chef-dk 0.8.0 → 0.9.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CONTRIBUTING.md +190 -190
- data/Gemfile +26 -0
- data/LICENSE +201 -201
- data/README.md +276 -276
- data/Rakefile +18 -18
- data/bin/chef +25 -25
- data/lib/chef-dk.rb +19 -19
- data/lib/chef-dk/authenticated_http.rb +40 -40
- data/lib/chef-dk/builtin_commands.rb +60 -60
- data/lib/chef-dk/chef_runner.rb +98 -98
- data/lib/chef-dk/cli.rb +200 -200
- data/lib/chef-dk/command/base.rb +79 -75
- data/lib/chef-dk/command/clean_policy_cookbooks.rb +116 -116
- data/lib/chef-dk/command/clean_policy_revisions.rb +113 -113
- data/lib/chef-dk/command/delete_policy.rb +122 -122
- data/lib/chef-dk/command/delete_policy_group.rb +122 -122
- data/lib/chef-dk/command/diff.rb +316 -316
- data/lib/chef-dk/command/env.rb +90 -90
- data/lib/chef-dk/command/exec.rb +45 -45
- data/lib/chef-dk/command/export.rb +151 -153
- data/lib/chef-dk/command/gem.rb +47 -47
- data/lib/chef-dk/command/generate.rb +120 -118
- data/lib/chef-dk/command/generator_commands.rb +80 -80
- data/lib/chef-dk/command/generator_commands/app.rb +107 -107
- data/lib/chef-dk/command/generator_commands/attribute.rb +37 -37
- data/lib/chef-dk/command/generator_commands/base.rb +121 -121
- data/lib/chef-dk/command/generator_commands/cookbook.rb +119 -108
- data/lib/chef-dk/command/generator_commands/cookbook_code_file.rb +100 -100
- data/lib/chef-dk/command/generator_commands/cookbook_file.rb +45 -45
- data/lib/chef-dk/command/generator_commands/generator_generator.rb +177 -0
- data/lib/chef-dk/command/generator_commands/lwrp.rb +36 -36
- data/lib/chef-dk/command/generator_commands/policyfile.rb +86 -83
- data/lib/chef-dk/command/generator_commands/recipe.rb +36 -36
- data/lib/chef-dk/command/generator_commands/repo.rb +96 -96
- data/lib/chef-dk/command/generator_commands/template.rb +46 -46
- data/lib/chef-dk/command/install.rb +121 -121
- data/lib/chef-dk/command/provision.rb +438 -438
- data/lib/chef-dk/command/push.rb +118 -118
- data/lib/chef-dk/command/push_archive.rb +126 -126
- data/lib/chef-dk/command/shell_init.rb +180 -180
- data/lib/chef-dk/command/show_policy.rb +165 -165
- data/lib/chef-dk/command/undelete.rb +155 -155
- data/lib/chef-dk/command/update.rb +129 -129
- data/lib/chef-dk/command/verify.rb +490 -453
- data/lib/chef-dk/commands_map.rb +115 -115
- data/lib/chef-dk/completions/bash.sh.erb +5 -5
- data/lib/chef-dk/completions/chef.fish.erb +10 -10
- data/lib/chef-dk/completions/zsh.zsh.erb +21 -21
- data/lib/chef-dk/component_test.rb +171 -171
- data/lib/chef-dk/configurable.rb +57 -52
- data/lib/chef-dk/cookbook_metadata.rb +45 -45
- data/lib/chef-dk/cookbook_omnifetch.rb +32 -32
- data/lib/chef-dk/cookbook_profiler/git.rb +151 -151
- data/lib/chef-dk/cookbook_profiler/identifiers.rb +72 -72
- data/lib/chef-dk/cookbook_profiler/null_scm.rb +32 -32
- data/lib/chef-dk/exceptions.rb +113 -113
- data/lib/chef-dk/generator.rb +163 -162
- data/lib/chef-dk/helpers.rb +159 -159
- data/lib/chef-dk/pager.rb +106 -106
- data/lib/chef-dk/policyfile/chef_repo_cookbook_source.rb +122 -122
- data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +54 -54
- data/lib/chef-dk/policyfile/community_cookbook_source.rb +82 -82
- data/lib/chef-dk/policyfile/comparison_base.rb +124 -124
- data/lib/chef-dk/policyfile/cookbook_location_specification.rb +133 -133
- data/lib/chef-dk/policyfile/cookbook_locks.rb +466 -466
- data/lib/chef-dk/policyfile/cookbook_sources.rb +21 -21
- data/lib/chef-dk/policyfile/differ.rb +266 -266
- data/lib/chef-dk/policyfile/dsl.rb +197 -197
- data/lib/chef-dk/policyfile/lister.rb +232 -232
- data/lib/chef-dk/policyfile/null_cookbook_source.rb +45 -45
- data/lib/chef-dk/policyfile/read_cookbook_for_compat_mode_upload.rb +124 -124
- data/lib/chef-dk/policyfile/reports/install.rb +70 -70
- data/lib/chef-dk/policyfile/reports/table_printer.rb +58 -58
- data/lib/chef-dk/policyfile/reports/upload.rb +70 -70
- data/lib/chef-dk/policyfile/solution_dependencies.rb +298 -298
- data/lib/chef-dk/policyfile/storage_config.rb +100 -100
- data/lib/chef-dk/policyfile/undo_record.rb +142 -142
- data/lib/chef-dk/policyfile/undo_stack.rb +130 -130
- data/lib/chef-dk/policyfile/uploader.rb +213 -213
- data/lib/chef-dk/policyfile_compiler.rb +322 -322
- data/lib/chef-dk/policyfile_lock.rb +552 -552
- data/lib/chef-dk/policyfile_services/clean_policies.rb +95 -95
- data/lib/chef-dk/policyfile_services/clean_policy_cookbooks.rb +125 -125
- data/lib/chef-dk/policyfile_services/export_repo.rb +309 -281
- data/lib/chef-dk/policyfile_services/install.rb +125 -125
- data/lib/chef-dk/policyfile_services/push.rb +114 -114
- data/lib/chef-dk/policyfile_services/push_archive.rb +173 -173
- data/lib/chef-dk/policyfile_services/rm_policy.rb +142 -142
- data/lib/chef-dk/policyfile_services/rm_policy_group.rb +86 -86
- data/lib/chef-dk/policyfile_services/show_policy.rb +237 -237
- data/lib/chef-dk/policyfile_services/undelete.rb +108 -108
- data/lib/chef-dk/policyfile_services/update_attributes.rb +104 -104
- data/lib/chef-dk/service_exception_inspectors.rb +25 -25
- data/lib/chef-dk/service_exception_inspectors/base.rb +40 -40
- data/lib/chef-dk/service_exception_inspectors/http.rb +121 -121
- data/lib/chef-dk/service_exceptions.rb +143 -143
- data/lib/chef-dk/shell_out.rb +36 -36
- data/lib/chef-dk/skeletons/code_generator/files/default/Berksfile +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/chefignore +100 -100
- data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README-policy.md +9 -9
- data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README.md +54 -54
- data/lib/chef-dk/skeletons/code_generator/files/default/gitignore +16 -16
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/README.md +28 -28
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/README.md +27 -0
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/attributes/default.rb +7 -7
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/metadata.rb +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/recipes/default.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/README.md +57 -57
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/example/example_item.json +3 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/README.md +9 -9
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/example.json +12 -12
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/README.md +8 -8
- data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/example.json +12 -12
- data/lib/chef-dk/skeletons/code_generator/files/default/serverspec_spec_helper.rb +8 -3
- data/lib/chef-dk/skeletons/code_generator/files/default/spec_helper.rb +2 -2
- data/lib/chef-dk/skeletons/code_generator/metadata.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/recipes/app.rb +97 -97
- data/lib/chef-dk/skeletons/code_generator/recipes/attribute.rb +12 -12
- data/lib/chef-dk/skeletons/code_generator/recipes/cookbook.rb +104 -92
- data/lib/chef-dk/skeletons/code_generator/recipes/cookbook_file.rb +24 -24
- data/lib/chef-dk/skeletons/code_generator/recipes/lwrp.rb +23 -23
- data/lib/chef-dk/skeletons/code_generator/recipes/policyfile.rb +8 -8
- data/lib/chef-dk/skeletons/code_generator/recipes/recipe.rb +27 -27
- data/lib/chef-dk/skeletons/code_generator/recipes/repo.rb +48 -47
- data/lib/chef-dk/skeletons/code_generator/recipes/template.rb +32 -32
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.all_rights.erb +3 -3
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.apache2.erb +201 -201
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv2.erb +339 -339
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv3.erb +674 -674
- data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.mit.erb +21 -21
- data/lib/chef-dk/skeletons/code_generator/templates/default/Policyfile.rb.erb +20 -16
- data/lib/chef-dk/skeletons/code_generator/templates/default/README.md.erb +4 -4
- data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen.yml.erb +16 -16
- data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen_policyfile.yml.erb +27 -0
- data/lib/chef-dk/skeletons/code_generator/templates/default/metadata.rb.erb +7 -7
- data/lib/chef-dk/skeletons/code_generator/templates/default/recipe.rb.erb +5 -5
- data/lib/chef-dk/skeletons/code_generator/templates/default/recipe_spec.rb.erb +20 -20
- data/lib/chef-dk/skeletons/code_generator/templates/default/repo/gitignore.erb +11 -11
- data/lib/chef-dk/skeletons/code_generator/templates/default/serverspec_default_spec.rb.erb +9 -9
- data/lib/chef-dk/ui.rb +58 -58
- data/lib/chef-dk/version.rb +20 -20
- data/lib/kitchen/provisioner/policyfile_zero.rb +193 -164
- data/spec/shared/a_file_generator.rb +125 -125
- data/spec/shared/a_generated_file.rb +12 -12
- data/spec/shared/command_with_ui_object.rb +11 -11
- data/spec/shared/custom_generator_cookbook.rb +117 -117
- data/spec/shared/fixture_cookbook_checksums.rb +47 -47
- data/spec/shared/setup_git_cookbooks.rb +53 -53
- data/spec/spec_helper.rb +49 -48
- data/spec/test_helpers.rb +84 -84
- data/spec/unit/chef_runner_spec.rb +111 -110
- data/spec/unit/cli_spec.rb +357 -357
- data/spec/unit/command/base_spec.rb +169 -136
- data/spec/unit/command/clean_policy_cookbooks_spec.rb +181 -181
- data/spec/unit/command/clean_policy_revisions_spec.rb +181 -181
- data/spec/unit/command/delete_policy_group_spec.rb +207 -207
- data/spec/unit/command/delete_policy_spec.rb +207 -207
- data/spec/unit/command/diff_spec.rb +312 -312
- data/spec/unit/command/env_spec.rb +52 -52
- data/spec/unit/command/exec_spec.rb +179 -179
- data/spec/unit/command/export_spec.rb +189 -189
- data/spec/unit/command/generate_spec.rb +142 -142
- data/spec/unit/command/generator_commands/app_spec.rb +169 -169
- data/spec/unit/command/generator_commands/attribute_spec.rb +32 -32
- data/spec/unit/command/generator_commands/cookbook_file_spec.rb +32 -32
- data/spec/unit/command/generator_commands/cookbook_spec.rb +320 -240
- data/spec/unit/command/generator_commands/generator_generator_spec.rb +229 -0
- data/spec/unit/command/generator_commands/lwrp_spec.rb +32 -32
- data/spec/unit/command/generator_commands/policyfile_spec.rb +125 -125
- data/spec/unit/command/generator_commands/recipe_spec.rb +34 -34
- data/spec/unit/command/generator_commands/repo_spec.rb +283 -283
- data/spec/unit/command/generator_commands/template_spec.rb +32 -32
- data/spec/unit/command/install_spec.rb +179 -179
- data/spec/unit/command/provision_spec.rb +592 -592
- data/spec/unit/command/push_archive_spec.rb +153 -153
- data/spec/unit/command/push_spec.rb +199 -199
- data/spec/unit/command/shell_init_spec.rb +329 -329
- data/spec/unit/command/show_policy_spec.rb +235 -235
- data/spec/unit/command/undelete_spec.rb +246 -246
- data/spec/unit/command/update_spec.rb +251 -251
- data/spec/unit/command/verify_spec.rb +323 -322
- data/spec/unit/commands_map_spec.rb +57 -57
- data/spec/unit/component_test_spec.rb +126 -126
- data/spec/unit/cookbook_metadata_spec.rb +98 -98
- data/spec/unit/cookbook_profiler/git_spec.rb +176 -176
- data/spec/unit/cookbook_profiler/identifiers_spec.rb +83 -83
- data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_one.rb +9 -9
- data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_two.rb +9 -9
- data/spec/unit/fixtures/command/cli_test_command.rb +26 -26
- data/spec/unit/fixtures/command/explicit_path_example.rb +7 -7
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/.kitchen.yml +16 -16
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/Berksfile +3 -3
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/README.md +4 -4
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/chefignore +96 -96
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/metadata.rb +8 -8
- data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/recipes/default.rb +8 -8
- data/spec/unit/fixtures/cookbooks_api/pruned_small_universe.json +1321 -1321
- data/spec/unit/fixtures/cookbooks_api/small_universe.json +2987 -2987
- data/spec/unit/fixtures/cookbooks_api/universe.json +1 -1
- data/spec/unit/fixtures/cookbooks_api/update_fixtures.rb +36 -36
- data/spec/unit/fixtures/dev_cookbooks/README.md +16 -16
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/integration_test +2 -2
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/verify_me +5 -5
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/chef/verify_me +3 -3
- data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/test-kitchen/verify_me +2 -2
- data/spec/unit/fixtures/example_cookbook/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/example_cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/metadata.json +5 -5
- data/spec/unit/fixtures/example_cookbook_metadata_json_only/recipes/default.rb +8 -8
- data/spec/unit/fixtures/example_cookbook_no_metadata/.gitignore +17 -17
- data/spec/unit/fixtures/example_cookbook_no_metadata/.kitchen.yml +16 -16
- data/spec/unit/fixtures/example_cookbook_no_metadata/Berksfile +3 -3
- data/spec/unit/fixtures/example_cookbook_no_metadata/README.md +4 -4
- data/spec/unit/fixtures/example_cookbook_no_metadata/chefignore +96 -96
- data/spec/unit/fixtures/example_cookbook_no_metadata/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/Berksfile +3 -3
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/metadata.rb +9 -9
- data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/.kitchen.yml +16 -16
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/Berksfile +3 -3
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/chefignore +96 -96
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/recipes/default.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/metadata-missing/README.md +2 -2
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
- data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
- data/spec/unit/generator_spec.rb +120 -120
- data/spec/unit/helpers_spec.rb +92 -92
- data/spec/unit/pager_spec.rb +119 -119
- data/spec/unit/policyfile/chef_repo_cookbook_source_spec.rb +66 -66
- data/spec/unit/policyfile/chef_server_cookbook_source_spec.rb +34 -34
- data/spec/unit/policyfile/community_cookbook_source_spec.rb +51 -51
- data/spec/unit/policyfile/comparison_base_spec.rb +343 -343
- data/spec/unit/policyfile/cookbook_location_specification_spec.rb +252 -252
- data/spec/unit/policyfile/cookbook_locks_spec.rb +529 -529
- data/spec/unit/policyfile/differ_spec.rb +687 -687
- data/spec/unit/policyfile/lister_spec.rb +272 -272
- data/spec/unit/policyfile/null_cookbook_source_spec.rb +35 -35
- data/spec/unit/policyfile/read_cookbook_for_compat_mode_upload_spec.rb +92 -92
- data/spec/unit/policyfile/reports/install_spec.rb +115 -115
- data/spec/unit/policyfile/reports/upload_spec.rb +96 -96
- data/spec/unit/policyfile/solution_dependencies_spec.rb +145 -145
- data/spec/unit/policyfile/storage_config_spec.rb +172 -172
- data/spec/unit/policyfile/undo_record_spec.rb +260 -260
- data/spec/unit/policyfile/undo_stack_spec.rb +266 -266
- data/spec/unit/policyfile/uploader_spec.rb +410 -410
- data/spec/unit/policyfile_demands_spec.rb +876 -876
- data/spec/unit/policyfile_evaluation_spec.rb +441 -441
- data/spec/unit/policyfile_lock_build_spec.rb +1056 -1056
- data/spec/unit/policyfile_lock_install_spec.rb +138 -138
- data/spec/unit/policyfile_lock_serialization_spec.rb +425 -425
- data/spec/unit/policyfile_lock_validation_spec.rb +611 -611
- data/spec/unit/policyfile_services/clean_policies_spec.rb +236 -236
- data/spec/unit/policyfile_services/clean_policy_cookbooks_spec.rb +275 -275
- data/spec/unit/policyfile_services/export_repo_spec.rb +439 -416
- data/spec/unit/policyfile_services/install_spec.rb +191 -191
- data/spec/unit/policyfile_services/push_archive_spec.rb +345 -345
- data/spec/unit/policyfile_services/push_spec.rb +233 -233
- data/spec/unit/policyfile_services/rm_policy_group_spec.rb +241 -241
- data/spec/unit/policyfile_services/rm_policy_spec.rb +266 -266
- data/spec/unit/policyfile_services/show_policy_spec.rb +889 -889
- data/spec/unit/policyfile_services/undelete_spec.rb +304 -304
- data/spec/unit/policyfile_services/update_attributes_spec.rb +217 -217
- data/spec/unit/service_exception_inspectors/base_spec.rb +43 -43
- data/spec/unit/service_exception_inspectors/http_spec.rb +140 -140
- data/spec/unit/shell_out_spec.rb +34 -34
- metadata +9 -3
@@ -1,191 +1,191 @@
|
|
1
|
-
#
|
2
|
-
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
require 'spec_helper'
|
19
|
-
require 'chef-dk/policyfile_services/install'
|
20
|
-
|
21
|
-
describe ChefDK::PolicyfileServices::Install do
|
22
|
-
|
23
|
-
include ChefDK::Helpers
|
24
|
-
|
25
|
-
let(:working_dir) do
|
26
|
-
path = File.join(tempdir, "policyfile_services_test_working_dir")
|
27
|
-
Dir.mkdir(path)
|
28
|
-
path
|
29
|
-
end
|
30
|
-
|
31
|
-
let(:policyfile_rb_explicit_name) { nil }
|
32
|
-
|
33
|
-
let(:policyfile_rb_name) { policyfile_rb_explicit_name || "Policyfile.rb" }
|
34
|
-
|
35
|
-
let(:policyfile_lock_name) { "Policyfile.lock.json" }
|
36
|
-
|
37
|
-
let(:policyfile_rb_path) { File.join(working_dir, policyfile_rb_name) }
|
38
|
-
|
39
|
-
let(:policyfile_lock_path) { File.join(working_dir, policyfile_lock_name) }
|
40
|
-
|
41
|
-
let(:local_cookbooks_root) do
|
42
|
-
File.join(fixtures_path, "local_path_cookbooks")
|
43
|
-
end
|
44
|
-
|
45
|
-
let(:policyfile_content) do
|
46
|
-
<<-E
|
47
|
-
name 'install-example'
|
48
|
-
|
49
|
-
run_list 'local-cookbook'
|
50
|
-
|
51
|
-
cookbook 'local-cookbook', path: '#{local_cookbooks_root}/local-cookbook'
|
52
|
-
E
|
53
|
-
end
|
54
|
-
|
55
|
-
let(:overwrite) { false }
|
56
|
-
|
57
|
-
let(:ui) { TestHelpers::TestUI.new }
|
58
|
-
|
59
|
-
let(:install_service) { described_class.new(policyfile: policyfile_rb_name, ui: ui, root_dir: working_dir, overwrite: overwrite) }
|
60
|
-
|
61
|
-
let(:storage_config) do
|
62
|
-
ChefDK::Policyfile::StorageConfig.new( cache_path: nil, relative_paths_root: local_cookbooks_root )
|
63
|
-
end
|
64
|
-
|
65
|
-
def result_policyfile_lock
|
66
|
-
expect(File).to exist(policyfile_lock_path)
|
67
|
-
content = IO.read(policyfile_lock_path)
|
68
|
-
lock_data = FFI_Yajl::Parser.parse(content)
|
69
|
-
ChefDK::PolicyfileLock.new(storage_config).build_from_lock_data(lock_data)
|
70
|
-
end
|
71
|
-
|
72
|
-
context "when no Policyfile is present or specified" do
|
73
|
-
|
74
|
-
it "errors out" do
|
75
|
-
expect { install_service.run }.to raise_error(ChefDK::PolicyfileNotFound, "Policyfile not found at path #{policyfile_rb_path}")
|
76
|
-
end
|
77
|
-
|
78
|
-
end
|
79
|
-
|
80
|
-
context "when a Policyfile exists" do
|
81
|
-
|
82
|
-
before do
|
83
|
-
with_file(policyfile_rb_path) { |f| f.print(policyfile_content) }
|
84
|
-
end
|
85
|
-
|
86
|
-
it "infers that the Policyfile.rb is located at $CWD/Policyfile.rb" do
|
87
|
-
expect(install_service.policyfile_expanded_path).to eq(policyfile_rb_path)
|
88
|
-
end
|
89
|
-
|
90
|
-
it "reads the policyfile from disk" do
|
91
|
-
expect(install_service.policyfile_content).to eq(policyfile_content)
|
92
|
-
end
|
93
|
-
|
94
|
-
context "and the policyfile has an error" do
|
95
|
-
|
96
|
-
let(:policyfile_content) { 'raise "borkbork"' }
|
97
|
-
|
98
|
-
it "errors out and creates no lockfile" do
|
99
|
-
expect { install_service.run }.to raise_error(ChefDK::PolicyfileInstallError)
|
100
|
-
expect(File).to_not exist(policyfile_lock_path)
|
101
|
-
end
|
102
|
-
|
103
|
-
end
|
104
|
-
|
105
|
-
context "and no lockfile exists" do
|
106
|
-
|
107
|
-
it "solves the Policyfile demands, installs cookbooks, emits a lockfile" do
|
108
|
-
install_service.run
|
109
|
-
generated_lock = result_policyfile_lock
|
110
|
-
expect(generated_lock.name).to eq('install-example')
|
111
|
-
expect(generated_lock.cookbook_locks).to have_key("local-cookbook")
|
112
|
-
end
|
113
|
-
|
114
|
-
end
|
115
|
-
|
116
|
-
context "and a lockfile exists and `overwrite` is specified" do
|
117
|
-
|
118
|
-
let(:overwrite) { true }
|
119
|
-
|
120
|
-
before do
|
121
|
-
File.binwrite(policyfile_lock_path, "This is the old lockfile content")
|
122
|
-
end
|
123
|
-
|
124
|
-
it "solves the Policyfile demands, installs cookbooks, emits a lockfile" do
|
125
|
-
install_service.run
|
126
|
-
generated_lock = result_policyfile_lock
|
127
|
-
expect(generated_lock.name).to eq('install-example')
|
128
|
-
expect(generated_lock.cookbook_locks).to have_key("local-cookbook")
|
129
|
-
end
|
130
|
-
|
131
|
-
end
|
132
|
-
|
133
|
-
context "and a lockfile exists" do
|
134
|
-
|
135
|
-
before do
|
136
|
-
install_service.dup.run
|
137
|
-
end
|
138
|
-
|
139
|
-
it "reads the policyfile lock from disk" do
|
140
|
-
lock = install_service.policyfile_lock
|
141
|
-
expect(lock).to be_an_instance_of(ChefDK::PolicyfileLock)
|
142
|
-
expect(lock.name).to eq('install-example')
|
143
|
-
expect(lock.cookbook_locks).to have_key("local-cookbook")
|
144
|
-
end
|
145
|
-
|
146
|
-
it "ensures that cookbooks are installed" do
|
147
|
-
expect(install_service.policyfile_lock).to receive(:install_cookbooks).and_call_original
|
148
|
-
install_service.run
|
149
|
-
end
|
150
|
-
|
151
|
-
describe "when an error occurs during the install" do
|
152
|
-
|
153
|
-
before do
|
154
|
-
expect(install_service.policyfile_lock).to receive(:install_cookbooks).and_raise("some error")
|
155
|
-
end
|
156
|
-
|
157
|
-
it "raises a PolicyfileInstallError" do
|
158
|
-
expect { install_service.run }.to raise_error(ChefDK::PolicyfileInstallError)
|
159
|
-
end
|
160
|
-
|
161
|
-
|
162
|
-
end
|
163
|
-
|
164
|
-
context "and the Policyfile has updated dependendencies" do
|
165
|
-
|
166
|
-
# For very first iteration, we won't tackle this case if it's hard
|
167
|
-
it "Conservatively updates deps, recomputes lock, and installs"
|
168
|
-
|
169
|
-
end
|
170
|
-
|
171
|
-
end
|
172
|
-
|
173
|
-
context "and an explicit Policyfile name is given" do
|
174
|
-
|
175
|
-
let(:policyfile_rb_explicit_name) { "MyPolicy.rb" }
|
176
|
-
|
177
|
-
let(:policyfile_lock_name) { "MyPolicy.lock.json" }
|
178
|
-
|
179
|
-
it "infers that the Policyfile.rb is located at $CWD/$POLICYFILE_NAME" do
|
180
|
-
expect(install_service.policyfile_expanded_path).to eq(policyfile_rb_path)
|
181
|
-
end
|
182
|
-
|
183
|
-
it "reads the policyfile from disk" do
|
184
|
-
expect(install_service.policyfile_content).to eq(policyfile_content)
|
185
|
-
end
|
186
|
-
|
187
|
-
end
|
188
|
-
end
|
189
|
-
|
190
|
-
end
|
191
|
-
|
1
|
+
#
|
2
|
+
# Copyright:: Copyright (c) 2014 Chef Software Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'spec_helper'
|
19
|
+
require 'chef-dk/policyfile_services/install'
|
20
|
+
|
21
|
+
describe ChefDK::PolicyfileServices::Install do
|
22
|
+
|
23
|
+
include ChefDK::Helpers
|
24
|
+
|
25
|
+
let(:working_dir) do
|
26
|
+
path = File.join(tempdir, "policyfile_services_test_working_dir")
|
27
|
+
Dir.mkdir(path)
|
28
|
+
path
|
29
|
+
end
|
30
|
+
|
31
|
+
let(:policyfile_rb_explicit_name) { nil }
|
32
|
+
|
33
|
+
let(:policyfile_rb_name) { policyfile_rb_explicit_name || "Policyfile.rb" }
|
34
|
+
|
35
|
+
let(:policyfile_lock_name) { "Policyfile.lock.json" }
|
36
|
+
|
37
|
+
let(:policyfile_rb_path) { File.join(working_dir, policyfile_rb_name) }
|
38
|
+
|
39
|
+
let(:policyfile_lock_path) { File.join(working_dir, policyfile_lock_name) }
|
40
|
+
|
41
|
+
let(:local_cookbooks_root) do
|
42
|
+
File.join(fixtures_path, "local_path_cookbooks")
|
43
|
+
end
|
44
|
+
|
45
|
+
let(:policyfile_content) do
|
46
|
+
<<-E
|
47
|
+
name 'install-example'
|
48
|
+
|
49
|
+
run_list 'local-cookbook'
|
50
|
+
|
51
|
+
cookbook 'local-cookbook', path: '#{local_cookbooks_root}/local-cookbook'
|
52
|
+
E
|
53
|
+
end
|
54
|
+
|
55
|
+
let(:overwrite) { false }
|
56
|
+
|
57
|
+
let(:ui) { TestHelpers::TestUI.new }
|
58
|
+
|
59
|
+
let(:install_service) { described_class.new(policyfile: policyfile_rb_name, ui: ui, root_dir: working_dir, overwrite: overwrite) }
|
60
|
+
|
61
|
+
let(:storage_config) do
|
62
|
+
ChefDK::Policyfile::StorageConfig.new( cache_path: nil, relative_paths_root: local_cookbooks_root )
|
63
|
+
end
|
64
|
+
|
65
|
+
def result_policyfile_lock
|
66
|
+
expect(File).to exist(policyfile_lock_path)
|
67
|
+
content = IO.read(policyfile_lock_path)
|
68
|
+
lock_data = FFI_Yajl::Parser.parse(content)
|
69
|
+
ChefDK::PolicyfileLock.new(storage_config).build_from_lock_data(lock_data)
|
70
|
+
end
|
71
|
+
|
72
|
+
context "when no Policyfile is present or specified" do
|
73
|
+
|
74
|
+
it "errors out" do
|
75
|
+
expect { install_service.run }.to raise_error(ChefDK::PolicyfileNotFound, "Policyfile not found at path #{policyfile_rb_path}")
|
76
|
+
end
|
77
|
+
|
78
|
+
end
|
79
|
+
|
80
|
+
context "when a Policyfile exists" do
|
81
|
+
|
82
|
+
before do
|
83
|
+
with_file(policyfile_rb_path) { |f| f.print(policyfile_content) }
|
84
|
+
end
|
85
|
+
|
86
|
+
it "infers that the Policyfile.rb is located at $CWD/Policyfile.rb" do
|
87
|
+
expect(install_service.policyfile_expanded_path).to eq(policyfile_rb_path)
|
88
|
+
end
|
89
|
+
|
90
|
+
it "reads the policyfile from disk" do
|
91
|
+
expect(install_service.policyfile_content).to eq(policyfile_content)
|
92
|
+
end
|
93
|
+
|
94
|
+
context "and the policyfile has an error" do
|
95
|
+
|
96
|
+
let(:policyfile_content) { 'raise "borkbork"' }
|
97
|
+
|
98
|
+
it "errors out and creates no lockfile" do
|
99
|
+
expect { install_service.run }.to raise_error(ChefDK::PolicyfileInstallError)
|
100
|
+
expect(File).to_not exist(policyfile_lock_path)
|
101
|
+
end
|
102
|
+
|
103
|
+
end
|
104
|
+
|
105
|
+
context "and no lockfile exists" do
|
106
|
+
|
107
|
+
it "solves the Policyfile demands, installs cookbooks, emits a lockfile" do
|
108
|
+
install_service.run
|
109
|
+
generated_lock = result_policyfile_lock
|
110
|
+
expect(generated_lock.name).to eq('install-example')
|
111
|
+
expect(generated_lock.cookbook_locks).to have_key("local-cookbook")
|
112
|
+
end
|
113
|
+
|
114
|
+
end
|
115
|
+
|
116
|
+
context "and a lockfile exists and `overwrite` is specified" do
|
117
|
+
|
118
|
+
let(:overwrite) { true }
|
119
|
+
|
120
|
+
before do
|
121
|
+
File.binwrite(policyfile_lock_path, "This is the old lockfile content")
|
122
|
+
end
|
123
|
+
|
124
|
+
it "solves the Policyfile demands, installs cookbooks, emits a lockfile" do
|
125
|
+
install_service.run
|
126
|
+
generated_lock = result_policyfile_lock
|
127
|
+
expect(generated_lock.name).to eq('install-example')
|
128
|
+
expect(generated_lock.cookbook_locks).to have_key("local-cookbook")
|
129
|
+
end
|
130
|
+
|
131
|
+
end
|
132
|
+
|
133
|
+
context "and a lockfile exists" do
|
134
|
+
|
135
|
+
before do
|
136
|
+
install_service.dup.run
|
137
|
+
end
|
138
|
+
|
139
|
+
it "reads the policyfile lock from disk" do
|
140
|
+
lock = install_service.policyfile_lock
|
141
|
+
expect(lock).to be_an_instance_of(ChefDK::PolicyfileLock)
|
142
|
+
expect(lock.name).to eq('install-example')
|
143
|
+
expect(lock.cookbook_locks).to have_key("local-cookbook")
|
144
|
+
end
|
145
|
+
|
146
|
+
it "ensures that cookbooks are installed" do
|
147
|
+
expect(install_service.policyfile_lock).to receive(:install_cookbooks).and_call_original
|
148
|
+
install_service.run
|
149
|
+
end
|
150
|
+
|
151
|
+
describe "when an error occurs during the install" do
|
152
|
+
|
153
|
+
before do
|
154
|
+
expect(install_service.policyfile_lock).to receive(:install_cookbooks).and_raise("some error")
|
155
|
+
end
|
156
|
+
|
157
|
+
it "raises a PolicyfileInstallError" do
|
158
|
+
expect { install_service.run }.to raise_error(ChefDK::PolicyfileInstallError)
|
159
|
+
end
|
160
|
+
|
161
|
+
|
162
|
+
end
|
163
|
+
|
164
|
+
context "and the Policyfile has updated dependendencies" do
|
165
|
+
|
166
|
+
# For very first iteration, we won't tackle this case if it's hard
|
167
|
+
it "Conservatively updates deps, recomputes lock, and installs"
|
168
|
+
|
169
|
+
end
|
170
|
+
|
171
|
+
end
|
172
|
+
|
173
|
+
context "and an explicit Policyfile name is given" do
|
174
|
+
|
175
|
+
let(:policyfile_rb_explicit_name) { "MyPolicy.rb" }
|
176
|
+
|
177
|
+
let(:policyfile_lock_name) { "MyPolicy.lock.json" }
|
178
|
+
|
179
|
+
it "infers that the Policyfile.rb is located at $CWD/$POLICYFILE_NAME" do
|
180
|
+
expect(install_service.policyfile_expanded_path).to eq(policyfile_rb_path)
|
181
|
+
end
|
182
|
+
|
183
|
+
it "reads the policyfile from disk" do
|
184
|
+
expect(install_service.policyfile_content).to eq(policyfile_content)
|
185
|
+
end
|
186
|
+
|
187
|
+
end
|
188
|
+
end
|
189
|
+
|
190
|
+
end
|
191
|
+
|
@@ -1,345 +1,345 @@
|
|
1
|
-
#
|
2
|
-
# Copyright:: Copyright (c) 2015 Chef Software Inc.
|
3
|
-
# License:: Apache License, Version 2.0
|
4
|
-
#
|
5
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
-
# you may not use this file except in compliance with the License.
|
7
|
-
# You may obtain a copy of the License at
|
8
|
-
#
|
9
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
-
#
|
11
|
-
# Unless required by applicable law or agreed to in writing, software
|
12
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
-
# See the License for the specific language governing permissions and
|
15
|
-
# limitations under the License.
|
16
|
-
#
|
17
|
-
|
18
|
-
require 'spec_helper'
|
19
|
-
require 'chef-dk/policyfile_services/push_archive'
|
20
|
-
|
21
|
-
describe ChefDK::PolicyfileServices::PushArchive do
|
22
|
-
|
23
|
-
FileToTar = Struct.new(:name, :content)
|
24
|
-
|
25
|
-
def create_archive
|
26
|
-
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
27
|
-
Archive::Tar::Minitar::Writer.open(gz_file) do |tar|
|
28
|
-
|
29
|
-
|
30
|
-
archive_dirs.each do |dir|
|
31
|
-
tar.mkdir(dir, mode: 0755)
|
32
|
-
end
|
33
|
-
|
34
|
-
archive_files.each do |file|
|
35
|
-
name = file.name
|
36
|
-
content = file.content
|
37
|
-
size = content.bytesize
|
38
|
-
tar.add_file_simple(name, mode: 0644, size: size) { |f| f.write(content) }
|
39
|
-
end
|
40
|
-
|
41
|
-
end
|
42
|
-
end
|
43
|
-
end
|
44
|
-
|
45
|
-
let(:valid_lockfile) do
|
46
|
-
<<-E
|
47
|
-
{
|
48
|
-
"name": "install-example",
|
49
|
-
"run_list": [
|
50
|
-
"recipe[local-cookbook::default]"
|
51
|
-
],
|
52
|
-
"cookbook_locks": {
|
53
|
-
"local-cookbook": {
|
54
|
-
"version": "2.3.4",
|
55
|
-
"identifier": "fab501cfaf747901bd82c1bc706beae7dc3a350c",
|
56
|
-
"dotted_decimal_identifier": "70567763561641081.489844270461035.258281553147148",
|
57
|
-
"source": "project-cookbooks/local-cookbook",
|
58
|
-
"cache_key": null,
|
59
|
-
"scm_info": null,
|
60
|
-
"source_options": {
|
61
|
-
"path": "project-cookbooks/local-cookbook"
|
62
|
-
}
|
63
|
-
}
|
64
|
-
},
|
65
|
-
"default_attributes": {},
|
66
|
-
"override_attributes": {},
|
67
|
-
"solution_dependencies": {
|
68
|
-
"Policyfile": [
|
69
|
-
[
|
70
|
-
"local-cookbook",
|
71
|
-
">= 0.0.0"
|
72
|
-
]
|
73
|
-
],
|
74
|
-
"dependencies": {
|
75
|
-
"local-cookbook (2.3.4)": [
|
76
|
-
|
77
|
-
]
|
78
|
-
}
|
79
|
-
}
|
80
|
-
}
|
81
|
-
E
|
82
|
-
end
|
83
|
-
|
84
|
-
let(:archive_files) { [] }
|
85
|
-
|
86
|
-
let(:archive_dirs) { [] }
|
87
|
-
|
88
|
-
let(:working_dir) do
|
89
|
-
path = File.join(tempdir, "policyfile_services_test_working_dir")
|
90
|
-
Dir.mkdir(path)
|
91
|
-
path
|
92
|
-
end
|
93
|
-
|
94
|
-
let(:archive_file_name) { "example-policy-abc123.tgz" }
|
95
|
-
|
96
|
-
let(:archive_file_path) { File.join(working_dir, archive_file_name) }
|
97
|
-
|
98
|
-
let(:policy_group) { "dev-cluster-1" }
|
99
|
-
|
100
|
-
let(:config) do
|
101
|
-
double("Chef::Config",
|
102
|
-
chef_server_url: "https://localhost:10443",
|
103
|
-
client_key: "/path/to/client/key.pem",
|
104
|
-
node_name: "deuce",
|
105
|
-
policy_document_native_api: true)
|
106
|
-
end
|
107
|
-
|
108
|
-
let(:ui) { TestHelpers::TestUI.new }
|
109
|
-
|
110
|
-
subject(:push_archive_service) do
|
111
|
-
described_class.new(archive_file: archive_file_name,
|
112
|
-
policy_group: policy_group,
|
113
|
-
root_dir: working_dir,
|
114
|
-
ui: ui,
|
115
|
-
config: config)
|
116
|
-
end
|
117
|
-
|
118
|
-
it "has an archive file" do
|
119
|
-
expect(push_archive_service.archive_file).to eq(archive_file_name)
|
120
|
-
expect(push_archive_service.archive_file_path).to eq(archive_file_path)
|
121
|
-
end
|
122
|
-
|
123
|
-
it "configures an HTTP client" do
|
124
|
-
expect(ChefDK::AuthenticatedHTTP).to receive(:new).with("https://localhost:10443",
|
125
|
-
signing_key_filename: "/path/to/client/key.pem",
|
126
|
-
client_name: "deuce")
|
127
|
-
push_archive_service.http_client
|
128
|
-
end
|
129
|
-
|
130
|
-
context "with an invalid archive" do
|
131
|
-
|
132
|
-
let(:exception) do
|
133
|
-
begin
|
134
|
-
push_archive_service.run
|
135
|
-
rescue ChefDK::PolicyfilePushArchiveError => e
|
136
|
-
e
|
137
|
-
else
|
138
|
-
nil
|
139
|
-
end
|
140
|
-
end
|
141
|
-
|
142
|
-
let(:exception_cause) { exception.cause }
|
143
|
-
|
144
|
-
context "when the archive is malformed/corrupted/etc" do
|
145
|
-
|
146
|
-
context "when the archive file doesn't exist" do
|
147
|
-
|
148
|
-
it "errors out" do
|
149
|
-
expect(exception).to_not be_nil
|
150
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
151
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
152
|
-
expect(exception_cause.message).to eq("Archive file #{archive_file_path} not found")
|
153
|
-
end
|
154
|
-
end
|
155
|
-
|
156
|
-
context "when the archive is not a gzip file" do
|
157
|
-
|
158
|
-
before do
|
159
|
-
FileUtils.touch(archive_file_path)
|
160
|
-
end
|
161
|
-
|
162
|
-
it "errors out" do
|
163
|
-
expect(exception).to_not be_nil
|
164
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
165
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
166
|
-
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. not in gzip format")
|
167
|
-
end
|
168
|
-
|
169
|
-
end
|
170
|
-
|
171
|
-
context "when the archive is a gzip file of a garbage file" do
|
172
|
-
|
173
|
-
before do
|
174
|
-
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
175
|
-
gz_file << "lol this isn't a tar file"
|
176
|
-
end
|
177
|
-
end
|
178
|
-
|
179
|
-
it "errors out" do
|
180
|
-
expect(exception).to_not be_nil
|
181
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
182
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
183
|
-
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
184
|
-
end
|
185
|
-
end
|
186
|
-
|
187
|
-
|
188
|
-
context "when the archive is a gzip file of a very malformed tar archive" do
|
189
|
-
|
190
|
-
before do
|
191
|
-
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
192
|
-
gz_file << "\0\0\0\0\0"
|
193
|
-
end
|
194
|
-
end
|
195
|
-
|
196
|
-
it "errors out" do
|
197
|
-
expect(exception).to_not be_nil
|
198
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
199
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
200
|
-
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
201
|
-
end
|
202
|
-
end
|
203
|
-
end
|
204
|
-
|
205
|
-
context "when the archive is well-formed but has invalid content" do
|
206
|
-
|
207
|
-
before do
|
208
|
-
create_archive
|
209
|
-
end
|
210
|
-
|
211
|
-
context "when the archive is missing Policyfile.lock.json" do
|
212
|
-
|
213
|
-
let(:archive_files) { [ FileToTar.new("empty.txt", "") ] }
|
214
|
-
|
215
|
-
it "errors out" do
|
216
|
-
expect(exception).to_not be_nil
|
217
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
218
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
219
|
-
expect(exception_cause.message).to eq("Archive does not contain a Policyfile.lock.json")
|
220
|
-
end
|
221
|
-
|
222
|
-
end
|
223
|
-
|
224
|
-
context "when the archive has no cookbooks/ directory" do
|
225
|
-
|
226
|
-
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", "") ] }
|
227
|
-
|
228
|
-
it "errors out" do
|
229
|
-
expect(exception).to_not be_nil
|
230
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
231
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
232
|
-
expect(exception_cause.message).to eq("Archive does not contain a cookbooks directory")
|
233
|
-
end
|
234
|
-
|
235
|
-
end
|
236
|
-
|
237
|
-
context "when the archive has the correct files but the lockfile is invalid" do
|
238
|
-
|
239
|
-
let(:archive_dirs) { ["cookbooks"] }
|
240
|
-
|
241
|
-
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", lockfile_content) ] }
|
242
|
-
|
243
|
-
context "when the lockfile has invalid JSON" do
|
244
|
-
|
245
|
-
let(:lockfile_content) { ":::" }
|
246
|
-
|
247
|
-
it "errors out" do
|
248
|
-
expect(exception).to_not be_nil
|
249
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
250
|
-
expect(exception_cause).to be_a(FFI_Yajl::ParseError)
|
251
|
-
end
|
252
|
-
|
253
|
-
end
|
254
|
-
|
255
|
-
context "when the lockfile is semantically invalid" do
|
256
|
-
|
257
|
-
let(:lockfile_content) { '{ }' }
|
258
|
-
|
259
|
-
it "errors out" do
|
260
|
-
expect(exception).to_not be_nil
|
261
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
262
|
-
expect(exception_cause).to be_a(ChefDK::InvalidLockfile)
|
263
|
-
end
|
264
|
-
|
265
|
-
end
|
266
|
-
|
267
|
-
|
268
|
-
context "when the archive does not have all the necessary cookbooks" do
|
269
|
-
|
270
|
-
let(:lockfile_content) { valid_lockfile }
|
271
|
-
|
272
|
-
it "errors out" do
|
273
|
-
expect(exception).to_not be_nil
|
274
|
-
expect(exception.message).to eq("Failed to publish archived policy")
|
275
|
-
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
276
|
-
|
277
|
-
msg = "Archive does not have all cookbooks required by the Policyfile.lock. Missing cookbooks: 'local-cookbook'."
|
278
|
-
expect(exception_cause.message).to eq(msg)
|
279
|
-
end
|
280
|
-
|
281
|
-
end
|
282
|
-
end
|
283
|
-
end
|
284
|
-
|
285
|
-
end
|
286
|
-
|
287
|
-
context "with a valid archive" do
|
288
|
-
|
289
|
-
let(:lockfile_content) { valid_lockfile }
|
290
|
-
|
291
|
-
let(:cookbook_name) { "local-cookbook" }
|
292
|
-
|
293
|
-
let(:dotted_decimal_identifier) { "70567763561641081.489844270461035.258281553147148" }
|
294
|
-
|
295
|
-
let(:cookbook_dir) { File.join("cookbooks", "#{cookbook_name}-#{dotted_decimal_identifier}") }
|
296
|
-
|
297
|
-
let(:recipes_dir) { File.join(cookbook_dir, "recipes") }
|
298
|
-
|
299
|
-
let(:archive_dirs) { ["cookbooks", cookbook_dir, recipes_dir] }
|
300
|
-
|
301
|
-
let(:archive_files) do
|
302
|
-
[
|
303
|
-
FileToTar.new("Policyfile.lock.json", lockfile_content),
|
304
|
-
FileToTar.new(File.join(cookbook_dir, "metadata.rb"), "name 'local-cookbook'"),
|
305
|
-
FileToTar.new(File.join(recipes_dir, "default.rb"), "puts 'hello'")
|
306
|
-
]
|
307
|
-
end
|
308
|
-
|
309
|
-
let(:http_client) { instance_double(ChefDK::AuthenticatedHTTP) }
|
310
|
-
|
311
|
-
let(:uploader) { instance_double(ChefDK::Policyfile::Uploader) }
|
312
|
-
|
313
|
-
before do
|
314
|
-
expect(push_archive_service).to receive(:http_client).and_return(http_client)
|
315
|
-
|
316
|
-
expect(ChefDK::Policyfile::Uploader).to receive(:new).
|
317
|
-
# TODO: need more verification that the policyfile.lock is right (?)
|
318
|
-
with(an_instance_of(ChefDK::PolicyfileLock), policy_group, http_client: http_client, ui: ui, policy_document_native_api: true).
|
319
|
-
and_return(uploader)
|
320
|
-
|
321
|
-
create_archive
|
322
|
-
end
|
323
|
-
|
324
|
-
describe "when the upload is successful" do
|
325
|
-
|
326
|
-
it "uploads the cookbooks and lockfile" do
|
327
|
-
expect(uploader).to receive(:upload)
|
328
|
-
push_archive_service.run
|
329
|
-
end
|
330
|
-
|
331
|
-
end
|
332
|
-
|
333
|
-
describe "when the upload fails" do
|
334
|
-
|
335
|
-
it "raises a nested error" do
|
336
|
-
expect(uploader).to receive(:upload).and_raise("an error")
|
337
|
-
expect { push_archive_service.run }.to raise_error(ChefDK::PolicyfilePushArchiveError)
|
338
|
-
end
|
339
|
-
|
340
|
-
end
|
341
|
-
|
342
|
-
end
|
343
|
-
|
344
|
-
end
|
345
|
-
|
1
|
+
#
|
2
|
+
# Copyright:: Copyright (c) 2015 Chef Software Inc.
|
3
|
+
# License:: Apache License, Version 2.0
|
4
|
+
#
|
5
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
6
|
+
# you may not use this file except in compliance with the License.
|
7
|
+
# You may obtain a copy of the License at
|
8
|
+
#
|
9
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
10
|
+
#
|
11
|
+
# Unless required by applicable law or agreed to in writing, software
|
12
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
13
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
14
|
+
# See the License for the specific language governing permissions and
|
15
|
+
# limitations under the License.
|
16
|
+
#
|
17
|
+
|
18
|
+
require 'spec_helper'
|
19
|
+
require 'chef-dk/policyfile_services/push_archive'
|
20
|
+
|
21
|
+
describe ChefDK::PolicyfileServices::PushArchive do
|
22
|
+
|
23
|
+
FileToTar = Struct.new(:name, :content)
|
24
|
+
|
25
|
+
def create_archive
|
26
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
27
|
+
Archive::Tar::Minitar::Writer.open(gz_file) do |tar|
|
28
|
+
|
29
|
+
|
30
|
+
archive_dirs.each do |dir|
|
31
|
+
tar.mkdir(dir, mode: 0755)
|
32
|
+
end
|
33
|
+
|
34
|
+
archive_files.each do |file|
|
35
|
+
name = file.name
|
36
|
+
content = file.content
|
37
|
+
size = content.bytesize
|
38
|
+
tar.add_file_simple(name, mode: 0644, size: size) { |f| f.write(content) }
|
39
|
+
end
|
40
|
+
|
41
|
+
end
|
42
|
+
end
|
43
|
+
end
|
44
|
+
|
45
|
+
let(:valid_lockfile) do
|
46
|
+
<<-E
|
47
|
+
{
|
48
|
+
"name": "install-example",
|
49
|
+
"run_list": [
|
50
|
+
"recipe[local-cookbook::default]"
|
51
|
+
],
|
52
|
+
"cookbook_locks": {
|
53
|
+
"local-cookbook": {
|
54
|
+
"version": "2.3.4",
|
55
|
+
"identifier": "fab501cfaf747901bd82c1bc706beae7dc3a350c",
|
56
|
+
"dotted_decimal_identifier": "70567763561641081.489844270461035.258281553147148",
|
57
|
+
"source": "project-cookbooks/local-cookbook",
|
58
|
+
"cache_key": null,
|
59
|
+
"scm_info": null,
|
60
|
+
"source_options": {
|
61
|
+
"path": "project-cookbooks/local-cookbook"
|
62
|
+
}
|
63
|
+
}
|
64
|
+
},
|
65
|
+
"default_attributes": {},
|
66
|
+
"override_attributes": {},
|
67
|
+
"solution_dependencies": {
|
68
|
+
"Policyfile": [
|
69
|
+
[
|
70
|
+
"local-cookbook",
|
71
|
+
">= 0.0.0"
|
72
|
+
]
|
73
|
+
],
|
74
|
+
"dependencies": {
|
75
|
+
"local-cookbook (2.3.4)": [
|
76
|
+
|
77
|
+
]
|
78
|
+
}
|
79
|
+
}
|
80
|
+
}
|
81
|
+
E
|
82
|
+
end
|
83
|
+
|
84
|
+
let(:archive_files) { [] }
|
85
|
+
|
86
|
+
let(:archive_dirs) { [] }
|
87
|
+
|
88
|
+
let(:working_dir) do
|
89
|
+
path = File.join(tempdir, "policyfile_services_test_working_dir")
|
90
|
+
Dir.mkdir(path)
|
91
|
+
path
|
92
|
+
end
|
93
|
+
|
94
|
+
let(:archive_file_name) { "example-policy-abc123.tgz" }
|
95
|
+
|
96
|
+
let(:archive_file_path) { File.join(working_dir, archive_file_name) }
|
97
|
+
|
98
|
+
let(:policy_group) { "dev-cluster-1" }
|
99
|
+
|
100
|
+
let(:config) do
|
101
|
+
double("Chef::Config",
|
102
|
+
chef_server_url: "https://localhost:10443",
|
103
|
+
client_key: "/path/to/client/key.pem",
|
104
|
+
node_name: "deuce",
|
105
|
+
policy_document_native_api: true)
|
106
|
+
end
|
107
|
+
|
108
|
+
let(:ui) { TestHelpers::TestUI.new }
|
109
|
+
|
110
|
+
subject(:push_archive_service) do
|
111
|
+
described_class.new(archive_file: archive_file_name,
|
112
|
+
policy_group: policy_group,
|
113
|
+
root_dir: working_dir,
|
114
|
+
ui: ui,
|
115
|
+
config: config)
|
116
|
+
end
|
117
|
+
|
118
|
+
it "has an archive file" do
|
119
|
+
expect(push_archive_service.archive_file).to eq(archive_file_name)
|
120
|
+
expect(push_archive_service.archive_file_path).to eq(archive_file_path)
|
121
|
+
end
|
122
|
+
|
123
|
+
it "configures an HTTP client" do
|
124
|
+
expect(ChefDK::AuthenticatedHTTP).to receive(:new).with("https://localhost:10443",
|
125
|
+
signing_key_filename: "/path/to/client/key.pem",
|
126
|
+
client_name: "deuce")
|
127
|
+
push_archive_service.http_client
|
128
|
+
end
|
129
|
+
|
130
|
+
context "with an invalid archive" do
|
131
|
+
|
132
|
+
let(:exception) do
|
133
|
+
begin
|
134
|
+
push_archive_service.run
|
135
|
+
rescue ChefDK::PolicyfilePushArchiveError => e
|
136
|
+
e
|
137
|
+
else
|
138
|
+
nil
|
139
|
+
end
|
140
|
+
end
|
141
|
+
|
142
|
+
let(:exception_cause) { exception.cause }
|
143
|
+
|
144
|
+
context "when the archive is malformed/corrupted/etc" do
|
145
|
+
|
146
|
+
context "when the archive file doesn't exist" do
|
147
|
+
|
148
|
+
it "errors out" do
|
149
|
+
expect(exception).to_not be_nil
|
150
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
151
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
152
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} not found")
|
153
|
+
end
|
154
|
+
end
|
155
|
+
|
156
|
+
context "when the archive is not a gzip file" do
|
157
|
+
|
158
|
+
before do
|
159
|
+
FileUtils.touch(archive_file_path)
|
160
|
+
end
|
161
|
+
|
162
|
+
it "errors out" do
|
163
|
+
expect(exception).to_not be_nil
|
164
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
165
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
166
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. not in gzip format")
|
167
|
+
end
|
168
|
+
|
169
|
+
end
|
170
|
+
|
171
|
+
context "when the archive is a gzip file of a garbage file" do
|
172
|
+
|
173
|
+
before do
|
174
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
175
|
+
gz_file << "lol this isn't a tar file"
|
176
|
+
end
|
177
|
+
end
|
178
|
+
|
179
|
+
it "errors out" do
|
180
|
+
expect(exception).to_not be_nil
|
181
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
182
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
183
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
184
|
+
end
|
185
|
+
end
|
186
|
+
|
187
|
+
|
188
|
+
context "when the archive is a gzip file of a very malformed tar archive" do
|
189
|
+
|
190
|
+
before do
|
191
|
+
Zlib::GzipWriter.open(archive_file_path) do |gz_file|
|
192
|
+
gz_file << "\0\0\0\0\0"
|
193
|
+
end
|
194
|
+
end
|
195
|
+
|
196
|
+
it "errors out" do
|
197
|
+
expect(exception).to_not be_nil
|
198
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
199
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
200
|
+
expect(exception_cause.message).to eq("Archive file #{archive_file_path} could not be unpacked. Tar archive looks corrupt.")
|
201
|
+
end
|
202
|
+
end
|
203
|
+
end
|
204
|
+
|
205
|
+
context "when the archive is well-formed but has invalid content" do
|
206
|
+
|
207
|
+
before do
|
208
|
+
create_archive
|
209
|
+
end
|
210
|
+
|
211
|
+
context "when the archive is missing Policyfile.lock.json" do
|
212
|
+
|
213
|
+
let(:archive_files) { [ FileToTar.new("empty.txt", "") ] }
|
214
|
+
|
215
|
+
it "errors out" do
|
216
|
+
expect(exception).to_not be_nil
|
217
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
218
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
219
|
+
expect(exception_cause.message).to eq("Archive does not contain a Policyfile.lock.json")
|
220
|
+
end
|
221
|
+
|
222
|
+
end
|
223
|
+
|
224
|
+
context "when the archive has no cookbooks/ directory" do
|
225
|
+
|
226
|
+
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", "") ] }
|
227
|
+
|
228
|
+
it "errors out" do
|
229
|
+
expect(exception).to_not be_nil
|
230
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
231
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
232
|
+
expect(exception_cause.message).to eq("Archive does not contain a cookbooks directory")
|
233
|
+
end
|
234
|
+
|
235
|
+
end
|
236
|
+
|
237
|
+
context "when the archive has the correct files but the lockfile is invalid" do
|
238
|
+
|
239
|
+
let(:archive_dirs) { ["cookbooks"] }
|
240
|
+
|
241
|
+
let(:archive_files) { [ FileToTar.new("Policyfile.lock.json", lockfile_content) ] }
|
242
|
+
|
243
|
+
context "when the lockfile has invalid JSON" do
|
244
|
+
|
245
|
+
let(:lockfile_content) { ":::" }
|
246
|
+
|
247
|
+
it "errors out" do
|
248
|
+
expect(exception).to_not be_nil
|
249
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
250
|
+
expect(exception_cause).to be_a(FFI_Yajl::ParseError)
|
251
|
+
end
|
252
|
+
|
253
|
+
end
|
254
|
+
|
255
|
+
context "when the lockfile is semantically invalid" do
|
256
|
+
|
257
|
+
let(:lockfile_content) { '{ }' }
|
258
|
+
|
259
|
+
it "errors out" do
|
260
|
+
expect(exception).to_not be_nil
|
261
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
262
|
+
expect(exception_cause).to be_a(ChefDK::InvalidLockfile)
|
263
|
+
end
|
264
|
+
|
265
|
+
end
|
266
|
+
|
267
|
+
|
268
|
+
context "when the archive does not have all the necessary cookbooks" do
|
269
|
+
|
270
|
+
let(:lockfile_content) { valid_lockfile }
|
271
|
+
|
272
|
+
it "errors out" do
|
273
|
+
expect(exception).to_not be_nil
|
274
|
+
expect(exception.message).to eq("Failed to publish archived policy")
|
275
|
+
expect(exception_cause).to be_a(ChefDK::InvalidPolicyArchive)
|
276
|
+
|
277
|
+
msg = "Archive does not have all cookbooks required by the Policyfile.lock. Missing cookbooks: 'local-cookbook'."
|
278
|
+
expect(exception_cause.message).to eq(msg)
|
279
|
+
end
|
280
|
+
|
281
|
+
end
|
282
|
+
end
|
283
|
+
end
|
284
|
+
|
285
|
+
end
|
286
|
+
|
287
|
+
context "with a valid archive" do
|
288
|
+
|
289
|
+
let(:lockfile_content) { valid_lockfile }
|
290
|
+
|
291
|
+
let(:cookbook_name) { "local-cookbook" }
|
292
|
+
|
293
|
+
let(:dotted_decimal_identifier) { "70567763561641081.489844270461035.258281553147148" }
|
294
|
+
|
295
|
+
let(:cookbook_dir) { File.join("cookbooks", "#{cookbook_name}-#{dotted_decimal_identifier}") }
|
296
|
+
|
297
|
+
let(:recipes_dir) { File.join(cookbook_dir, "recipes") }
|
298
|
+
|
299
|
+
let(:archive_dirs) { ["cookbooks", cookbook_dir, recipes_dir] }
|
300
|
+
|
301
|
+
let(:archive_files) do
|
302
|
+
[
|
303
|
+
FileToTar.new("Policyfile.lock.json", lockfile_content),
|
304
|
+
FileToTar.new(File.join(cookbook_dir, "metadata.rb"), "name 'local-cookbook'"),
|
305
|
+
FileToTar.new(File.join(recipes_dir, "default.rb"), "puts 'hello'")
|
306
|
+
]
|
307
|
+
end
|
308
|
+
|
309
|
+
let(:http_client) { instance_double(ChefDK::AuthenticatedHTTP) }
|
310
|
+
|
311
|
+
let(:uploader) { instance_double(ChefDK::Policyfile::Uploader) }
|
312
|
+
|
313
|
+
before do
|
314
|
+
expect(push_archive_service).to receive(:http_client).and_return(http_client)
|
315
|
+
|
316
|
+
expect(ChefDK::Policyfile::Uploader).to receive(:new).
|
317
|
+
# TODO: need more verification that the policyfile.lock is right (?)
|
318
|
+
with(an_instance_of(ChefDK::PolicyfileLock), policy_group, http_client: http_client, ui: ui, policy_document_native_api: true).
|
319
|
+
and_return(uploader)
|
320
|
+
|
321
|
+
create_archive
|
322
|
+
end
|
323
|
+
|
324
|
+
describe "when the upload is successful" do
|
325
|
+
|
326
|
+
it "uploads the cookbooks and lockfile" do
|
327
|
+
expect(uploader).to receive(:upload)
|
328
|
+
push_archive_service.run
|
329
|
+
end
|
330
|
+
|
331
|
+
end
|
332
|
+
|
333
|
+
describe "when the upload fails" do
|
334
|
+
|
335
|
+
it "raises a nested error" do
|
336
|
+
expect(uploader).to receive(:upload).and_raise("an error")
|
337
|
+
expect { push_archive_service.run }.to raise_error(ChefDK::PolicyfilePushArchiveError)
|
338
|
+
end
|
339
|
+
|
340
|
+
end
|
341
|
+
|
342
|
+
end
|
343
|
+
|
344
|
+
end
|
345
|
+
|