock.rb +43 -0
- data/lib/chef-dk/policyfile_services/clean_policies.rb +94 -0
- data/lib/chef-dk/policyfile_services/export_repo.rb +103 -16
- data/lib/chef-dk/policyfile_services/push_archive.rb +173 -0
- data/lib/chef-dk/policyfile_services/show_policy.rb +237 -0
- data/lib/chef-dk/service_exceptions.rb +21 -0
- data/lib/chef-dk/skeletons/code_generator/files/default/chefignore +1 -0
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/README.md +2 -40
- data/lib/chef-dk/skeletons/code_generator/recipes/app.rb +0 -2
- data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen.yml.erb +2 -2
- data/lib/chef-dk/skeletons/code_generator/templates/default/recipe_spec.rb.erb +1 -1
- data/lib/chef-dk/version.rb +1 -1
- data/spec/unit/command/env_spec.rb +52 -0
- data/spec/unit/command/exec_spec.rb +2 -2
- data/spec/unit/command/export_spec.rb +13 -0
- data/spec/unit/command/provision_spec.rb +56 -0
- data/spec/unit/command/push_archive_spec.rb +153 -0
- data/spec/unit/command/show_policy_spec.rb +235 -0
- data/spec/unit/command/verify_spec.rb +1 -0
- data/spec/unit/helpers_spec.rb +68 -0
- data/spec/unit/policyfile/cookbook_locks_spec.rb +107 -1
- data/spec/unit/policyfile/lister_spec.rb +256 -0
- data/spec/unit/policyfile_demands_spec.rb +202 -10
- data/spec/unit/policyfile_evaluation_spec.rb +30 -4
- data/spec/unit/policyfile_lock_serialization_spec.rb +45 -0
- data/spec/unit/policyfile_services/clean_policies_spec.rb +236 -0
- data/spec/unit/policyfile_services/export_repo_spec.rb +99 -6
- data/spec/unit/policyfile_services/push_archive_spec.rb +345 -0
- data/spec/unit/policyfile_services/show_policy_spec.rb +839 -0
- metadata +139 -8
@@ -40,10 +40,13 @@ describe ChefDK::PolicyfileServices::ExportRepo do
|
|
40
40
|
|
41
41
|
let(:force_export) { false }
|
42
42
|
|
43
|
+
let(:archive) { false }
|
44
|
+
|
43
45
|
subject(:export_service) do
|
44
46
|
described_class.new(policyfile: policyfile_rb_explicit_name,
|
45
47
|
root_dir: working_dir,
|
46
48
|
export_dir: export_dir,
|
49
|
+
archive: archive,
|
47
50
|
force: force_export)
|
48
51
|
end
|
49
52
|
|
@@ -154,6 +157,22 @@ E
|
|
154
157
|
expect(export_service.policy_name).to eq("install-example")
|
155
158
|
end
|
156
159
|
|
160
|
+
context "when using archive mode" do
|
161
|
+
|
162
|
+
let(:archive) { true }
|
163
|
+
|
164
|
+
# TODO: also support a full file name
|
165
|
+
context "when the given 'export_dir' is a directory" do
|
166
|
+
|
167
|
+
it "sets the archive file location to $policy_name-$revision.tgz" do
|
168
|
+
expected = File.join(export_dir, "install-example-60e5ad638dce219d8f87d589463ec4a9884007ba5e2adbb4c0a7021d67204f1a.tgz")
|
169
|
+
expect(export_service.archive_file_location).to eq(expected)
|
170
|
+
end
|
171
|
+
|
172
|
+
end
|
173
|
+
|
174
|
+
end
|
175
|
+
|
157
176
|
describe "writing updates to the policyfile lock" do
|
158
177
|
|
159
178
|
let(:updated_lockfile_io) { StringIO.new }
|
@@ -169,7 +188,7 @@ E
|
|
169
188
|
|
170
189
|
context "copying the cookbooks to the export dir" do
|
171
190
|
|
172
|
-
|
191
|
+
shared_examples_for "successful_export" do
|
173
192
|
before do
|
174
193
|
allow(export_service.policyfile_lock).to receive(:validate_cookbooks!).and_return(true)
|
175
194
|
export_service.run
|
@@ -220,6 +239,23 @@ E
|
|
220
239
|
expect(data_item_json["id"]).to eq("install-example-local")
|
221
240
|
end
|
222
241
|
|
242
|
+
it "copies the policyfile lock in standard format to Policyfile.lock.json" do
|
243
|
+
policyfile_lock_path = File.join(export_dir, "Policyfile.lock.json")
|
244
|
+
policyfile_lock_data = FFI_Yajl::Parser.parse(IO.read(policyfile_lock_path))
|
245
|
+
expected_lock_data = export_service.policyfile_lock.to_lock
|
246
|
+
|
247
|
+
# stringify keys in source_options
|
248
|
+
path = expected_lock_data["cookbook_locks"]["local-cookbook"]["source_options"].delete(:path)
|
249
|
+
expected_lock_data["cookbook_locks"]["local-cookbook"]["source_options"]["path"] = path
|
250
|
+
|
251
|
+
expect(policyfile_lock_data).to eq(expected_lock_data)
|
252
|
+
end
|
253
|
+
|
254
|
+
end
|
255
|
+
|
256
|
+
context "when the export dir is empty" do
|
257
|
+
|
258
|
+
include_examples "successful_export"
|
223
259
|
end
|
224
260
|
|
225
261
|
context "When an error occurs creating the export" do
|
@@ -253,14 +289,15 @@ E
|
|
253
289
|
end
|
254
290
|
|
255
291
|
it "ignores the non-conflicting content and exports" do
|
256
|
-
export_service.run
|
257
|
-
|
258
292
|
expect(File).to exist(file_in_export_dir)
|
259
293
|
expect(File).to exist(extra_data_bag_item)
|
260
294
|
|
261
295
|
expect(File).to be_directory(File.join(export_dir, "cookbooks"))
|
262
296
|
expect(File).to be_directory(File.join(export_dir, "data_bags"))
|
263
297
|
end
|
298
|
+
|
299
|
+
include_examples "successful_export"
|
300
|
+
|
264
301
|
end
|
265
302
|
|
266
303
|
context "When the export dir has conflicting content" do
|
@@ -275,6 +312,8 @@ E
|
|
275
312
|
|
276
313
|
let(:extra_policyfile_data_item) { File.join(policyfiles_data_bag_dir, "leftover-policy.json") }
|
277
314
|
|
315
|
+
let(:conflicting_policyfile_lock) { File.join(export_dir, "Policyfile.lock.json") }
|
316
|
+
|
278
317
|
before do
|
279
318
|
FileUtils.mkdir_p(export_dir)
|
280
319
|
FileUtils.mkdir_p(cookbooks_dir)
|
@@ -282,10 +321,11 @@ E
|
|
282
321
|
File.open(non_conflicting_file_in_export_dir, "wb+") { |f| f.print "some random cruft" }
|
283
322
|
File.open(file_in_cookbooks_dir, "wb+") { |f| f.print "some random cruft" }
|
284
323
|
File.open(extra_policyfile_data_item, "wb+") { |f| f.print "some random cruft" }
|
324
|
+
File.open(conflicting_policyfile_lock, "wb+") { |f| f.print "some random cruft" }
|
285
325
|
end
|
286
326
|
|
287
327
|
it "raises a PolicyfileExportRepoError" do
|
288
|
-
message = "Export dir (#{export_dir}) not clean. Refusing to export. (Conflicting files: #{file_in_cookbooks_dir}, #{extra_policyfile_data_item})"
|
328
|
+
message = "Export dir (#{export_dir}) not clean. Refusing to export. (Conflicting files: #{file_in_cookbooks_dir}, #{extra_policyfile_data_item}, #{conflicting_policyfile_lock})"
|
289
329
|
expect { export_service.run }.to raise_error(ChefDK::ExportDirNotEmpty, message)
|
290
330
|
expect(File).to exist(non_conflicting_file_in_export_dir)
|
291
331
|
expect(File).to exist(file_in_cookbooks_dir)
|
@@ -310,9 +350,62 @@ E
|
|
310
350
|
|
311
351
|
end
|
312
352
|
|
313
|
-
end
|
353
|
+
end # When the export dir has conflicting content
|
314
354
|
|
315
|
-
|
355
|
+
context "when archive mode is enabled" do
|
356
|
+
|
357
|
+
let(:archive) { true }
|
358
|
+
|
359
|
+
let(:expected_archive_path) do
|
360
|
+
File.join(export_dir, "install-example-60e5ad638dce219d8f87d589463ec4a9884007ba5e2adbb4c0a7021d67204f1a.tgz")
|
361
|
+
end
|
362
|
+
|
363
|
+
it "exports the repo as a tgz archive" do
|
364
|
+
expect(File).to exist(expected_archive_path)
|
365
|
+
end
|
366
|
+
|
367
|
+
include_examples "successful_export" do
|
368
|
+
|
369
|
+
# explode the tarball so the assertions can find the files
|
370
|
+
before do
|
371
|
+
Zlib::GzipReader.open(expected_archive_path) do |gz_file|
|
372
|
+
tar = Archive::Tar::Minitar::Input.new(gz_file)
|
373
|
+
tar.each do |e|
|
374
|
+
tar.extract_entry(export_dir, e)
|
375
|
+
end
|
376
|
+
end
|
377
|
+
end
|
378
|
+
|
379
|
+
end
|
380
|
+
|
381
|
+
context "when the target dir has a cookbooks or data_bags dir" do
|
382
|
+
|
383
|
+
let(:cookbooks_dir) { File.join(export_dir, "cookbooks") }
|
384
|
+
|
385
|
+
let(:file_in_cookbooks_dir) { File.join(cookbooks_dir, "some_random_cruft") }
|
386
|
+
|
387
|
+
let(:policyfiles_data_bag_dir) { File.join(export_dir, "data_bags", "policyfiles") }
|
388
|
+
|
389
|
+
let(:extra_policyfile_data_item) { File.join(policyfiles_data_bag_dir, "leftover-policy.json") }
|
390
|
+
|
391
|
+
before do
|
392
|
+
FileUtils.mkdir_p(export_dir)
|
393
|
+
FileUtils.mkdir_p(cookbooks_dir)
|
394
|
+
FileUtils.mkdir_p(policyfiles_data_bag_dir)
|
395
|
+
File.open(file_in_cookbooks_dir, "wb+") { |f| f.print "some random cruft" }
|
396
|
+
File.open(extra_policyfile_data_item, "wb+") { |f| f.print "some random cruft" }
|
397
|
+
end
|
398
|
+
|
399
|
+
it "exports successfully" do
|
400
|
+
expect { export_service.run }.to_not raise_error
|
401
|
+
expect(File).to exist(expected_archive_path)
|
402
|
+
end
|
403
|
+
|
404
|
+
end
|
405
|
+
|
406
|
+
end # when archive mode is enabled
|
407
|
+
|
408
|
+
end # copying the cookbooks to the export dir
|
316
409
|
end
|
317
410
|
|
318
411
|
end
|
@@ -0,0 +1,345 @@
|
|
1
|
+
#
|
2
|
+
# Copyright:: Copyright (c) 2015 Chef Software Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'spec_helper'
|
19
|
+
require 'chef-dk/policyfile_services/push_archive'
|
20
|
+
|
21
|
+
describe ChefDK::PolicyfileServices::PushArchive do
|
22
|
+
|
23
|
+
FileToTar = Struct.new(:name, :content)
|
24
|
+
|
25
|
+
def create_archive
|
26
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
27
|
+
Archive::Tar::Minitar::Writer.open(gz_file) do |tar|
|
28
|
+
|
29
|
+
|
30
|
+
archive_dirs.each do |dir|
|
31
|
+
tar.mkdir(dir, mode: 0755)
|
32
|
+
end
|
33
|
+
|
34
|
+
archive_files.each do |file|
|
35
|
+
name = file.name
|
36
|
+
content = file.content
|
37
|
+
size = content.bytesize
|
38
|
+
tar.add_file_simple(name, mode: 0644, size: size) { |f| f.write(content) }
|
39
|
+
end
|
40
|
+
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
let(:valid_lockfile) do
|
46
|
+
<<-E
|
47
|
+
{
|
48
|
+
"name": "install-example",
|
49
|
+
"run_list": [
|
50
|
+
"recipe[local-cookbook::default]"
|
51
|
+
],
|
52
|
+
"cookbook_locks": {
|
53
|
+
"local-cookbook": {
|
54
|
+
"version": "2.3.4",
|
55
|
+
"identifier": "fab501cfaf747901bd82c1bc706beae7dc3a350c",
|
56
|
+
"dotted_decimal_identifier": "70567763561641081.489844270461035.258281553147148",
|
57
|
+
"source": "project-cookbooks/local-cookbook",
|
58
|
+
"cache_key": null,
|
59
|
+
"scm_info": null,
|
60
|
+
"source_options": {
|
61
|
+
"path": "project-cookbooks/local-cookbook"
|
62
|
+
}
|
63
|
+
}
|
64
|
+
},
|
65
|
+
"default_attributes": {},
|
66
|
+
"override_attributes": {},
|
67
|
+
"solution_dependencies": {
|
68
|
+
"Policyfile": [
|
69
|
+
[
|
70
|
+
"local-cookbook",
|
71
|
+
">= 0.0.0"
|
72
|
+
]
|
73
|
+
],
|
74
|
+
"dependencies": {
|
75
|
+
"local-cookbook (2.3.4)": [
|
76
|
+
|
77
|
+
]
|
78
|
+
}
|
79
|
+
}
|
80
|
+
}
|
81
|
+
E
|
82
|
+
end
|
83
|
+
|
84
|
+
let(:archive_files) { [] }
|
85
|
+
|
86
|
+
let(:archive_dirs) { [] }
|
87
|
+
|
88
|
+
let(:working_dir) do
|
89
|
+
path = File.join(tempdir, "policyfile_services_test_working_dir")
|
90
|
+
Dir.mkdir(path)
|
91
|
+
path
|
92
|
+
end
|
93
|
+
|
94
|
+
let(:archive_file_name) { "example-policy-abc123.tgz" }
|
95
|
+
|
96
|
+
let(:archive_file_path) { File.join(working_dir, archive_file_name) }
|
97
|
+
|
98
|
+
let(:policy_group) { "dev-cluster-1" }
|
99
|
+
|
100
|
+
let(:config) do
|
101
|
+
double("Chef::Config",
|
102
|
+
chef_server_url: "https://localhost:10443",
|
103
|
+
client_key: "/path/to/client/key.pem",
|
104
|
+
node_name: "deuce",
|
105
|
+
policy_document_native_api: true)
|
106
|
+
end
|
107
|
+
|
108
|
+
let(:ui) { TestHelpers::TestUI.new }
|
109
|
+
|
110
|
+
subject(:push_archive_service) do
|
111
|
+
described_class.new(archive_file: archive_file_name,
|
112
|
+
policy_group: policy_group,
|
113
|
+
root_dir: working_dir,
|
114
|
+
ui: ui,
|
115
|
+
config: config)
|
116
|
+
end
|
117
|
+
|
118
|
+
it "has an archive file" do
|
119
|
+
expect(push_archive_service.archive_file).to eq(archive_file_name)
|
120
|
+
expect(push_archive_service.archive_file_path).to eq(archive_file_path)
|
121
|
+
end
|
122
|
+
|
123
|
+
it "configures an HTTP client" do
|
124
|
+
expect(ChefDK::AuthenticatedHTTP).to receive(:new).with("https://localhost:10443",
|
125
|
+
signing_key_filename: "/path/to/client/key.pem",
|
126
|
+
client_name: "deuce")
|
127
|
+
push_archive_service.http_client
|
128
|
+
end
|
129
|
+
|
130
|
+
context "with an invalid archive" do
|
131
|
+
|
132
|
+
let(:exception) do
|
133
|
+
begin
|
134
|
+
push_archive_service.run
|
135
|
+
rescue ChefDK::PolicyfilePushArchiveError => e
|
136
|
+
e
|
137
|
+
else
|
138
|
+
nil
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
let(:exception_cause) { exception.cause }
|
143
|
+
|
144
|
+
context "when the archive is malformed/corrupted/etc" do
|
145
|
+
|
146
|
+
context "when the archive file doesn't exist" do
|
147
|
+
|
148
|
+
it "errors out" do
|
149
|
+
expect(exception).to_not be_nil
|
150
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
151
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
152
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} not found")
|
153
|
+
end
|
154
|
+
end
|
155
|
+
|
156
|
+
context "when the archive is not a gzip file" do
|
157
|
+
|
158
|
+
before do
|
159
|
+
FileUtils.touch(archive_file_path)
|
160
|
+
end
|
161
|
+
|
162
|
+
it "errors out" do
|
163
|
+
expect(exception).to_not be_nil
|
164
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
165
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
166
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. not in gzip format")
|
167
|
+
end
|
168
|
+
|
169
|
+
end
|
170
|
+
|
171
|
+
context "when the archive is a gzip file of a garbage file" do
|
172
|
+
|
173
|
+
before do
|
174
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
175
|
+
gz_file << "lol this isn't a tar file"
|
176
|
+
end
|
177
|
+
end
|
178
|
+
|
179
|
+
it "errors out" do
|
180
|
+
expect(exception).to_not be_nil
|
181
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
182
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
183
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
184
|
+
end
|
185
|
+
end
|
186
|
+
|
187
|
+
|
188
|
+
context "when the archive is a gzip file of a very malformed tar archive" do
|
189
|
+
|
190
|
+
before do
|
191
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
192
|
+
gz_file << "\0\0\0\0\0"
|
193
|
+
end
|
194
|
+
end
|
195
|
+
|
196
|
+
it "errors out" do
|
197
|
+
expect(exception).to_not be_nil
|
198
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
199
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
200
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
201
|
+
end
|
202
|
+
end
|
203
|
+
end
|
204
|
+
|
205
|
+
context "when the archive is well-formed but has invalid content" do
|
206
|
+
|
207
|
+
before do
|
208
|
+
create_archive
|
209
|
+
end
|
210
|
+
|
211
|
+
context "when the archive is missing Policyfile.lock.json" do
|
212
|
+
|
213
|
+
let(:archive_files) { [ FileToTar.new("empty.txt", "") ] }
|
214
|
+
|
215
|
+
it "errors out" do
|
216
|
+
expect(exception).to_not be_nil
|
217
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
218
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
219
|
+
expect(exception_cause.message).to eq("Archive does not contain a Policyfile.lock.json")
|
220
|
+
end
|
221
|
+
|
222
|
+
end
|
223
|
+
|
224
|
+
context "when the archive has no cookbooks/ directory" do
|
225
|
+
|
226
|
+
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", "") ] }
|
227
|
+
|
228
|
+
it "errors out" do
|
229
|
+
expect(exception).to_not be_nil
|
230
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
231
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
232
|
+
expect(exception_cause.message).to eq("Archive does not contain a cookbooks directory")
|
233
|
+
end
|
234
|
+
|
235
|
+
end
|
236
|
+
|
237
|
+
context "when the archive has the correct files but the lockfile is invalid" do
|
238
|
+
|
239
|
+
let(:archive_dirs) { ["cookbooks"] }
|
240
|
+
|
241
|
+
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", lockfile_content) ] }
|
242
|
+
|
243
|
+
context "when the lockfile has invalid JSON" do
|
244
|
+
|
245
|
+
let(:lockfile_content) { ":::" }
|
246
|
+
|
247
|
+
it "errors out" do
|
248
|
+
expect(exception).to_not be_nil
|
249
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
250
|
+
expect(exception_cause).to be_a(FFI_Yajl::ParseError)
|
251
|
+
end
|
252
|
+
|
253
|
+
end
|
254
|
+
|
255
|
+
context "when the lockfile is semantically invalid" do
|
256
|
+
|
257
|
+
let(:lockfile_content) { '{ }' }
|
258
|
+
|
259
|
+
it "errors out" do
|
260
|
+
expect(exception).to_not be_nil
|
261
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
262
|
+
expect(exception_cause).to be_a(ChefDK::InvalidLockfile)
|
263
|
+
end
|
264
|
+
|
265
|
+
end
|
266
|
+
|
267
|
+
|
268
|
+
context "when the archive does not have all the necessary cookbooks" do
|
269
|
+
|
270
|
+
let(:lockfile_content) { valid_lockfile }
|
271
|
+
|
272
|
+
it "errors out" do
|
273
|
+
expect(exception).to_not be_nil
|
274
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
275
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
276
|
+
|
277
|
+
msg = "Archive does not have all cookbooks required by the Policyfile.lock. Missing cookbooks: 'local-cookbook'."
|
278
|
+
expect(exception_cause.message).to eq(msg)
|
279
|
+
end
|
280
|
+
|
281
|
+
end
|
282
|
+
end
|
283
|
+
end
|
284
|
+
|
285
|
+
end
|
286
|
+
|
287
|
+
context "with a valid archive" do
|
288
|
+
|
289
|
+
let(:lockfile_content) { valid_lockfile }
|
290
|
+
|
291
|
+
let(:cookbook_name) { "local-cookbook" }
|
292
|
+
|
293
|
+
let(:dotted_decimal_identifier) { "70567763561641081.489844270461035.258281553147148" }
|
294
|
+
|
295
|
+
let(:cookbook_dir) { File.join("cookbooks", "#{cookbook_name}-#{dotted_decimal_identifier}") }
|
296
|
+
|
297
|
+
let(:recipes_dir) { File.join(cookbook_dir, "recipes") }
|
298
|
+
|
299
|
+
let(:archive_dirs) { ["cookbooks", cookbook_dir, recipes_dir] }
|
300
|
+
|
301
|
+
let(:archive_files) do
|
302
|
+
[
|
303
|
+
FileToTar.new("Policyfile.lock.json", lockfile_content),
|
304
|
+
FileToTar.new(File.join(cookbook_dir, "metadata.rb"), "name 'local-cookbook'"),
|
305
|
+
FileToTar.new(File.join(recipes_dir, "default.rb"), "puts 'hello'")
|
306
|
+
]
|
307
|
+
end
|
308
|
+
|
309
|
+
let(:http_client) { instance_double(ChefDK::AuthenticatedHTTP) }
|
310
|
+
|
311
|
+
let(:uploader) { instance_double(ChefDK::Policyfile::Uploader) }
|
312
|
+
|
313
|
+
before do
|
314
|
+
expect(push_archive_service).to receive(:http_client).and_return(http_client)
|
315
|
+
|
316
|
+
expect(ChefDK::Policyfile::Uploader).to receive(:new).
|
317
|
+
# TODO: need more verification that the policyfile.lock is right (?)
|
318
|
+
with(an_instance_of(ChefDK::PolicyfileLock), policy_group, http_client: http_client, ui: ui, policy_document_native_api: true).
|
319
|
+
and_return(uploader)
|
320
|
+
|
321
|
+
create_archive
|
322
|
+
end
|
323
|
+
|
324
|
+
describe "when the upload is successful" do
|
325
|
+
|
326
|
+
it "uploads the cookbooks and lockfile" do
|
327
|
+
expect(uploader).to receive(:upload)
|
328
|
+
push_archive_service.run
|
329
|
+
end
|
330
|
+
|
331
|
+
end
|
332
|
+
|
333
|
+
describe "when the upload fails" do
|
334
|
+
|
335
|
+
it "raises a nested error" do
|
336
|
+
expect(uploader).to receive(:upload).and_raise("an error")
|
337
|
+
expect { push_archive_service.run }.to raise_error(ChefDK::PolicyfilePushArchiveError)
|
338
|
+
end
|
339
|
+
|
340
|
+
end
|
341
|
+
|
342
|
+
end
|
343
|
+
|
344
|
+
end
|
345
|
+
|