chef-dk 0.8.0 → 0.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CONTRIBUTING.md +190 -190
- data/Gemfile +26 -0
- data/LICENSE +201 -201
- data/README.md +276 -276
- data/Rakefile +18 -18
- data/bin/chef +25 -25
- data/lib/chef-dk.rb +19 -19
- data/lib/chef-dk/authenticated_http.rb +40 -40
- data/lib/chef-dk/builtin_commands.rb +60 -60
- data/lib/chef-dk/chef_runner.rb +98 -98
- data/lib/chef-dk/cli.rb +200 -200
- data/lib/chef-dk/command/base.rb +79 -75
- data/lib/chef-dk/command/clean_policy_cookbooks.rb +116 -116
- data/lib/chef-dk/command/clean_policy_revisions.rb +113 -113
- data/lib/chef-dk/command/delete_policy.rb +122 -122
- data/lib/chef-dk/command/delete_policy_group.rb +122 -122
- data/lib/chef-dk/command/diff.rb +316 -316
- data/lib/chef-dk/command/env.rb +90 -90
- data/lib/chef-dk/command/exec.rb +45 -45
- data/lib/chef-dk/command/export.rb +151 -153
- data/lib/chef-dk/command/gem.rb +47 -47
- data/lib/chef-dk/command/generate.rb +120 -118
- data/lib/chef-dk/command/generator_commands.rb +80 -80
- data/lib/chef-dk/command/generator_commands/app.rb +107 -107
- data/lib/chef-dk/command/generator_commands/attribute.rb +37 -37
- data/lib/chef-dk/command/generator_commands/base.rb +121 -121
- data/lib/chef-dk/command/generator_commands/cookbook.rb +119 -108
- data/lib/chef-dk/command/generator_commands/cookbook_code_file.rb +100 -100
- data/lib/chef-dk/command/generator_commands/cookbook_file.rb +45 -45
- data/lib/chef-dk/command/generator_commands/generator_generator.rb +177 -0
- data/lib/chef-dk/command/generator_commands/lwrp.rb +36 -36
- data/lib/chef-dk/command/generator_commands/policyfile.rb +86 -83
- data/lib/chef-dk/command/generator_commands/recipe.rb +36 -36
- data/lib/chef-dk/command/generator_commands/repo.rb +96 -96
- data/lib/chef-dk/command/generator_commands/template.rb +46 -46
- data/lib/chef-dk/command/install.rb +121 -121
- data/lib/chef-dk/command/provision.rb +438 -438
- data/lib/chef-dk/command/push.rb +118 -118
- data/lib/chef-dk/command/push_archive.rb +126 -126
- data/lib/chef-dk/command/shell_init.rb +180 -180
- data/lib/chef-dk/command/show_policy.rb +165 -165
- data/lib/chef-dk/command/undelete.rb +155 -155
- data/lib/chef-dk/command/update.rb +129 -129
- data/lib/chef-dk/command/verify.rb +490 -453
- data/lib/chef-dk/commands_map.rb +115 -115
- data/lib/chef-dk/completions/bash.sh.erb +5 -5
- data/lib/chef-dk/completions/chef.fish.erb +10 -10
- data/lib/chef-dk/completions/zsh.zsh.erb +21 -21
- data/lib/chef-dk/component_test.rb +171 -171
- data/lib/chef-dk/configurable.rb +57 -52
- data/lib/chef-dk/cookbook_metadata.rb +45 -45
- data/lib/chef-dk/cookbook_omnifetch.rb +32 -32
- data/lib/chef-dk/cookbook_profiler/git.rb +151 -151
- data/lib/chef-dk/cookbook_profiler/identifiers.rb +72 -72
- data/lib/chef-dk/cookbook_profiler/null_scm.rb +32 -32
- data/lib/chef-dk/exceptions.rb +113 -113
- data/lib/chef-dk/generator.rb +163 -162
- data/lib/chef-dk/helpers.rb +159 -159
- data/lib/chef-dk/pager.rb +106 -106
- data/lib/chef-dk/policyfile/chef_repo_cookbook_source.rb +122 -122
- data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +54 -54
- data/lib/chef-dk/policyfile/community_cookbook_source.rb +82 -82
- data/lib/chef-dk/policyfile/comparison_base.rb +124 -124
- data/lib/chef-dk/policyfile/cookbook_location_specification.rb +133 -133
- data/lib/chef-dk/policyfile/cookbook_locks.rb +466 -466
- data/lib/chef-dk/policyfile/cookbook_sources.rb +21 -21
- data/lib/chef-dk/policyfile/differ.rb +266 -266
- data/lib/chef-dk/policyfile/dsl.rb +197 -197
- data/lib/chef-dk/policyfile/lister.rb +232 -232
- data/lib/chef-dk/policyfile/null_cookbook_source.rb +45 -45
- data/lib/chef-dk/policyfile/read_cookbook_for_compat_mode_upload.rb +124 -124
- data/lib/chef-dk/policyfile/reports/install.rb +70 -70
- data/lib/chef-dk/policyfile/reports/table_printer.rb +58 -58
- data/lib/chef-dk/policyfile/reports/upload.rb +70 -70
- data/lib/chef-dk/policyfile/solution_dependencies.rb +298 -298
- data/lib/chef-dk/policyfile/storage_config.rb +100 -100
- data/lib/chef-dk/policyfile/undo_record.rb +142 -142
- data/lib/chef-dk/policyfile/undo_stack.rb +130 -130
- data/lib/chef-dk/policyfile/uploader.rb +213 -213
- data/lib/chef-dk/policyfile_compiler.rb +322 -322
- data/lib/chef-dk/policyfile_lock.rb +552 -552
- data/lib/chef-dk/policyfile_services/clean_policies.rb +95 -95
- data/lib/chef-dk/policyfile_services/clean_policy_cookbooks.rb +125 -125
- data/lib/chef-dk/policyfile_services/export_repo.rb +309 -281
- data/lib/chef-dk/policyfile_services/install.rb +125 -125
- data/lib/chef-dk/policyfile_services/push.rb +114 -114
- data/lib/chef-dk/policyfile_services/push_archive.rb +173 -173
- data/lib/chef-dk/policyfile_services/rm_policy.rb +142 -142
- data/lib/chef-dk/policyfile_services/rm_policy_group.rb +86 -86
- data/lib/chef-dk/policyfile_services/show_policy.rb +237 -237
- data/lib/chef-dk/policyfile_services/undelete.rb +108 -108
- data/lib/chef-dk/policyfile_services/update_attributes.rb +104 -104
- data/lib/chef-dk/service_exception_inspectors.rb +25 -25
- data/lib/chef-dk/service_exception_inspectors/base.rb +40 -40
- data/lib/chef-dk/service_exception_inspectors/http.rb +121 -121
- data/lib/chef-dk/service_exceptions.rb +143 -143
- data/lib/chef-dk/shell_out.rb +36 -36
- data/lib/chef-dk/skeletons/code_generator/files/default/Berksfile +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/chefignore +100 -100
- data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README-policy.md +9 -9
- data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README.md +54 -54
- data/lib/chef-dk/skeletons/code_generator/files/default/gitignore +16 -16
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/README.md +28 -28
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/README.md +27 -0
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/attributes/default.rb +7 -7
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/metadata.rb +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/recipes/default.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/README.md +57 -57
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/example/example_item.json +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/README.md +9 -9
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/example.json +12 -12
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/README.md +8 -8
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/example.json +12 -12
- data/lib/chef-dk/skeletons/code_generator/files/default/serverspec_spec_helper.rb +8 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/spec_helper.rb +2 -2
- data/lib/chef-dk/skeletons/code_generator/metadata.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/recipes/app.rb +97 -97
- data/lib/chef-dk/skeletons/code_generator/recipes/attribute.rb +12 -12
- data/lib/chef-dk/skeletons/code_generator/recipes/cookbook.rb +104 -92
- data/lib/chef-dk/skeletons/code_generator/recipes/cookbook_file.rb +24 -24
- data/lib/chef-dk/skeletons/code_generator/recipes/lwrp.rb +23 -23
- data/lib/chef-dk/skeletons/code_generator/recipes/policyfile.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/recipes/recipe.rb +27 -27
- data/lib/chef-dk/skeletons/code_generator/recipes/repo.rb +48 -47
- data/lib/chef-dk/skeletons/code_generator/recipes/template.rb +32 -32
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.all_rights.erb +3 -3
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.apache2.erb +201 -201
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv2.erb +339 -339
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv3.erb +674 -674
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.mit.erb +21 -21
- data/lib/chef-dk/skeletons/code_generator/templates/default/Policyfile.rb.erb +20 -16
- data/lib/chef-dk/skeletons/code_generator/templates/default/README.md.erb +4 -4
- data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen.yml.erb +16 -16
- data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen_policyfile.yml.erb +27 -0
- data/lib/chef-dk/skeletons/code_generator/templates/default/metadata.rb.erb +7 -7
- data/lib/chef-dk/skeletons/code_generator/templates/default/recipe.rb.erb +5 -5
- data/lib/chef-dk/skeletons/code_generator/templates/default/recipe_spec.rb.erb +20 -20
- data/lib/chef-dk/skeletons/code_generator/templates/default/repo/gitignore.erb +11 -11
- data/lib/chef-dk/skeletons/code_generator/templates/default/serverspec_default_spec.rb.erb +9 -9
- data/lib/chef-dk/ui.rb +58 -58
- data/lib/chef-dk/version.rb +20 -20
- data/lib/kitchen/provisioner/policyfile_zero.rb +193 -164
- data/spec/shared/a_file_generator.rb +125 -125
- data/spec/shared/a_generated_file.rb +12 -12
- data/spec/shared/command_with_ui_object.rb +11 -11
- data/spec/shared/custom_generator_cookbook.rb +117 -117
- data/spec/shared/fixture_cookbook_checksums.rb +47 -47
- data/spec/shared/setup_git_cookbooks.rb +53 -53
- data/spec/spec_helper.rb +49 -48
- data/spec/test_helpers.rb +84 -84
- data/spec/unit/chef_runner_spec.rb +111 -110
- data/spec/unit/cli_spec.rb +357 -357
- data/spec/unit/command/base_spec.rb +169 -136
- data/spec/unit/command/clean_policy_cookbooks_spec.rb +181 -181
- data/spec/unit/command/clean_policy_revisions_spec.rb +181 -181
- data/spec/unit/command/delete_policy_group_spec.rb +207 -207
- data/spec/unit/command/delete_policy_spec.rb +207 -207
- data/spec/unit/command/diff_spec.rb +312 -312
- data/spec/unit/command/env_spec.rb +52 -52
- data/spec/unit/command/exec_spec.rb +179 -179
- data/spec/unit/command/export_spec.rb +189 -189
- data/spec/unit/command/generate_spec.rb +142 -142
- data/spec/unit/command/generator_commands/app_spec.rb +169 -169
- data/spec/unit/command/generator_commands/attribute_spec.rb +32 -32
- data/spec/unit/command/generator_commands/cookbook_file_spec.rb +32 -32
- data/spec/unit/command/generator_commands/cookbook_spec.rb +320 -240
- data/spec/unit/command/generator_commands/generator_generator_spec.rb +229 -0
- data/spec/unit/command/generator_commands/lwrp_spec.rb +32 -32
- data/spec/unit/command/generator_commands/policyfile_spec.rb +125 -125
- data/spec/unit/command/generator_commands/recipe_spec.rb +34 -34
- data/spec/unit/command/generator_commands/repo_spec.rb +283 -283
- data/spec/unit/command/generator_commands/template_spec.rb +32 -32
- data/spec/unit/command/install_spec.rb +179 -179
- data/spec/unit/command/provision_spec.rb +592 -592
- data/spec/unit/command/push_archive_spec.rb +153 -153
- data/spec/unit/command/push_spec.rb +199 -199
- data/spec/unit/command/shell_init_spec.rb +329 -329
- data/spec/unit/command/show_policy_spec.rb +235 -235
- data/spec/unit/command/undelete_spec.rb +246 -246
- data/spec/unit/command/update_spec.rb +251 -251
- data/spec/unit/command/verify_spec.rb +323 -322
- data/spec/unit/commands_map_spec.rb +57 -57
- data/spec/unit/component_test_spec.rb +126 -126
- data/spec/unit/cookbook_metadata_spec.rb +98 -98
- data/spec/unit/cookbook_profiler/git_spec.rb +176 -176
- data/spec/unit/cookbook_profiler/identifiers_spec.rb +83 -83
- data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_one.rb +9 -9
- data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_two.rb +9 -9
- data/spec/unit/fixtures/command/cli_test_command.rb +26 -26
- data/spec/unit/fixtures/command/explicit_path_example.rb +7 -7
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbooks_api/pruned_small_universe.json +1321 -1321
- data/spec/unit/fixtures/cookbooks_api/small_universe.json +2987 -2987
- data/spec/unit/fixtures/cookbooks_api/universe.json +1 -1
- data/spec/unit/fixtures/cookbooks_api/update_fixtures.rb +36 -36
- data/spec/unit/fixtures/dev_cookbooks/README.md +16 -16
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/integration_test +2 -2
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/verify_me +5 -5
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/chef/verify_me +3 -3
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/test-kitchen/verify_me +2 -2
- data/spec/unit/fixtures/example_cookbook/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/example_cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/metadata.json +5 -5
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/recipes/default.rb +8 -8
- data/spec/unit/fixtures/example_cookbook_no_metadata/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook_no_metadata/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook_no_metadata/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook_no_metadata/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook_no_metadata/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook_no_metadata/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/Berksfile +3 -3
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/metadata.rb +9 -9
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/.kitchen.yml +16 -16
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/Berksfile +3 -3
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/metadata-missing/README.md +2 -2
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
- data/spec/unit/generator_spec.rb +120 -120
- data/spec/unit/helpers_spec.rb +92 -92
- data/spec/unit/pager_spec.rb +119 -119
- data/spec/unit/policyfile/chef_repo_cookbook_source_spec.rb +66 -66
- data/spec/unit/policyfile/chef_server_cookbook_source_spec.rb +34 -34
- data/spec/unit/policyfile/community_cookbook_source_spec.rb +51 -51
- data/spec/unit/policyfile/comparison_base_spec.rb +343 -343
- data/spec/unit/policyfile/cookbook_location_specification_spec.rb +252 -252
- data/spec/unit/policyfile/cookbook_locks_spec.rb +529 -529
- data/spec/unit/policyfile/differ_spec.rb +687 -687
- data/spec/unit/policyfile/lister_spec.rb +272 -272
- data/spec/unit/policyfile/null_cookbook_source_spec.rb +35 -35
- data/spec/unit/policyfile/read_cookbook_for_compat_mode_upload_spec.rb +92 -92
- data/spec/unit/policyfile/reports/install_spec.rb +115 -115
- data/spec/unit/policyfile/reports/upload_spec.rb +96 -96
- data/spec/unit/policyfile/solution_dependencies_spec.rb +145 -145
- data/spec/unit/policyfile/storage_config_spec.rb +172 -172
- data/spec/unit/policyfile/undo_record_spec.rb +260 -260
- data/spec/unit/policyfile/undo_stack_spec.rb +266 -266
- data/spec/unit/policyfile/uploader_spec.rb +410 -410
- data/spec/unit/policyfile_demands_spec.rb +876 -876
- data/spec/unit/policyfile_evaluation_spec.rb +441 -441
- data/spec/unit/policyfile_lock_build_spec.rb +1056 -1056
- data/spec/unit/policyfile_lock_install_spec.rb +138 -138
- data/spec/unit/policyfile_lock_serialization_spec.rb +425 -425
- data/spec/unit/policyfile_lock_validation_spec.rb +611 -611
- data/spec/unit/policyfile_services/clean_policies_spec.rb +236 -236
- data/spec/unit/policyfile_services/clean_policy_cookbooks_spec.rb +275 -275
- data/spec/unit/policyfile_services/export_repo_spec.rb +439 -416
- data/spec/unit/policyfile_services/install_spec.rb +191 -191
- data/spec/unit/policyfile_services/push_archive_spec.rb +345 -345
- data/spec/unit/policyfile_services/push_spec.rb +233 -233
- data/spec/unit/policyfile_services/rm_policy_group_spec.rb +241 -241
- data/spec/unit/policyfile_services/rm_policy_spec.rb +266 -266
- data/spec/unit/policyfile_services/show_policy_spec.rb +889 -889
- data/spec/unit/policyfile_services/undelete_spec.rb +304 -304
- data/spec/unit/policyfile_services/update_attributes_spec.rb +217 -217
- data/spec/unit/service_exception_inspectors/base_spec.rb +43 -43
- data/spec/unit/service_exception_inspectors/http_spec.rb +140 -140
- data/spec/unit/shell_out_spec.rb +34 -34
- metadata +9 -3
@@ -1,138 +1,138 @@
|
|
1
|
-
#
|
2
|
-
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
require 'spec_helper'
|
19
|
-
require 'shared/fixture_cookbook_checksums'
|
20
|
-
require 'chef-dk/policyfile_lock.rb'
|
21
|
-
|
22
|
-
describe ChefDK::PolicyfileLock, "installing cookbooks from a lockfile" do
|
23
|
-
|
24
|
-
include_context "fixture cookbooks checksums"
|
25
|
-
|
26
|
-
let(:cache_path) do
|
27
|
-
File.expand_path("spec/unit/fixtures/cookbook_cache", project_root)
|
28
|
-
end
|
29
|
-
|
30
|
-
let(:policyfile_lock_path) { "/fakepath/Policyfile.lock.json" }
|
31
|
-
|
32
|
-
let(:local_cookbooks_root) { File.join(fixtures_path, "local_path_cookbooks") }
|
33
|
-
|
34
|
-
let(:name) { "application-server" }
|
35
|
-
|
36
|
-
let(:run_list) { [ 'recipe[erlang::default]', 'recipe[erchef::prereqs]', 'recipe[erchef::app]' ] }
|
37
|
-
|
38
|
-
let(:storage_config) do
|
39
|
-
ChefDK::Policyfile::StorageConfig.new( cache_path: cache_path, relative_paths_root: local_cookbooks_root )
|
40
|
-
end
|
41
|
-
|
42
|
-
let(:lock_generator) do
|
43
|
-
ChefDK::PolicyfileLock.build(storage_config) do |policy|
|
44
|
-
|
45
|
-
policy.name = name
|
46
|
-
|
47
|
-
policy.run_list = run_list
|
48
|
-
|
49
|
-
policy.cached_cookbook("foo") do |c|
|
50
|
-
c.origin = "https://artifact-server.example/foo/1.0.0"
|
51
|
-
c.cache_key = "foo-1.0.0"
|
52
|
-
c.source_options = { artifactserver: "https://artifact-server.example/foo/1.0.0", version: "1.0.0" }
|
53
|
-
end
|
54
|
-
|
55
|
-
policy.local_cookbook("local-cookbook") do |c|
|
56
|
-
c.source = "local-cookbook"
|
57
|
-
c.source_options = { path: "local-cookbook" }
|
58
|
-
end
|
59
|
-
|
60
|
-
end
|
61
|
-
end
|
62
|
-
|
63
|
-
let(:lock_data) do
|
64
|
-
lock_generator.to_lock
|
65
|
-
end
|
66
|
-
|
67
|
-
let(:policyfile_lock) do
|
68
|
-
ChefDK::PolicyfileLock.new(storage_config).build_from_lock_data(lock_data)
|
69
|
-
end
|
70
|
-
|
71
|
-
describe "Populating a PolicyfileLock from a lockfile data structure" do
|
72
|
-
|
73
|
-
it "imports the name attribute" do
|
74
|
-
expect(policyfile_lock.name).to eq(name)
|
75
|
-
end
|
76
|
-
|
77
|
-
it "imports the run_list attribute" do
|
78
|
-
expect(policyfile_lock.run_list).to eq(run_list)
|
79
|
-
end
|
80
|
-
|
81
|
-
it "imports cached cookbook lock data" do
|
82
|
-
expect(policyfile_lock.cookbook_locks).to have_key("foo")
|
83
|
-
cookbook_lock = policyfile_lock.cookbook_locks["foo"]
|
84
|
-
expect(cookbook_lock.name).to eq("foo")
|
85
|
-
expect(cookbook_lock.cache_key).to eq("foo-1.0.0")
|
86
|
-
expect(cookbook_lock.version).to eq("1.0.0")
|
87
|
-
expect(cookbook_lock.identifier).to eq(cookbook_foo_cksum)
|
88
|
-
expect(cookbook_lock.dotted_decimal_identifier).to eq(cookbook_foo_cksum_dotted)
|
89
|
-
expect(cookbook_lock.origin).to eq("https://artifact-server.example/foo/1.0.0")
|
90
|
-
expect(cookbook_lock.source_options).to eq({ artifactserver: "https://artifact-server.example/foo/1.0.0", version: "1.0.0" })
|
91
|
-
expect(cookbook_lock.cookbook_location_spec.version_constraint).to eq(Semverse::Constraint.new("= 1.0.0"))
|
92
|
-
end
|
93
|
-
|
94
|
-
it "imports local cookbook lock data" do
|
95
|
-
expect(policyfile_lock.cookbook_locks).to have_key("local-cookbook")
|
96
|
-
cookbook_lock = policyfile_lock.cookbook_locks["local-cookbook"]
|
97
|
-
expect(cookbook_lock.name).to eq("local-cookbook")
|
98
|
-
expect(cookbook_lock.version).to eq("2.3.4")
|
99
|
-
expect(cookbook_lock.identifier).to eq("fab501cfaf747901bd82c1bc706beae7dc3a350c")
|
100
|
-
expect(cookbook_lock.dotted_decimal_identifier).to eq("70567763561641081.489844270461035.258281553147148")
|
101
|
-
expect(cookbook_lock.source).to eq("local-cookbook")
|
102
|
-
expect(cookbook_lock.source_options).to eq({ path: "local-cookbook" })
|
103
|
-
expect(cookbook_lock.cookbook_location_spec.version_constraint).to eq(Semverse::Constraint.new("= 2.3.4"))
|
104
|
-
end
|
105
|
-
|
106
|
-
end
|
107
|
-
|
108
|
-
describe "installing cookbooks" do
|
109
|
-
|
110
|
-
let(:remote_cookbook_lock) { policyfile_lock.cookbook_locks["foo"] }
|
111
|
-
|
112
|
-
let(:local_cookbook_lock) { policyfile_lock.cookbook_locks["local-cookbook"] }
|
113
|
-
|
114
|
-
it "configures the cookbook location spec for a remote cookbook" do
|
115
|
-
location_spec = remote_cookbook_lock.cookbook_location_spec
|
116
|
-
expect(location_spec).to be_an_instance_of(ChefDK::Policyfile::CookbookLocationSpecification)
|
117
|
-
expect(location_spec.uri).to eq("https://artifact-server.example/foo/1.0.0")
|
118
|
-
expect(location_spec.source_options[:version]).to eq("1.0.0")
|
119
|
-
end
|
120
|
-
|
121
|
-
it "configures the installer for a local cookbook" do
|
122
|
-
location_spec = local_cookbook_lock.cookbook_location_spec
|
123
|
-
expect(location_spec).to be_an_instance_of(ChefDK::Policyfile::CookbookLocationSpecification)
|
124
|
-
|
125
|
-
expect(location_spec.relative_path).to eq('local-cookbook')
|
126
|
-
end
|
127
|
-
|
128
|
-
|
129
|
-
it "ensures the cookbooks are installed" do
|
130
|
-
expect(remote_cookbook_lock.cookbook_location_spec).to receive(:ensure_cached)
|
131
|
-
expect(local_cookbook_lock.cookbook_location_spec).to receive(:ensure_cached)
|
132
|
-
|
133
|
-
policyfile_lock.install_cookbooks
|
134
|
-
end
|
135
|
-
|
136
|
-
end
|
137
|
-
|
138
|
-
end
|
1
|
+
#
|
2
|
+
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'spec_helper'
|
19
|
+
require 'shared/fixture_cookbook_checksums'
|
20
|
+
require 'chef-dk/policyfile_lock.rb'
|
21
|
+
|
22
|
+
describe ChefDK::PolicyfileLock, "installing cookbooks from a lockfile" do
|
23
|
+
|
24
|
+
include_context "fixture cookbooks checksums"
|
25
|
+
|
26
|
+
let(:cache_path) do
|
27
|
+
File.expand_path("spec/unit/fixtures/cookbook_cache", project_root)
|
28
|
+
end
|
29
|
+
|
30
|
+
let(:policyfile_lock_path) { "/fakepath/Policyfile.lock.json" }
|
31
|
+
|
32
|
+
let(:local_cookbooks_root) { File.join(fixtures_path, "local_path_cookbooks") }
|
33
|
+
|
34
|
+
let(:name) { "application-server" }
|
35
|
+
|
36
|
+
let(:run_list) { [ 'recipe[erlang::default]', 'recipe[erchef::prereqs]', 'recipe[erchef::app]' ] }
|
37
|
+
|
38
|
+
let(:storage_config) do
|
39
|
+
ChefDK::Policyfile::StorageConfig.new( cache_path: cache_path, relative_paths_root: local_cookbooks_root )
|
40
|
+
end
|
41
|
+
|
42
|
+
let(:lock_generator) do
|
43
|
+
ChefDK::PolicyfileLock.build(storage_config) do |policy|
|
44
|
+
|
45
|
+
policy.name = name
|
46
|
+
|
47
|
+
policy.run_list = run_list
|
48
|
+
|
49
|
+
policy.cached_cookbook("foo") do |c|
|
50
|
+
c.origin = "https://artifact-server.example/foo/1.0.0"
|
51
|
+
c.cache_key = "foo-1.0.0"
|
52
|
+
c.source_options = { artifactserver: "https://artifact-server.example/foo/1.0.0", version: "1.0.0" }
|
53
|
+
end
|
54
|
+
|
55
|
+
policy.local_cookbook("local-cookbook") do |c|
|
56
|
+
c.source = "local-cookbook"
|
57
|
+
c.source_options = { path: "local-cookbook" }
|
58
|
+
end
|
59
|
+
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
let(:lock_data) do
|
64
|
+
lock_generator.to_lock
|
65
|
+
end
|
66
|
+
|
67
|
+
let(:policyfile_lock) do
|
68
|
+
ChefDK::PolicyfileLock.new(storage_config).build_from_lock_data(lock_data)
|
69
|
+
end
|
70
|
+
|
71
|
+
describe "Populating a PolicyfileLock from a lockfile data structure" do
|
72
|
+
|
73
|
+
it "imports the name attribute" do
|
74
|
+
expect(policyfile_lock.name).to eq(name)
|
75
|
+
end
|
76
|
+
|
77
|
+
it "imports the run_list attribute" do
|
78
|
+
expect(policyfile_lock.run_list).to eq(run_list)
|
79
|
+
end
|
80
|
+
|
81
|
+
it "imports cached cookbook lock data" do
|
82
|
+
expect(policyfile_lock.cookbook_locks).to have_key("foo")
|
83
|
+
cookbook_lock = policyfile_lock.cookbook_locks["foo"]
|
84
|
+
expect(cookbook_lock.name).to eq("foo")
|
85
|
+
expect(cookbook_lock.cache_key).to eq("foo-1.0.0")
|
86
|
+
expect(cookbook_lock.version).to eq("1.0.0")
|
87
|
+
expect(cookbook_lock.identifier).to eq(cookbook_foo_cksum)
|
88
|
+
expect(cookbook_lock.dotted_decimal_identifier).to eq(cookbook_foo_cksum_dotted)
|
89
|
+
expect(cookbook_lock.origin).to eq("https://artifact-server.example/foo/1.0.0")
|
90
|
+
expect(cookbook_lock.source_options).to eq({ artifactserver: "https://artifact-server.example/foo/1.0.0", version: "1.0.0" })
|
91
|
+
expect(cookbook_lock.cookbook_location_spec.version_constraint).to eq(Semverse::Constraint.new("= 1.0.0"))
|
92
|
+
end
|
93
|
+
|
94
|
+
it "imports local cookbook lock data" do
|
95
|
+
expect(policyfile_lock.cookbook_locks).to have_key("local-cookbook")
|
96
|
+
cookbook_lock = policyfile_lock.cookbook_locks["local-cookbook"]
|
97
|
+
expect(cookbook_lock.name).to eq("local-cookbook")
|
98
|
+
expect(cookbook_lock.version).to eq("2.3.4")
|
99
|
+
expect(cookbook_lock.identifier).to eq("fab501cfaf747901bd82c1bc706beae7dc3a350c")
|
100
|
+
expect(cookbook_lock.dotted_decimal_identifier).to eq("70567763561641081.489844270461035.258281553147148")
|
101
|
+
expect(cookbook_lock.source).to eq("local-cookbook")
|
102
|
+
expect(cookbook_lock.source_options).to eq({ path: "local-cookbook" })
|
103
|
+
expect(cookbook_lock.cookbook_location_spec.version_constraint).to eq(Semverse::Constraint.new("= 2.3.4"))
|
104
|
+
end
|
105
|
+
|
106
|
+
end
|
107
|
+
|
108
|
+
describe "installing cookbooks" do
|
109
|
+
|
110
|
+
let(:remote_cookbook_lock) { policyfile_lock.cookbook_locks["foo"] }
|
111
|
+
|
112
|
+
let(:local_cookbook_lock) { policyfile_lock.cookbook_locks["local-cookbook"] }
|
113
|
+
|
114
|
+
it "configures the cookbook location spec for a remote cookbook" do
|
115
|
+
location_spec = remote_cookbook_lock.cookbook_location_spec
|
116
|
+
expect(location_spec).to be_an_instance_of(ChefDK::Policyfile::CookbookLocationSpecification)
|
117
|
+
expect(location_spec.uri).to eq("https://artifact-server.example/foo/1.0.0")
|
118
|
+
expect(location_spec.source_options[:version]).to eq("1.0.0")
|
119
|
+
end
|
120
|
+
|
121
|
+
it "configures the installer for a local cookbook" do
|
122
|
+
location_spec = local_cookbook_lock.cookbook_location_spec
|
123
|
+
expect(location_spec).to be_an_instance_of(ChefDK::Policyfile::CookbookLocationSpecification)
|
124
|
+
|
125
|
+
expect(location_spec.relative_path).to eq('local-cookbook')
|
126
|
+
end
|
127
|
+
|
128
|
+
|
129
|
+
it "ensures the cookbooks are installed" do
|
130
|
+
expect(remote_cookbook_lock.cookbook_location_spec).to receive(:ensure_cached)
|
131
|
+
expect(local_cookbook_lock.cookbook_location_spec).to receive(:ensure_cached)
|
132
|
+
|
133
|
+
policyfile_lock.install_cookbooks
|
134
|
+
end
|
135
|
+
|
136
|
+
end
|
137
|
+
|
138
|
+
end
|
@@ -1,425 +1,425 @@
|
|
1
|
-
#
|
2
|
-
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
require 'spec_helper'
|
19
|
-
require 'chef-dk/policyfile_lock'
|
20
|
-
|
21
|
-
describe ChefDK::PolicyfileLock, "when reading a Policyfile.lock" do
|
22
|
-
|
23
|
-
let(:valid_lock_data) do
|
24
|
-
{
|
25
|
-
"name" => "example",
|
26
|
-
"run_list" => [ "recipe[cookbook::recipe_name]" ],
|
27
|
-
"named_run_lists" => {
|
28
|
-
"fast-deploy" => [ "recipe[cookbook::deployit]" ]
|
29
|
-
},
|
30
|
-
"cookbook_locks" => {
|
31
|
-
# TODO: add some valid locks
|
32
|
-
},
|
33
|
-
"default_attributes" => { "foo" => "bar" },
|
34
|
-
"override_attributes" => { "override_foo" => "override_bar" },
|
35
|
-
"solution_dependencies" => {
|
36
|
-
"Policyfile" => [],
|
37
|
-
"dependencies" => {}
|
38
|
-
}
|
39
|
-
}
|
40
|
-
end
|
41
|
-
|
42
|
-
let(:storage_config) { ChefDK::Policyfile::StorageConfig.new }
|
43
|
-
|
44
|
-
let(:lockfile) { ChefDK::PolicyfileLock.new(storage_config) }
|
45
|
-
|
46
|
-
describe "populating the deserialized lock" do
|
47
|
-
|
48
|
-
before do
|
49
|
-
lockfile.build_from_lock_data(valid_lock_data)
|
50
|
-
end
|
51
|
-
|
52
|
-
it "includes the run list" do
|
53
|
-
expect(lockfile.run_list).to eq(["recipe[cookbook::recipe_name]"])
|
54
|
-
end
|
55
|
-
|
56
|
-
it "includes the named run lists" do
|
57
|
-
expect(lockfile.named_run_lists).to eq({ "fast-deploy" => [ "recipe[cookbook::deployit]" ] })
|
58
|
-
end
|
59
|
-
|
60
|
-
it "includes the cookbook locks" do
|
61
|
-
expect(lockfile.cookbook_locks).to eq({})
|
62
|
-
end
|
63
|
-
|
64
|
-
it "includes the attributes" do
|
65
|
-
expect(lockfile.default_attributes).to eq({"foo" => "bar"})
|
66
|
-
expect(lockfile.override_attributes).to eq({"override_foo" => "override_bar"})
|
67
|
-
end
|
68
|
-
|
69
|
-
end
|
70
|
-
|
71
|
-
describe "validating required fields" do
|
72
|
-
|
73
|
-
it "does not raise an error when all fields are valid" do
|
74
|
-
expect { lockfile.build_from_lock_data(valid_lock_data) }.to_not raise_error
|
75
|
-
end
|
76
|
-
|
77
|
-
it "requires the name to be present" do
|
78
|
-
missing_name = valid_lock_data.dup
|
79
|
-
missing_name.delete("name")
|
80
|
-
|
81
|
-
expect { lockfile.build_from_lock_data(missing_name) }.to raise_error(ChefDK::InvalidLockfile)
|
82
|
-
|
83
|
-
blank_name = valid_lock_data.dup
|
84
|
-
blank_name["name"] = ""
|
85
|
-
expect { lockfile.build_from_lock_data(blank_name) }.to raise_error(ChefDK::InvalidLockfile)
|
86
|
-
|
87
|
-
invalid_name = valid_lock_data.dup
|
88
|
-
invalid_name["name"] = {}
|
89
|
-
expect { lockfile.build_from_lock_data(invalid_name) }.to raise_error(ChefDK::InvalidLockfile)
|
90
|
-
end
|
91
|
-
|
92
|
-
it "requires the run_list to be present" do
|
93
|
-
no_run_list = valid_lock_data.dup
|
94
|
-
no_run_list.delete("run_list")
|
95
|
-
|
96
|
-
expect { lockfile.build_from_lock_data(no_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
97
|
-
|
98
|
-
bad_run_list = valid_lock_data.dup
|
99
|
-
bad_run_list["run_list"] = "bad data"
|
100
|
-
expect { lockfile.build_from_lock_data(bad_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
101
|
-
end
|
102
|
-
|
103
|
-
it "validates the format of run_list items" do
|
104
|
-
bad_run_list = valid_lock_data.dup
|
105
|
-
bad_run_list["run_list"] = [ "bad data" ]
|
106
|
-
|
107
|
-
expect { lockfile.build_from_lock_data(bad_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
108
|
-
end
|
109
|
-
|
110
|
-
it "allows the named_run_lists field to be absent" do
|
111
|
-
missing_named_run_lists = valid_lock_data.dup
|
112
|
-
missing_named_run_lists.delete("named_run_lists")
|
113
|
-
|
114
|
-
expect { lockfile.build_from_lock_data(missing_named_run_lists) }.to_not raise_error
|
115
|
-
end
|
116
|
-
|
117
|
-
it "requires the named_run_lists field to be a Hash if present" do
|
118
|
-
bad_named_run_lists = valid_lock_data.dup
|
119
|
-
bad_named_run_lists["named_run_lists"] = false
|
120
|
-
|
121
|
-
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
122
|
-
end
|
123
|
-
|
124
|
-
it "requires the keys in named_run_lists to be strings" do
|
125
|
-
bad_named_run_lists = valid_lock_data.dup
|
126
|
-
bad_named_run_lists["named_run_lists"] = { 42 => [] }
|
127
|
-
|
128
|
-
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
129
|
-
end
|
130
|
-
|
131
|
-
it "requires the values in named_run_lists to be arrays" do
|
132
|
-
bad_named_run_lists = valid_lock_data.dup
|
133
|
-
bad_named_run_lists["named_run_lists"] = { "bad" => 42 }
|
134
|
-
|
135
|
-
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
136
|
-
end
|
137
|
-
|
138
|
-
it "requires the values in named_run_lists to be valid run lists" do
|
139
|
-
bad_named_run_lists = valid_lock_data.dup
|
140
|
-
bad_named_run_lists["named_run_lists"] = { "bad" => [ 42 ] }
|
141
|
-
|
142
|
-
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
143
|
-
end
|
144
|
-
it "requires the `cookbook_locks` section be present and its value is a Hash" do
|
145
|
-
missing_locks = valid_lock_data.dup
|
146
|
-
missing_locks.delete("cookbook_locks")
|
147
|
-
|
148
|
-
expect { lockfile.build_from_lock_data(missing_locks) }.to raise_error(ChefDK::InvalidLockfile)
|
149
|
-
|
150
|
-
invalid_locks = valid_lock_data.dup
|
151
|
-
invalid_locks["cookbook_locks"] = []
|
152
|
-
expect { lockfile.build_from_lock_data(invalid_locks) }.to raise_error(ChefDK::InvalidLockfile)
|
153
|
-
end
|
154
|
-
|
155
|
-
it "requires the `default_attributes` section be present and its value is a Hash" do
|
156
|
-
missing_attrs = valid_lock_data.dup
|
157
|
-
missing_attrs.delete("default_attributes")
|
158
|
-
|
159
|
-
expect { lockfile.build_from_lock_data(missing_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
160
|
-
|
161
|
-
invalid_attrs = valid_lock_data.dup
|
162
|
-
invalid_attrs["default_attributes"] = []
|
163
|
-
|
164
|
-
expect { lockfile.build_from_lock_data(invalid_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
165
|
-
end
|
166
|
-
|
167
|
-
it "requires the `override_attributes` section be present and its value is a Hash" do
|
168
|
-
missing_attrs = valid_lock_data.dup
|
169
|
-
missing_attrs.delete("override_attributes")
|
170
|
-
|
171
|
-
expect { lockfile.build_from_lock_data(missing_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
172
|
-
|
173
|
-
invalid_attrs = valid_lock_data.dup
|
174
|
-
invalid_attrs["override_attributes"] = []
|
175
|
-
|
176
|
-
expect { lockfile.build_from_lock_data(invalid_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
177
|
-
end
|
178
|
-
|
179
|
-
describe "validating solution_dependencies" do
|
180
|
-
|
181
|
-
it "requires the `solution_dependencies' section be present" do
|
182
|
-
missing_soln_deps = valid_lock_data.dup
|
183
|
-
missing_soln_deps.delete("solution_dependencies")
|
184
|
-
|
185
|
-
expect { lockfile.build_from_lock_data(missing_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
186
|
-
end
|
187
|
-
|
188
|
-
it "requires the solution_dependencies object be a Hash" do
|
189
|
-
invalid_soln_deps = valid_lock_data.dup
|
190
|
-
invalid_soln_deps["solution_dependencies"] = []
|
191
|
-
expect { lockfile.build_from_lock_data(invalid_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
192
|
-
end
|
193
|
-
|
194
|
-
it "requires the solution_dependencies object have a 'Policyfile' and 'dependencies' key" do
|
195
|
-
missing_keys_soln_deps = valid_lock_data.dup
|
196
|
-
missing_keys_soln_deps["solution_dependencies"] = {}
|
197
|
-
expect { lockfile.build_from_lock_data(missing_keys_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
198
|
-
|
199
|
-
missing_policyfile_key = valid_lock_data.dup
|
200
|
-
missing_policyfile_key["solution_dependencies"] = {"dependencies" => {} }
|
201
|
-
expect { lockfile.build_from_lock_data(missing_policyfile_key) }.to raise_error(ChefDK::InvalidLockfile)
|
202
|
-
|
203
|
-
missing_dependencies_key = valid_lock_data.dup
|
204
|
-
missing_dependencies_key["solution_dependencies"] = { "Policyfile" => [] }
|
205
|
-
expect { lockfile.build_from_lock_data(missing_dependencies_key) }.to raise_error(ChefDK::InvalidLockfile)
|
206
|
-
end
|
207
|
-
|
208
|
-
it "requires the Policyfile dependencies be an Array" do
|
209
|
-
invalid_policyfile_deps = valid_lock_data.dup
|
210
|
-
invalid_policyfile_deps["solution_dependencies"] = {"Policyfile" => 42, "dependencies" => {} }
|
211
|
-
expect { lockfile.build_from_lock_data(invalid_policyfile_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
212
|
-
end
|
213
|
-
|
214
|
-
it %q(requires the Policyfile dependencies be formatted like [ "COOKBOOK_NAME", "CONSTRAINT" ]) do
|
215
|
-
invalid_policyfile_deps_content = valid_lock_data.dup
|
216
|
-
invalid_policyfile_deps_content["solution_dependencies"] = { "Policyfile" => [ "bad" ], "dependencies" => {} }
|
217
|
-
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content) }.to raise_error(ChefDK::InvalidLockfile)
|
218
|
-
|
219
|
-
invalid_policyfile_deps_content2 = valid_lock_data.dup
|
220
|
-
invalid_policyfile_deps_content2["solution_dependencies"] = { "Policyfile" => [ [42, "~> 2.0"] ], "dependencies" => {} }
|
221
|
-
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content2) }.to raise_error(ChefDK::InvalidLockfile)
|
222
|
-
|
223
|
-
invalid_policyfile_deps_content3 = valid_lock_data.dup
|
224
|
-
invalid_policyfile_deps_content3["solution_dependencies"] = { "Policyfile" => [ ["cookbook_name", "bad"] ], "dependencies" => {} }
|
225
|
-
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content3) }.to raise_error(ChefDK::InvalidLockfile)
|
226
|
-
end
|
227
|
-
|
228
|
-
it "requires the cookbook dependencies be a Hash" do
|
229
|
-
invalid_cookbook_deps = valid_lock_data.dup
|
230
|
-
invalid_cookbook_deps["solution_dependencies"] = { "Policyfile" => [], "dependencies" => 42 }
|
231
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
232
|
-
end
|
233
|
-
|
234
|
-
it "requires the cookbook dependencies entries be in the correct format" do
|
235
|
-
invalid_cookbook_deps = valid_lock_data.dup
|
236
|
-
bad_deps = { 42 => 42 }
|
237
|
-
invalid_cookbook_deps["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps }
|
238
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
239
|
-
|
240
|
-
invalid_cookbook_deps2 = valid_lock_data.dup
|
241
|
-
bad_deps2 = { "bad-format" => [] }
|
242
|
-
invalid_cookbook_deps2["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps2 }
|
243
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_deps2) }.to raise_error(ChefDK::InvalidLockfile)
|
244
|
-
|
245
|
-
invalid_cookbook_deps3 = valid_lock_data.dup
|
246
|
-
bad_deps3 = { "cookbook (1.0.0)" => 42 }
|
247
|
-
invalid_cookbook_deps3["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps3 }
|
248
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_deps3) }.to raise_error(ChefDK::InvalidLockfile)
|
249
|
-
|
250
|
-
invalid_cookbook_deps4 = valid_lock_data.dup
|
251
|
-
bad_deps4 = { "cookbook (1.0.0)" => [ 42 ] }
|
252
|
-
invalid_cookbook_deps4["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps4 }
|
253
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_deps4) }.to raise_error(ChefDK::InvalidLockfile)
|
254
|
-
end
|
255
|
-
end
|
256
|
-
|
257
|
-
describe "validating cookbook_locks entries" do
|
258
|
-
|
259
|
-
# TODO: also check non-cached cookbook
|
260
|
-
let(:valid_cookbook_lock) do
|
261
|
-
{
|
262
|
-
"version" => "1.0.0",
|
263
|
-
"identifier" => "68c13b136a49b4e66cfe9d8aa2b5a85167b5bf9b",
|
264
|
-
"dotted_decimal_identifier" => "111.222.333",
|
265
|
-
"cache_key" => "foo-1.0.0",
|
266
|
-
"source_options" => {}
|
267
|
-
}
|
268
|
-
end
|
269
|
-
|
270
|
-
it "requires that each cookbook lock be a Hash" do
|
271
|
-
invalid_cookbook_lock = valid_lock_data.dup
|
272
|
-
invalid_cookbook_lock["cookbook_locks"] = { "foo" => 42 }
|
273
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_lock) }.to raise_error(ChefDK::InvalidLockfile)
|
274
|
-
end
|
275
|
-
|
276
|
-
it "requires that cookbook locks not be empty" do
|
277
|
-
invalid_cookbook_lock = valid_lock_data.dup
|
278
|
-
invalid_cookbook_lock["cookbook_locks"] = { "foo" => {} }
|
279
|
-
expect { lockfile.build_from_lock_data(invalid_cookbook_lock) }.to raise_error(ChefDK::InvalidLockfile)
|
280
|
-
end
|
281
|
-
|
282
|
-
it "requires that each cookbook lock have a version" do
|
283
|
-
invalid_lockfile = valid_lock_data.dup
|
284
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
285
|
-
invalid_cookbook_lock.delete("version")
|
286
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
287
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
288
|
-
end
|
289
|
-
|
290
|
-
it "requires that the version be a string" do
|
291
|
-
invalid_lockfile = valid_lock_data.dup
|
292
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
293
|
-
invalid_cookbook_lock["version"] = 42
|
294
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
295
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
296
|
-
end
|
297
|
-
|
298
|
-
it "requires that each cookbook lock have an identifier" do
|
299
|
-
invalid_lockfile = valid_lock_data.dup
|
300
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
301
|
-
invalid_cookbook_lock.delete("identifier")
|
302
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
303
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
304
|
-
end
|
305
|
-
|
306
|
-
it "requires that the identifier be a string" do
|
307
|
-
invalid_lockfile = valid_lock_data.dup
|
308
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
309
|
-
invalid_cookbook_lock["identifier"] = 42
|
310
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
311
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
312
|
-
end
|
313
|
-
|
314
|
-
it "requires that a cookbook lock have a key named `cache_key'" do
|
315
|
-
invalid_lockfile = valid_lock_data.dup
|
316
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
317
|
-
invalid_cookbook_lock.delete("cache_key")
|
318
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
319
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
320
|
-
end
|
321
|
-
|
322
|
-
it "requires that the cache_key be a string or null" do
|
323
|
-
invalid_lockfile = valid_lock_data.dup
|
324
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
325
|
-
invalid_cookbook_lock["cache_key"] = 42
|
326
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
327
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
328
|
-
end
|
329
|
-
|
330
|
-
it "requires that a cookbook lock have a source_options attribute" do
|
331
|
-
invalid_lockfile = valid_lock_data.dup
|
332
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
333
|
-
invalid_cookbook_lock.delete("source_options")
|
334
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
335
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
336
|
-
end
|
337
|
-
|
338
|
-
it "requires that source options be a Hash" do
|
339
|
-
invalid_lockfile = valid_lock_data.dup
|
340
|
-
invalid_cookbook_lock = valid_cookbook_lock.dup
|
341
|
-
invalid_cookbook_lock["source_options"] = 42
|
342
|
-
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
343
|
-
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
344
|
-
end
|
345
|
-
|
346
|
-
it "requires that a cookbook lock be a valid local cookbook if `cache_key' is null/nil" do
|
347
|
-
valid_lock_with_local_cookbook = valid_lock_data.dup
|
348
|
-
valid_local_cookbook = valid_cookbook_lock.dup
|
349
|
-
valid_local_cookbook["cache_key"] = nil
|
350
|
-
valid_local_cookbook["source"] = "path/to/foo"
|
351
|
-
valid_lock_with_local_cookbook["cookbook_locks"] = { "foo" => valid_local_cookbook }
|
352
|
-
expect { lockfile.build_from_lock_data(valid_lock_with_local_cookbook) }.to_not raise_error
|
353
|
-
|
354
|
-
invalid_lock_with_local_cookbook = valid_lock_data.dup
|
355
|
-
invalid_local_cookbook = valid_cookbook_lock.dup
|
356
|
-
invalid_local_cookbook["cache_key"] = nil
|
357
|
-
invalid_local_cookbook["source"] = 42
|
358
|
-
invalid_lock_with_local_cookbook["cookbook_locks"] = { "foo" => invalid_local_cookbook }
|
359
|
-
expect { lockfile.build_from_lock_data(invalid_lock_with_local_cookbook) }.to raise_error(ChefDK::InvalidLockfile)
|
360
|
-
end
|
361
|
-
|
362
|
-
it "requires that a cookbook lock w/ a key named `cache_key' be a valid cached cookbook structure" do
|
363
|
-
valid_lock_with_cached_cookbook = valid_lock_data.dup
|
364
|
-
valid_cached_cookbook = valid_cookbook_lock.dup
|
365
|
-
valid_cached_cookbook["cache_key"] = nil
|
366
|
-
valid_cached_cookbook["source"] = "path/to/foo"
|
367
|
-
valid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => valid_cached_cookbook }
|
368
|
-
expect { lockfile.build_from_lock_data(valid_lock_with_cached_cookbook) }.to_not raise_error
|
369
|
-
|
370
|
-
invalid_lock_with_cached_cookbook = valid_lock_data.dup
|
371
|
-
invalid_cached_cookbook = valid_cookbook_lock.dup
|
372
|
-
invalid_cached_cookbook["cache_key"] = 42
|
373
|
-
invalid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => invalid_cached_cookbook }
|
374
|
-
expect { lockfile.build_from_lock_data(invalid_lock_with_cached_cookbook) }.to raise_error(ChefDK::InvalidLockfile)
|
375
|
-
end
|
376
|
-
|
377
|
-
end
|
378
|
-
end
|
379
|
-
|
380
|
-
describe "populating lock data from an archive" do
|
381
|
-
|
382
|
-
let(:valid_cookbook_lock) do
|
383
|
-
{
|
384
|
-
"version" => "1.0.0",
|
385
|
-
"identifier" => "68c13b136a49b4e66cfe9d8aa2b5a85167b5bf9b",
|
386
|
-
"dotted_decimal_identifier" => "111.222.333",
|
387
|
-
"cache_key" => nil,
|
388
|
-
"source" => "path/to/foo",
|
389
|
-
"source_options" => { path: "path/to/foo"},
|
390
|
-
"scm_info" => nil
|
391
|
-
}
|
392
|
-
end
|
393
|
-
|
394
|
-
let(:lock_data) do
|
395
|
-
valid_lock_with_cached_cookbook = valid_lock_data.dup
|
396
|
-
valid_cached_cookbook = valid_cookbook_lock.dup
|
397
|
-
valid_cached_cookbook["cache_key"] = nil
|
398
|
-
valid_cached_cookbook["source"] = "path/to/foo"
|
399
|
-
valid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => valid_cached_cookbook }
|
400
|
-
valid_lock_with_cached_cookbook
|
401
|
-
end
|
402
|
-
|
403
|
-
before do
|
404
|
-
lockfile.build_from_archive(lock_data)
|
405
|
-
end
|
406
|
-
|
407
|
-
it "creates cookbook locks as archived cookbooks" do
|
408
|
-
locks = lockfile.cookbook_locks
|
409
|
-
|
410
|
-
expect(locks).to have_key("foo")
|
411
|
-
|
412
|
-
cb_foo = locks["foo"]
|
413
|
-
expect(cb_foo).to be_a(ChefDK::Policyfile::ArchivedCookbook)
|
414
|
-
|
415
|
-
expected_path = File.join(storage_config.relative_paths_root, "cookbooks", "foo-111.222.333")
|
416
|
-
|
417
|
-
expect(cb_foo.cookbook_path).to eq(expected_path)
|
418
|
-
expect(cb_foo.dotted_decimal_identifier).to eq("111.222.333")
|
419
|
-
expect(locks["foo"].to_lock).to eq(valid_cookbook_lock)
|
420
|
-
end
|
421
|
-
|
422
|
-
|
423
|
-
end
|
424
|
-
|
425
|
-
end
|
1
|
+
#
|
2
|
+
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'spec_helper'
|
19
|
+
require 'chef-dk/policyfile_lock'
|
20
|
+
|
21
|
+
describe ChefDK::PolicyfileLock, "when reading a Policyfile.lock" do
|
22
|
+
|
23
|
+
let(:valid_lock_data) do
|
24
|
+
{
|
25
|
+
"name" => "example",
|
26
|
+
"run_list" => [ "recipe[cookbook::recipe_name]" ],
|
27
|
+
"named_run_lists" => {
|
28
|
+
"fast-deploy" => [ "recipe[cookbook::deployit]" ]
|
29
|
+
},
|
30
|
+
"cookbook_locks" => {
|
31
|
+
# TODO: add some valid locks
|
32
|
+
},
|
33
|
+
"default_attributes" => { "foo" => "bar" },
|
34
|
+
"override_attributes" => { "override_foo" => "override_bar" },
|
35
|
+
"solution_dependencies" => {
|
36
|
+
"Policyfile" => [],
|
37
|
+
"dependencies" => {}
|
38
|
+
}
|
39
|
+
}
|
40
|
+
end
|
41
|
+
|
42
|
+
let(:storage_config) { ChefDK::Policyfile::StorageConfig.new }
|
43
|
+
|
44
|
+
let(:lockfile) { ChefDK::PolicyfileLock.new(storage_config) }
|
45
|
+
|
46
|
+
describe "populating the deserialized lock" do
|
47
|
+
|
48
|
+
before do
|
49
|
+
lockfile.build_from_lock_data(valid_lock_data)
|
50
|
+
end
|
51
|
+
|
52
|
+
it "includes the run list" do
|
53
|
+
expect(lockfile.run_list).to eq(["recipe[cookbook::recipe_name]"])
|
54
|
+
end
|
55
|
+
|
56
|
+
it "includes the named run lists" do
|
57
|
+
expect(lockfile.named_run_lists).to eq({ "fast-deploy" => [ "recipe[cookbook::deployit]" ] })
|
58
|
+
end
|
59
|
+
|
60
|
+
it "includes the cookbook locks" do
|
61
|
+
expect(lockfile.cookbook_locks).to eq({})
|
62
|
+
end
|
63
|
+
|
64
|
+
it "includes the attributes" do
|
65
|
+
expect(lockfile.default_attributes).to eq({"foo" => "bar"})
|
66
|
+
expect(lockfile.override_attributes).to eq({"override_foo" => "override_bar"})
|
67
|
+
end
|
68
|
+
|
69
|
+
end
|
70
|
+
|
71
|
+
describe "validating required fields" do
|
72
|
+
|
73
|
+
it "does not raise an error when all fields are valid" do
|
74
|
+
expect { lockfile.build_from_lock_data(valid_lock_data) }.to_not raise_error
|
75
|
+
end
|
76
|
+
|
77
|
+
it "requires the name to be present" do
|
78
|
+
missing_name = valid_lock_data.dup
|
79
|
+
missing_name.delete("name")
|
80
|
+
|
81
|
+
expect { lockfile.build_from_lock_data(missing_name) }.to raise_error(ChefDK::InvalidLockfile)
|
82
|
+
|
83
|
+
blank_name = valid_lock_data.dup
|
84
|
+
blank_name["name"] = ""
|
85
|
+
expect { lockfile.build_from_lock_data(blank_name) }.to raise_error(ChefDK::InvalidLockfile)
|
86
|
+
|
87
|
+
invalid_name = valid_lock_data.dup
|
88
|
+
invalid_name["name"] = {}
|
89
|
+
expect { lockfile.build_from_lock_data(invalid_name) }.to raise_error(ChefDK::InvalidLockfile)
|
90
|
+
end
|
91
|
+
|
92
|
+
it "requires the run_list to be present" do
|
93
|
+
no_run_list = valid_lock_data.dup
|
94
|
+
no_run_list.delete("run_list")
|
95
|
+
|
96
|
+
expect { lockfile.build_from_lock_data(no_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
97
|
+
|
98
|
+
bad_run_list = valid_lock_data.dup
|
99
|
+
bad_run_list["run_list"] = "bad data"
|
100
|
+
expect { lockfile.build_from_lock_data(bad_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
101
|
+
end
|
102
|
+
|
103
|
+
it "validates the format of run_list items" do
|
104
|
+
bad_run_list = valid_lock_data.dup
|
105
|
+
bad_run_list["run_list"] = [ "bad data" ]
|
106
|
+
|
107
|
+
expect { lockfile.build_from_lock_data(bad_run_list) }.to raise_error(ChefDK::InvalidLockfile)
|
108
|
+
end
|
109
|
+
|
110
|
+
it "allows the named_run_lists field to be absent" do
|
111
|
+
missing_named_run_lists = valid_lock_data.dup
|
112
|
+
missing_named_run_lists.delete("named_run_lists")
|
113
|
+
|
114
|
+
expect { lockfile.build_from_lock_data(missing_named_run_lists) }.to_not raise_error
|
115
|
+
end
|
116
|
+
|
117
|
+
it "requires the named_run_lists field to be a Hash if present" do
|
118
|
+
bad_named_run_lists = valid_lock_data.dup
|
119
|
+
bad_named_run_lists["named_run_lists"] = false
|
120
|
+
|
121
|
+
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
122
|
+
end
|
123
|
+
|
124
|
+
it "requires the keys in named_run_lists to be strings" do
|
125
|
+
bad_named_run_lists = valid_lock_data.dup
|
126
|
+
bad_named_run_lists["named_run_lists"] = { 42 => [] }
|
127
|
+
|
128
|
+
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
129
|
+
end
|
130
|
+
|
131
|
+
it "requires the values in named_run_lists to be arrays" do
|
132
|
+
bad_named_run_lists = valid_lock_data.dup
|
133
|
+
bad_named_run_lists["named_run_lists"] = { "bad" => 42 }
|
134
|
+
|
135
|
+
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
136
|
+
end
|
137
|
+
|
138
|
+
it "requires the values in named_run_lists to be valid run lists" do
|
139
|
+
bad_named_run_lists = valid_lock_data.dup
|
140
|
+
bad_named_run_lists["named_run_lists"] = { "bad" => [ 42 ] }
|
141
|
+
|
142
|
+
expect { lockfile.build_from_lock_data(bad_named_run_lists) }.to raise_error(ChefDK::InvalidLockfile)
|
143
|
+
end
|
144
|
+
it "requires the `cookbook_locks` section be present and its value is a Hash" do
|
145
|
+
missing_locks = valid_lock_data.dup
|
146
|
+
missing_locks.delete("cookbook_locks")
|
147
|
+
|
148
|
+
expect { lockfile.build_from_lock_data(missing_locks) }.to raise_error(ChefDK::InvalidLockfile)
|
149
|
+
|
150
|
+
invalid_locks = valid_lock_data.dup
|
151
|
+
invalid_locks["cookbook_locks"] = []
|
152
|
+
expect { lockfile.build_from_lock_data(invalid_locks) }.to raise_error(ChefDK::InvalidLockfile)
|
153
|
+
end
|
154
|
+
|
155
|
+
it "requires the `default_attributes` section be present and its value is a Hash" do
|
156
|
+
missing_attrs = valid_lock_data.dup
|
157
|
+
missing_attrs.delete("default_attributes")
|
158
|
+
|
159
|
+
expect { lockfile.build_from_lock_data(missing_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
160
|
+
|
161
|
+
invalid_attrs = valid_lock_data.dup
|
162
|
+
invalid_attrs["default_attributes"] = []
|
163
|
+
|
164
|
+
expect { lockfile.build_from_lock_data(invalid_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
165
|
+
end
|
166
|
+
|
167
|
+
it "requires the `override_attributes` section be present and its value is a Hash" do
|
168
|
+
missing_attrs = valid_lock_data.dup
|
169
|
+
missing_attrs.delete("override_attributes")
|
170
|
+
|
171
|
+
expect { lockfile.build_from_lock_data(missing_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
172
|
+
|
173
|
+
invalid_attrs = valid_lock_data.dup
|
174
|
+
invalid_attrs["override_attributes"] = []
|
175
|
+
|
176
|
+
expect { lockfile.build_from_lock_data(invalid_attrs) }.to raise_error(ChefDK::InvalidLockfile)
|
177
|
+
end
|
178
|
+
|
179
|
+
describe "validating solution_dependencies" do
|
180
|
+
|
181
|
+
it "requires the `solution_dependencies' section be present" do
|
182
|
+
missing_soln_deps = valid_lock_data.dup
|
183
|
+
missing_soln_deps.delete("solution_dependencies")
|
184
|
+
|
185
|
+
expect { lockfile.build_from_lock_data(missing_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
186
|
+
end
|
187
|
+
|
188
|
+
it "requires the solution_dependencies object be a Hash" do
|
189
|
+
invalid_soln_deps = valid_lock_data.dup
|
190
|
+
invalid_soln_deps["solution_dependencies"] = []
|
191
|
+
expect { lockfile.build_from_lock_data(invalid_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
192
|
+
end
|
193
|
+
|
194
|
+
it "requires the solution_dependencies object have a 'Policyfile' and 'dependencies' key" do
|
195
|
+
missing_keys_soln_deps = valid_lock_data.dup
|
196
|
+
missing_keys_soln_deps["solution_dependencies"] = {}
|
197
|
+
expect { lockfile.build_from_lock_data(missing_keys_soln_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
198
|
+
|
199
|
+
missing_policyfile_key = valid_lock_data.dup
|
200
|
+
missing_policyfile_key["solution_dependencies"] = {"dependencies" => {} }
|
201
|
+
expect { lockfile.build_from_lock_data(missing_policyfile_key) }.to raise_error(ChefDK::InvalidLockfile)
|
202
|
+
|
203
|
+
missing_dependencies_key = valid_lock_data.dup
|
204
|
+
missing_dependencies_key["solution_dependencies"] = { "Policyfile" => [] }
|
205
|
+
expect { lockfile.build_from_lock_data(missing_dependencies_key) }.to raise_error(ChefDK::InvalidLockfile)
|
206
|
+
end
|
207
|
+
|
208
|
+
it "requires the Policyfile dependencies be an Array" do
|
209
|
+
invalid_policyfile_deps = valid_lock_data.dup
|
210
|
+
invalid_policyfile_deps["solution_dependencies"] = {"Policyfile" => 42, "dependencies" => {} }
|
211
|
+
expect { lockfile.build_from_lock_data(invalid_policyfile_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
212
|
+
end
|
213
|
+
|
214
|
+
it %q(requires the Policyfile dependencies be formatted like [ "COOKBOOK_NAME", "CONSTRAINT" ]) do
|
215
|
+
invalid_policyfile_deps_content = valid_lock_data.dup
|
216
|
+
invalid_policyfile_deps_content["solution_dependencies"] = { "Policyfile" => [ "bad" ], "dependencies" => {} }
|
217
|
+
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content) }.to raise_error(ChefDK::InvalidLockfile)
|
218
|
+
|
219
|
+
invalid_policyfile_deps_content2 = valid_lock_data.dup
|
220
|
+
invalid_policyfile_deps_content2["solution_dependencies"] = { "Policyfile" => [ [42, "~> 2.0"] ], "dependencies" => {} }
|
221
|
+
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content2) }.to raise_error(ChefDK::InvalidLockfile)
|
222
|
+
|
223
|
+
invalid_policyfile_deps_content3 = valid_lock_data.dup
|
224
|
+
invalid_policyfile_deps_content3["solution_dependencies"] = { "Policyfile" => [ ["cookbook_name", "bad"] ], "dependencies" => {} }
|
225
|
+
expect { lockfile.build_from_lock_data(invalid_policyfile_deps_content3) }.to raise_error(ChefDK::InvalidLockfile)
|
226
|
+
end
|
227
|
+
|
228
|
+
it "requires the cookbook dependencies be a Hash" do
|
229
|
+
invalid_cookbook_deps = valid_lock_data.dup
|
230
|
+
invalid_cookbook_deps["solution_dependencies"] = { "Policyfile" => [], "dependencies" => 42 }
|
231
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
232
|
+
end
|
233
|
+
|
234
|
+
it "requires the cookbook dependencies entries be in the correct format" do
|
235
|
+
invalid_cookbook_deps = valid_lock_data.dup
|
236
|
+
bad_deps = { 42 => 42 }
|
237
|
+
invalid_cookbook_deps["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps }
|
238
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_deps) }.to raise_error(ChefDK::InvalidLockfile)
|
239
|
+
|
240
|
+
invalid_cookbook_deps2 = valid_lock_data.dup
|
241
|
+
bad_deps2 = { "bad-format" => [] }
|
242
|
+
invalid_cookbook_deps2["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps2 }
|
243
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_deps2) }.to raise_error(ChefDK::InvalidLockfile)
|
244
|
+
|
245
|
+
invalid_cookbook_deps3 = valid_lock_data.dup
|
246
|
+
bad_deps3 = { "cookbook (1.0.0)" => 42 }
|
247
|
+
invalid_cookbook_deps3["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps3 }
|
248
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_deps3) }.to raise_error(ChefDK::InvalidLockfile)
|
249
|
+
|
250
|
+
invalid_cookbook_deps4 = valid_lock_data.dup
|
251
|
+
bad_deps4 = { "cookbook (1.0.0)" => [ 42 ] }
|
252
|
+
invalid_cookbook_deps4["solution_dependencies"] = { "Policyfile" => [], "dependencies" => bad_deps4 }
|
253
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_deps4) }.to raise_error(ChefDK::InvalidLockfile)
|
254
|
+
end
|
255
|
+
end
|
256
|
+
|
257
|
+
describe "validating cookbook_locks entries" do
|
258
|
+
|
259
|
+
# TODO: also check non-cached cookbook
|
260
|
+
let(:valid_cookbook_lock) do
|
261
|
+
{
|
262
|
+
"version" => "1.0.0",
|
263
|
+
"identifier" => "68c13b136a49b4e66cfe9d8aa2b5a85167b5bf9b",
|
264
|
+
"dotted_decimal_identifier" => "111.222.333",
|
265
|
+
"cache_key" => "foo-1.0.0",
|
266
|
+
"source_options" => {}
|
267
|
+
}
|
268
|
+
end
|
269
|
+
|
270
|
+
it "requires that each cookbook lock be a Hash" do
|
271
|
+
invalid_cookbook_lock = valid_lock_data.dup
|
272
|
+
invalid_cookbook_lock["cookbook_locks"] = { "foo" => 42 }
|
273
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_lock) }.to raise_error(ChefDK::InvalidLockfile)
|
274
|
+
end
|
275
|
+
|
276
|
+
it "requires that cookbook locks not be empty" do
|
277
|
+
invalid_cookbook_lock = valid_lock_data.dup
|
278
|
+
invalid_cookbook_lock["cookbook_locks"] = { "foo" => {} }
|
279
|
+
expect { lockfile.build_from_lock_data(invalid_cookbook_lock) }.to raise_error(ChefDK::InvalidLockfile)
|
280
|
+
end
|
281
|
+
|
282
|
+
it "requires that each cookbook lock have a version" do
|
283
|
+
invalid_lockfile = valid_lock_data.dup
|
284
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
285
|
+
invalid_cookbook_lock.delete("version")
|
286
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
287
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
288
|
+
end
|
289
|
+
|
290
|
+
it "requires that the version be a string" do
|
291
|
+
invalid_lockfile = valid_lock_data.dup
|
292
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
293
|
+
invalid_cookbook_lock["version"] = 42
|
294
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
295
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
296
|
+
end
|
297
|
+
|
298
|
+
it "requires that each cookbook lock have an identifier" do
|
299
|
+
invalid_lockfile = valid_lock_data.dup
|
300
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
301
|
+
invalid_cookbook_lock.delete("identifier")
|
302
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
303
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
304
|
+
end
|
305
|
+
|
306
|
+
it "requires that the identifier be a string" do
|
307
|
+
invalid_lockfile = valid_lock_data.dup
|
308
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
309
|
+
invalid_cookbook_lock["identifier"] = 42
|
310
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
311
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
312
|
+
end
|
313
|
+
|
314
|
+
it "requires that a cookbook lock have a key named `cache_key'" do
|
315
|
+
invalid_lockfile = valid_lock_data.dup
|
316
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
317
|
+
invalid_cookbook_lock.delete("cache_key")
|
318
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
319
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
320
|
+
end
|
321
|
+
|
322
|
+
it "requires that the cache_key be a string or null" do
|
323
|
+
invalid_lockfile = valid_lock_data.dup
|
324
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
325
|
+
invalid_cookbook_lock["cache_key"] = 42
|
326
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
327
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
328
|
+
end
|
329
|
+
|
330
|
+
it "requires that a cookbook lock have a source_options attribute" do
|
331
|
+
invalid_lockfile = valid_lock_data.dup
|
332
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
333
|
+
invalid_cookbook_lock.delete("source_options")
|
334
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
335
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
336
|
+
end
|
337
|
+
|
338
|
+
it "requires that source options be a Hash" do
|
339
|
+
invalid_lockfile = valid_lock_data.dup
|
340
|
+
invalid_cookbook_lock = valid_cookbook_lock.dup
|
341
|
+
invalid_cookbook_lock["source_options"] = 42
|
342
|
+
invalid_lockfile["cookbook_locks"] = { "foo" => invalid_cookbook_lock }
|
343
|
+
expect { lockfile.build_from_lock_data(invalid_lockfile) }.to raise_error(ChefDK::InvalidLockfile)
|
344
|
+
end
|
345
|
+
|
346
|
+
it "requires that a cookbook lock be a valid local cookbook if `cache_key' is null/nil" do
|
347
|
+
valid_lock_with_local_cookbook = valid_lock_data.dup
|
348
|
+
valid_local_cookbook = valid_cookbook_lock.dup
|
349
|
+
valid_local_cookbook["cache_key"] = nil
|
350
|
+
valid_local_cookbook["source"] = "path/to/foo"
|
351
|
+
valid_lock_with_local_cookbook["cookbook_locks"] = { "foo" => valid_local_cookbook }
|
352
|
+
expect { lockfile.build_from_lock_data(valid_lock_with_local_cookbook) }.to_not raise_error
|
353
|
+
|
354
|
+
invalid_lock_with_local_cookbook = valid_lock_data.dup
|
355
|
+
invalid_local_cookbook = valid_cookbook_lock.dup
|
356
|
+
invalid_local_cookbook["cache_key"] = nil
|
357
|
+
invalid_local_cookbook["source"] = 42
|
358
|
+
invalid_lock_with_local_cookbook["cookbook_locks"] = { "foo" => invalid_local_cookbook }
|
359
|
+
expect { lockfile.build_from_lock_data(invalid_lock_with_local_cookbook) }.to raise_error(ChefDK::InvalidLockfile)
|
360
|
+
end
|
361
|
+
|
362
|
+
it "requires that a cookbook lock w/ a key named `cache_key' be a valid cached cookbook structure" do
|
363
|
+
valid_lock_with_cached_cookbook = valid_lock_data.dup
|
364
|
+
valid_cached_cookbook = valid_cookbook_lock.dup
|
365
|
+
valid_cached_cookbook["cache_key"] = nil
|
366
|
+
valid_cached_cookbook["source"] = "path/to/foo"
|
367
|
+
valid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => valid_cached_cookbook }
|
368
|
+
expect { lockfile.build_from_lock_data(valid_lock_with_cached_cookbook) }.to_not raise_error
|
369
|
+
|
370
|
+
invalid_lock_with_cached_cookbook = valid_lock_data.dup
|
371
|
+
invalid_cached_cookbook = valid_cookbook_lock.dup
|
372
|
+
invalid_cached_cookbook["cache_key"] = 42
|
373
|
+
invalid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => invalid_cached_cookbook }
|
374
|
+
expect { lockfile.build_from_lock_data(invalid_lock_with_cached_cookbook) }.to raise_error(ChefDK::InvalidLockfile)
|
375
|
+
end
|
376
|
+
|
377
|
+
end
|
378
|
+
end
|
379
|
+
|
380
|
+
describe "populating lock data from an archive" do
|
381
|
+
|
382
|
+
let(:valid_cookbook_lock) do
|
383
|
+
{
|
384
|
+
"version" => "1.0.0",
|
385
|
+
"identifier" => "68c13b136a49b4e66cfe9d8aa2b5a85167b5bf9b",
|
386
|
+
"dotted_decimal_identifier" => "111.222.333",
|
387
|
+
"cache_key" => nil,
|
388
|
+
"source" => "path/to/foo",
|
389
|
+
"source_options" => { path: "path/to/foo"},
|
390
|
+
"scm_info" => nil
|
391
|
+
}
|
392
|
+
end
|
393
|
+
|
394
|
+
let(:lock_data) do
|
395
|
+
valid_lock_with_cached_cookbook = valid_lock_data.dup
|
396
|
+
valid_cached_cookbook = valid_cookbook_lock.dup
|
397
|
+
valid_cached_cookbook["cache_key"] = nil
|
398
|
+
valid_cached_cookbook["source"] = "path/to/foo"
|
399
|
+
valid_lock_with_cached_cookbook["cookbook_locks"] = { "foo" => valid_cached_cookbook }
|
400
|
+
valid_lock_with_cached_cookbook
|
401
|
+
end
|
402
|
+
|
403
|
+
before do
|
404
|
+
lockfile.build_from_archive(lock_data)
|
405
|
+
end
|
406
|
+
|
407
|
+
it "creates cookbook locks as archived cookbooks" do
|
408
|
+
locks = lockfile.cookbook_locks
|
409
|
+
|
410
|
+
expect(locks).to have_key("foo")
|
411
|
+
|
412
|
+
cb_foo = locks["foo"]
|
413
|
+
expect(cb_foo).to be_a(ChefDK::Policyfile::ArchivedCookbook)
|
414
|
+
|
415
|
+
expected_path = File.join(storage_config.relative_paths_root, "cookbooks", "foo-111.222.333")
|
416
|
+
|
417
|
+
expect(cb_foo.cookbook_path).to eq(expected_path)
|
418
|
+
expect(cb_foo.dotted_decimal_identifier).to eq("111.222.333")
|
419
|
+
expect(locks["foo"].to_lock).to eq(valid_cookbook_lock)
|
420
|
+
end
|
421
|
+
|
422
|
+
|
423
|
+
end
|
424
|
+
|
425
|
+
end
|