chef-dk 2.3.4 → 2.4.17

Sign up to get free protection for your applications and to get access to all the features.
Files changed (45) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +22 -18
  3. data/Gemfile.lock +184 -254
  4. data/README.md +1 -1
  5. data/Rakefile +1 -1
  6. data/acceptance/Gemfile.lock +27 -32
  7. data/lib/chef-dk/chef_server_api_multi.rb +73 -0
  8. data/lib/chef-dk/command/update.rb +5 -12
  9. data/lib/chef-dk/configurable.rb +19 -0
  10. data/lib/chef-dk/cookbook_omnifetch.rb +1 -0
  11. data/lib/chef-dk/exceptions.rb +11 -0
  12. data/lib/chef-dk/generator.rb +1 -1
  13. data/lib/chef-dk/policyfile/attribute_merge_checker.rb +110 -0
  14. data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +5 -4
  15. data/lib/chef-dk/policyfile/chef_server_lock_fetcher.rb +164 -0
  16. data/lib/chef-dk/policyfile/cookbook_location_specification.rb +3 -3
  17. data/lib/chef-dk/policyfile/dsl.rb +16 -0
  18. data/lib/chef-dk/policyfile/included_policies_cookbook_source.rb +156 -0
  19. data/lib/chef-dk/policyfile/local_lock_fetcher.rb +122 -0
  20. data/lib/chef-dk/policyfile/lock_applier.rb +80 -0
  21. data/lib/chef-dk/policyfile/null_cookbook_source.rb +4 -0
  22. data/lib/chef-dk/policyfile/policyfile_location_specification.rb +122 -0
  23. data/lib/chef-dk/policyfile_compiler.rb +129 -16
  24. data/lib/chef-dk/policyfile_lock.rb +30 -0
  25. data/lib/chef-dk/policyfile_services/install.rb +7 -1
  26. data/lib/chef-dk/policyfile_services/update_attributes.rb +10 -2
  27. data/lib/chef-dk/skeletons/code_generator/templates/default/recipe_spec.rb.erb +14 -1
  28. data/lib/chef-dk/version.rb +1 -1
  29. data/omnibus_overrides.rb +6 -6
  30. data/spec/unit/chef_server_api_multi_spec.rb +120 -0
  31. data/spec/unit/command/update_spec.rb +3 -3
  32. data/spec/unit/configurable_spec.rb +27 -0
  33. data/spec/unit/policyfile/attribute_merge_checker_spec.rb +80 -0
  34. data/spec/unit/policyfile/chef_server_lock_fetcher_spec.rb +161 -0
  35. data/spec/unit/policyfile/cookbook_location_specification_spec.rb +48 -0
  36. data/spec/unit/policyfile/included_policies_cookbook_source_spec.rb +242 -0
  37. data/spec/unit/policyfile/local_lock_fetcher_spec.rb +161 -0
  38. data/spec/unit/policyfile/lock_applier_spec.rb +100 -0
  39. data/spec/unit/policyfile_demands_spec.rb +1 -1
  40. data/spec/unit/policyfile_includes_dsl_spec.rb +159 -0
  41. data/spec/unit/policyfile_includes_spec.rb +720 -0
  42. data/spec/unit/policyfile_install_with_includes_spec.rb +232 -0
  43. data/spec/unit/policyfile_lock_build_spec.rb +11 -2
  44. data/spec/unit/policyfile_services/update_attributes_spec.rb +13 -0
  45. metadata +28 -3
@@ -0,0 +1,100 @@
1
+ #
2
+ # Copyright:: Copyright (c) 2017 Chef Software Inc.
3
+ # License:: Apache License, Version 2.0
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+
18
+ require "spec_helper"
19
+ require "chef-dk/policyfile/lock_applier"
20
+ require "chef-dk/policyfile_compiler"
21
+ require "chef-dk/policyfile_lock"
22
+
23
+ describe ChefDK::Policyfile::LockApplier do
24
+ let(:lock) { instance_double("ChefDK::Policyfile::PolicyfileLock") }
25
+ let(:compiler) { instance_double("ChefDK::Policyfile::PolicyfileCompiler") }
26
+ let(:lock_applier) { ChefDK::Policyfile::LockApplier.new(lock, compiler) }
27
+
28
+ let(:included_policy_1) do
29
+ instance_double("ChefDK::Policyfile::PolicyfileLocationSpec",
30
+ name: "policy1")
31
+ end
32
+
33
+ let(:included_policy_2) do
34
+ instance_double("ChefDK::Policyfile::PolicyfileLocationSpec",
35
+ name: "policy2")
36
+ end
37
+
38
+ let(:included_policy_lock_1) do
39
+ {
40
+ "name" => "policy1",
41
+ "source_options" => {
42
+ "some_name" => "policy1_name",
43
+ },
44
+ }
45
+ end
46
+
47
+ let(:included_policy_lock_2) do
48
+ {
49
+ "name" => "policy2",
50
+ "source_options" => {
51
+ "some_name" => "policy2_name",
52
+ },
53
+ }
54
+ end
55
+
56
+ let(:lock_location_specs) { [] }
57
+ let(:included_policy_locks) { [] }
58
+
59
+ before do
60
+ allow(compiler).to receive(:included_policies).and_return(lock_location_specs)
61
+ allow(lock).to receive(:included_policy_locks).and_return(included_policy_locks)
62
+ end
63
+
64
+ context "when no included policies are unlocked" do
65
+ let(:lock_location_specs) { [included_policy_1, included_policy_2] }
66
+ let(:included_policy_locks) { [included_policy_lock_1, included_policy_lock_2] }
67
+
68
+ it "provides the locked source options for all policies" do
69
+ expect(included_policy_1).to receive(:apply_locked_source_options).with(included_policy_lock_1["source_options"])
70
+ expect(included_policy_2).to receive(:apply_locked_source_options).with(included_policy_lock_2["source_options"])
71
+ lock_applier.apply!
72
+ end
73
+ end
74
+
75
+ context "when a included policy is unlocked" do
76
+ let(:lock_location_specs) { [included_policy_1, included_policy_2] }
77
+ let(:included_policy_locks) { [included_policy_lock_1, included_policy_lock_2] }
78
+
79
+ it "does not provide the locked source options for that policy" do
80
+ expect(included_policy_1).not_to receive(:apply_locked_source_options)
81
+ expect(included_policy_2).to receive(:apply_locked_source_options).with(included_policy_lock_2["source_options"])
82
+ lock_applier.
83
+ with_unlocked_policies(["policy1"]).
84
+ apply!
85
+ end
86
+ end
87
+
88
+ context "when all included policies are unlocked" do
89
+ let(:lock_location_specs) { [included_policy_1, included_policy_2] }
90
+ let(:included_policy_locks) { [included_policy_lock_1, included_policy_lock_2] }
91
+
92
+ it "does not provide locked source options for any policies" do
93
+ expect(included_policy_1).not_to receive(:apply_locked_source_options)
94
+ expect(included_policy_2).not_to receive(:apply_locked_source_options).with(included_policy_lock_2["source_options"])
95
+ lock_applier.
96
+ with_unlocked_policies(:all).
97
+ apply!
98
+ end
99
+ end
100
+ end
@@ -215,7 +215,7 @@ describe ChefDK::PolicyfileCompiler, "when expressing the Policyfile graph deman
215
215
  end
216
216
 
217
217
  before do
218
- policyfile.default_source.replace([ default_source_obj ])
218
+ allow(policyfile).to receive(:default_source).and_return([default_source_obj])
219
219
 
220
220
  allow(default_source_obj).to receive(:universe_graph).
221
221
  and_return(trimmed_cookbook_universe)
@@ -0,0 +1,159 @@
1
+ #
2
+ # Copyright:: Copyright (c) 2017 Chef Software Inc.
3
+ # License:: Apache License, Version 2.0
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+
18
+ require "spec_helper"
19
+ require "chef-dk/policyfile_compiler"
20
+ require "chef-dk/exceptions"
21
+
22
+ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
23
+
24
+ let(:run_list) { ["local::default"] }
25
+ let(:included_policies) { [] }
26
+
27
+ let(:policyfile) do
28
+ policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
29
+
30
+ p.run_list(*run_list)
31
+ included_policies.each do |policy|
32
+ p.include_policy(policy[0], policy[1])
33
+ end
34
+ end
35
+
36
+ policyfile
37
+ end
38
+
39
+ describe "when include_policy specifies a policy on disk" do
40
+ describe "and the included policy is correctly configured" do
41
+ let(:included_policies) { [["foo", { path: "./foo.lock.json" }]] }
42
+
43
+ it "has a included policy" do
44
+ expect(policyfile.included_policies.length).to eq(1)
45
+ end
46
+
47
+ it "uses a local fetcher" do
48
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::LocalLockFetcher)
49
+ end
50
+
51
+ it "has a fetcher with no errors" do
52
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
53
+ end
54
+
55
+ it "has a fetcher that is valid" do
56
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
57
+ end
58
+ end
59
+
60
+ end
61
+
62
+ describe "when include_policy specifies a policy on a chef server" do
63
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo" }]] }
64
+ describe "and policy_revision_id and policy_group are missing" do
65
+ it "has a dsl with errors" do
66
+ expect(policyfile.dsl.errors.length).to eq(1)
67
+ expect(policyfile.dsl.errors[0]).to match(/policy_revision_id/)
68
+ expect(policyfile.dsl.errors[0]).to match(/policy_group/)
69
+ end
70
+ end
71
+
72
+ describe "and the policy name is missing" do
73
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_revision_id: "bar" }]] }
74
+ it "has no errors" do
75
+ expect(policyfile.dsl.errors.length).to eq(0)
76
+ end
77
+ end
78
+
79
+ describe "and everything is correctly configured" do
80
+ context "using policy_revision_id" do
81
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_revision_id: "bar" }]] }
82
+ it "has a dsl with no errors" do
83
+ expect(policyfile.dsl.errors.length).to eq(0)
84
+ end
85
+
86
+ it "has a included policy" do
87
+ expect(policyfile.included_policies.length).to eq(1)
88
+ end
89
+
90
+ it "uses a server fetcher" do
91
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
92
+ end
93
+
94
+ it "has a fetcher with no errors" do
95
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
96
+ end
97
+
98
+ it "has a fetcher that is valid" do
99
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
100
+ end
101
+ end
102
+ end
103
+
104
+ context "using policy_group" do
105
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_group: "bar" }]] }
106
+ it "has a dsl with no errors" do
107
+ expect(policyfile.dsl.errors.length).to eq(0)
108
+ end
109
+
110
+ it "has a included policy" do
111
+ expect(policyfile.included_policies.length).to eq(1)
112
+ end
113
+
114
+ it "uses a server fetcher" do
115
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
116
+ end
117
+
118
+ it "has a fetcher with no errors" do
119
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
120
+ end
121
+
122
+ it "has a fetcher that is valid" do
123
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
124
+ end
125
+ end
126
+ end
127
+
128
+ describe "when include_policy specifies a policy fetched with an unknown method" do
129
+ let(:included_policies) { [["foo", { foofetch: "bar" }]] }
130
+
131
+ it "has a included policy" do
132
+ expect(policyfile.included_policies.length).to eq(1)
133
+ end
134
+
135
+ it "has a dsl with an errors" do
136
+ expect(policyfile.dsl.errors.length).to eq(1)
137
+ expect(policyfile.dsl.errors[0]).to match(/include_policy must use one of the following/)
138
+ end
139
+
140
+ it "errors when trying to get the fetcher" do
141
+ expect { policyfile.included_policies[0].fetcher }.to raise_error(ChefDK::InvalidPolicyfileLocation)
142
+ end
143
+ end
144
+
145
+ describe "when a policy with the same name is specified multiple times" do
146
+ let(:included_policies) do
147
+ [
148
+ ["foo", { path: "./foo.lock.json" }],
149
+ ["foo", { path: "./foo.lock.json" }],
150
+ ]
151
+ end
152
+
153
+ it "has a dsl with errors" do
154
+ expect(policyfile.dsl.errors.length).to eq(1)
155
+ expect(policyfile.dsl.errors[0]).to match(/assigned conflicting locations/)
156
+ end
157
+ end
158
+
159
+ end
@@ -0,0 +1,720 @@
1
+ # -*- coding: UTF-8 -*-
2
+ #
3
+ # Copyright:: Copyright (c) 2014 Chef Software Inc.
4
+ # License:: Apache License, Version 2.0
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+
19
+ require "spec_helper"
20
+ require "chef-dk/policyfile_compiler"
21
+ require "chef-dk/exceptions"
22
+
23
+ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
24
+
25
+ def expand_run_list(r)
26
+ r.map do |item|
27
+ "recipe[#{item}]"
28
+ end
29
+ end
30
+
31
+ let(:run_list) { ["local::default"] }
32
+ let(:run_list_expanded) { expand_run_list(run_list) }
33
+ let(:named_run_list) { {} }
34
+ let(:named_run_list_expanded) do
35
+ named_run_list.inject({}) do |acc, (key, val)|
36
+ acc[key] = expand_run_list(val)
37
+ acc
38
+ end
39
+ end
40
+ let(:default_attributes) { {} }
41
+ let(:override_attributes) { {} }
42
+
43
+ let(:default_source) { nil }
44
+
45
+ let(:external_cookbook_universe) do
46
+ {
47
+ "cookbookA" => {
48
+ "1.0.0" => [ ],
49
+ "2.0.0" => [ ],
50
+ },
51
+ "cookbookB" => {
52
+ "1.0.0" => [ ],
53
+ "2.0.0" => [ ],
54
+ },
55
+ "cookbookC" => {
56
+ "1.0.0" => [ ],
57
+ "2.0.0" => [ ],
58
+ },
59
+ "local" => {
60
+ "1.0.0" => [ ["cookbookC", "= 1.0.0" ] ],
61
+ },
62
+ "local_easy" => {
63
+ "1.0.0" => [ ["cookbookC", "= 2.0.0" ] ],
64
+ },
65
+ }
66
+ end
67
+
68
+ let(:included_policy_default_attributes) { {} }
69
+ let(:included_policy_override_attributes) { {} }
70
+ let(:included_policy_expanded_named_runlist) { nil }
71
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
72
+ let(:included_policy_cookbooks) do
73
+ [
74
+ {
75
+ name: "cookbookA",
76
+ version: "2.0.0",
77
+ },
78
+ ]
79
+ end
80
+
81
+ let(:included_policy_lock_data) do
82
+ cookbook_locks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
83
+ acc[cookbook_info[:name]] = {
84
+ "version" => cookbook_info[:version],
85
+ "identifier" => "identifier",
86
+ "dotted_decimal_identifier" => "dotted_decimal_identifier",
87
+ "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
88
+ "origin" => "uri",
89
+ "source_options" => {},
90
+ }
91
+ acc
92
+ end
93
+
94
+ solution_dependencies_lock = included_policy_cookbooks.map do |cookbook_info|
95
+ [cookbook_info[:name], cookbook_info[:version]]
96
+ end
97
+
98
+ solution_dependencies_cookbooks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
99
+ acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
100
+ acc
101
+ end
102
+
103
+ {
104
+ "name" => "included_policyfile",
105
+ "revision_id" => "myrevisionid",
106
+ "run_list" => included_policy_expanded_runlist,
107
+ "cookbook_locks" => cookbook_locks,
108
+ "default_attributes" => included_policy_default_attributes,
109
+ "override_attributes" => included_policy_override_attributes,
110
+ "solution_dependencies" => {
111
+ "Policyfile" => solution_dependencies_lock,
112
+ "dependencies" => solution_dependencies_cookbooks,
113
+ },
114
+ }.tap do |core|
115
+ core["named_run_lists"] = included_policy_expanded_named_runlist if included_policy_expanded_named_runlist
116
+ end
117
+ end
118
+
119
+ let(:included_policy_lock_name) { "included" }
120
+ let(:included_policy_fetcher) do
121
+ instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
122
+ allow(double).to receive(:lock_data).and_return(included_policy_lock_data)
123
+ allow(double).to receive(:valid?).and_return(true)
124
+ allow(double).to receive(:errors).and_return([])
125
+ end
126
+ end
127
+
128
+ let(:lock_source_options) { { :path => "somelocation" } }
129
+ let(:included_policy_lock_spec) do
130
+ ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_lock_name, lock_source_options, nil).tap do |spec|
131
+ allow(spec).to receive(:valid?).and_return(true)
132
+ allow(spec).to receive(:fetcher).and_return(included_policy_fetcher)
133
+ allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
134
+ end
135
+ end
136
+
137
+ let (:included_policies) { [] }
138
+
139
+ let(:policyfile) do
140
+ policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
141
+ if default_source
142
+ p.default_source.replace([default_source])
143
+ else
144
+ allow(p.default_source.first).to receive(:universe_graph).and_return(external_cookbook_universe)
145
+ allow(p.default_source.first).to receive(:null?).and_return(false)
146
+ end
147
+ p.run_list(*run_list)
148
+
149
+ named_run_list.each do |name, run_list|
150
+ p.named_run_list(name, *run_list)
151
+ end
152
+
153
+ default_attributes.each do |(name, value)|
154
+ p.default[name] = value
155
+ end
156
+
157
+ override_attributes.each do |(name, value)|
158
+ p.override[name] = value
159
+ end
160
+
161
+ allow(p).to receive(:included_policies).and_return(included_policies)
162
+ end
163
+
164
+ policyfile
165
+ end
166
+
167
+ let(:policyfile_lock) do
168
+ policyfile.lock
169
+ end
170
+
171
+ context "when no policies are included" do
172
+
173
+ it "does not emit included policies information in the lockfile" do
174
+ expect(policyfile_lock.to_lock["included_policies"]).to eq(nil)
175
+ end
176
+
177
+ end
178
+
179
+ context "when one policy is included" do
180
+
181
+ let(:included_policies) { [included_policy_lock_spec] }
182
+
183
+ # currently you must have a run list in a policyfile, but it should now
184
+ # become possible to make a combo-policy just by combining other policies
185
+ context "when the including policy does not have a run list" do
186
+ let(:run_list) { [] }
187
+
188
+ it "emits a lockfile with an identical run list as the included policy" do
189
+ expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist)
190
+ end
191
+
192
+ end
193
+
194
+ context "when the including policy has a run list" do
195
+
196
+ it "appends run list items from the including policy to the included policy's run list, removing duplicates" do
197
+ expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist + run_list_expanded)
198
+ end
199
+
200
+ end
201
+
202
+ context "when the policies have named run lists" do
203
+
204
+ let(:included_policy_expanded_named_runlist) do
205
+ {
206
+ "shared" => ["recipe[cookbookA::included]"],
207
+ }
208
+ end
209
+
210
+ context "and no named run lists are shared between the including and included policy" do
211
+
212
+ let(:named_run_list) do
213
+ {
214
+ "local" => ["local::foo"],
215
+ }
216
+ end
217
+
218
+ it "preserves the named run lists as given in both policies" do
219
+ expect(policyfile_lock.to_lock["named_run_lists"]).to include(included_policy_expanded_named_runlist, named_run_list_expanded)
220
+ end
221
+
222
+ end
223
+
224
+ context "and some named run lists are shared between the including and included policy" do
225
+
226
+ let(:named_run_list) do
227
+ {
228
+ "shared" => ["local::foo"],
229
+ }
230
+ end
231
+
232
+ it "appends run lists items from the including policy's run lists to the included policy's run lists" do
233
+ expect(policyfile_lock.to_lock["named_run_lists"]["shared"]).to eq(included_policy_expanded_named_runlist["shared"] + named_run_list_expanded["shared"])
234
+ end
235
+
236
+ end
237
+
238
+ end
239
+
240
+ context "when no cookbooks are shared as dependencies or transitive dependencies" do
241
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
242
+ let(:run_list) { ["cookbookA::default"] }
243
+
244
+ it "does not raise a have conflicting dependency requirements error" do
245
+ expect { policyfile_lock.to_lock }.not_to raise_error
246
+ end
247
+
248
+ it "emits a lockfile where cookbooks pulled from the upstream are at identical versions" do
249
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
250
+ have_key("cookbookC (2.0.0)"))
251
+ end
252
+ end
253
+
254
+ context "when some cookbooks are shared as dependencies or transitive dependencies" do
255
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
256
+ let(:included_policy_cookbooks) do
257
+ [
258
+ {
259
+ name: "cookbookC",
260
+ version: "2.0.0",
261
+ },
262
+ ]
263
+ end
264
+
265
+ context "and the including policy does not specify any sources" do
266
+ let(:run_list) { [] }
267
+ it "it defaults to those provided in the included policy lock" do
268
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
269
+ have_key("cookbookC (2.0.0)"))
270
+ end
271
+ end
272
+
273
+ context "and the including policy specifies a source that is equivalent to the included policy" do
274
+ let(:run_list) { [] }
275
+ let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
276
+
277
+ before do
278
+ allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
279
+ allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({})
280
+ allow(default_source).to receive(:null?).and_return(false)
281
+ allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
282
+ allow(default_source).to receive(:desc).and_return("source double")
283
+ end
284
+
285
+ it "it defaults to those provided in the included policy lock" do
286
+ expect { policyfile_lock.to_lock }.not_to raise_error
287
+ end
288
+ end
289
+
290
+ context "and the including policy specifies a source that is not equivalent to the included policy" do
291
+ let(:run_list) { [] }
292
+ let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
293
+
294
+ before do
295
+ allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
296
+ allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({ "foo" => "bar" })
297
+ allow(default_source).to receive(:null?).and_return(false)
298
+ allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
299
+ allow(default_source).to receive(:desc).and_return("source double")
300
+ end
301
+
302
+ it "it raises an error" do
303
+ expect { policyfile_lock.to_lock }.to raise_error(ChefDK::IncludePolicyCookbookSourceConflict)
304
+ end
305
+ end
306
+
307
+ context "and the including policy's dependencies can be solved with the included policy's locks" do
308
+ let(:run_list) { ["local_easy::default"] }
309
+
310
+ it "solves the dependencies added by the top-level policyfile and emits them in the lockfile" do
311
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
312
+ have_key("cookbookC (2.0.0)"))
313
+ end
314
+
315
+ end
316
+
317
+ context "and the including policy's dependencies cannot be solved with the included policy's locks" do
318
+ let(:run_list) { ["local::default"] }
319
+
320
+ it "raises an error describing the conflict" do
321
+ expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError)
322
+ end
323
+
324
+ it "includes the source of the conflicting dependency constraint from the including policy" do
325
+ expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError) do |e|
326
+ expect(e.to_s).to match(/`cookbookC \(= 2.0.0\)`/) # This one comes from the included policy
327
+ expect(e.to_s).to match(/`cookbookC \(= 1.0.0\)` required by `local-1.0.0`/) # This one comes from the included policy
328
+ end
329
+ end
330
+ end
331
+ end
332
+
333
+ context "when default attributes are specified" do
334
+ let(:default_attributes) do
335
+ {
336
+ "shared" => {
337
+ "foo" => "bar",
338
+ },
339
+ }
340
+ end
341
+
342
+ context "when the included policy does not have attributes that conflict with the including policy" do
343
+ let(:included_policy_default_attributes) do
344
+ {
345
+ "not_shared" => {
346
+ "foo" => "bar",
347
+ },
348
+ }
349
+ end
350
+
351
+ it "emits a lockfile with the attributes from both merged" do
352
+ expect(policyfile_lock.to_lock["default_attributes"]).to include(included_policy_default_attributes, default_attributes)
353
+ end
354
+
355
+ end
356
+
357
+ context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
358
+ let(:included_policy_default_attributes) { default_attributes }
359
+
360
+ it "emits a lockfile with the attributes from both merged" do
361
+ expect(policyfile_lock.to_lock["default_attributes"]).to eq(default_attributes)
362
+ end
363
+
364
+ end
365
+
366
+ context "when the included policy has attributes that conflict with the including policy's attributes" do
367
+ let(:included_policy_default_attributes) do
368
+ {
369
+ "shared" => {
370
+ "foo" => "not_bar",
371
+ },
372
+ }
373
+ end
374
+
375
+ it "raises an error describing all attribute conflicts" do
376
+ expect { policyfile_lock.to_lock }.to raise_error(
377
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
378
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
379
+ end
380
+ end
381
+ end
382
+
383
+ context "when override attributes are specified" do
384
+ let(:override_attributes) do
385
+ {
386
+ "shared" => {
387
+ "foo" => "bar",
388
+ },
389
+ }
390
+ end
391
+
392
+ context "when the included policy does not have attributes that conflict with the including policy" do
393
+ let(:included_policy_override_attributes) do
394
+ {
395
+ "not_shared" => {
396
+ "foo" => "bar",
397
+ },
398
+ }
399
+ end
400
+
401
+ it "emits a lockfile with the attributes from both merged" do
402
+ expect(policyfile_lock.to_lock["override_attributes"]).to include(included_policy_override_attributes, override_attributes)
403
+ end
404
+
405
+ end
406
+
407
+ context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
408
+ let(:included_policy_override_attributes) { override_attributes }
409
+
410
+ it "emits a lockfile with the attributes from both merged" do
411
+ expect(policyfile_lock.to_lock["override_attributes"]).to eq(override_attributes)
412
+ end
413
+
414
+ end
415
+
416
+ context "when the included policy has attributes that conflict with the including policy's attributes" do
417
+ let(:included_policy_override_attributes) do
418
+ {
419
+ "shared" => {
420
+ "foo" => "not_bar",
421
+ },
422
+ }
423
+ end
424
+
425
+ it "raises an error describing all attribute conflicts" do
426
+ expect { policyfile_lock.to_lock }.to raise_error(
427
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
428
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
429
+ end
430
+ end
431
+ end
432
+ end
433
+
434
+ context "when several policies are included" do
435
+ let(:included_policy_2_default_attributes) { {} }
436
+ let(:included_policy_2_override_attributes) { {} }
437
+ let(:included_policy_2_expanded_named_runlist) { nil }
438
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookA::default]"] }
439
+ let(:included_policy_2_cookbooks) do
440
+ [
441
+ {
442
+ name: "cookbookA",
443
+ version: "2.0.0",
444
+ },
445
+ ]
446
+ end
447
+
448
+ let(:included_policy_2_lock_data) do
449
+ cookbook_locks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
450
+ acc[cookbook_info[:name]] = {
451
+ "version" => cookbook_info[:version],
452
+ "identifier" => "identifier",
453
+ "dotted_decimal_identifier" => "dotted_decimal_identifier",
454
+ "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
455
+ "origin" => "uri",
456
+ "source_options" => {},
457
+ }
458
+ acc
459
+ end
460
+
461
+ solution_dependencies_lock = included_policy_2_cookbooks.map do |cookbook_info|
462
+ [cookbook_info[:name], cookbook_info[:version]]
463
+ end
464
+
465
+ solution_dependencies_cookbooks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
466
+ acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
467
+ acc
468
+ end
469
+
470
+ {
471
+ "name" => "included_policy_2file",
472
+ "revision_id" => "myrevisionid",
473
+ "run_list" => included_policy_2_expanded_runlist,
474
+ "cookbook_locks" => cookbook_locks,
475
+ "default_attributes" => included_policy_2_default_attributes,
476
+ "override_attributes" => included_policy_2_override_attributes,
477
+ "solution_dependencies" => {
478
+ "Policyfile" => solution_dependencies_lock,
479
+ "dependencies" => solution_dependencies_cookbooks,
480
+ },
481
+ }.tap do |core|
482
+ core["named_run_lists"] = included_policy_2_expanded_named_runlist if included_policy_2_expanded_named_runlist
483
+ end
484
+ end
485
+
486
+ let(:included_policy_2_lock_name) { "included2" }
487
+ let(:included_policy_2_fetcher) do
488
+ instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
489
+ allow(double).to receive(:lock_data).and_return(included_policy_2_lock_data)
490
+ allow(double).to receive(:valid?).and_return(true)
491
+ allow(double).to receive(:errors).and_return([])
492
+ end
493
+ end
494
+
495
+ let(:included_policy_2_lock_spec) do
496
+ ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_2_lock_name, lock_source_options, nil).tap do |spec|
497
+ allow(spec).to receive(:valid?).and_return(true)
498
+ allow(spec).to receive(:fetcher).and_return(included_policy_2_fetcher)
499
+ allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
500
+ end
501
+ end
502
+
503
+ let(:included_policies) { [included_policy_lock_spec, included_policy_2_lock_spec] }
504
+
505
+ let(:run_list) { ["local::default"] }
506
+
507
+ context "when no cookbooks are shared as dependencies or transitive dependencies by included policies" do
508
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
509
+ let(:included_policy_cookbooks) do
510
+ [
511
+ {
512
+ name: "cookbookA",
513
+ version: "2.0.0",
514
+ },
515
+ ]
516
+ end
517
+
518
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookB::default]"] }
519
+ let(:included_policy_2_cookbooks) do
520
+ [
521
+ {
522
+ name: "cookbookB",
523
+ version: "2.0.0",
524
+ },
525
+ ]
526
+ end
527
+
528
+ it "does not raise a have conflicting dependency requirements error" do
529
+ expect { policyfile_lock.to_lock }.not_to raise_error
530
+ end
531
+
532
+ it "emits a lockfile with the correct dependencies" do
533
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
534
+ "cookbookA (2.0.0)" => [],
535
+ "cookbookB (2.0.0)" => [],
536
+ "cookbookC (1.0.0)" => [],
537
+ "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
538
+ })
539
+ end
540
+ end
541
+
542
+ context "when some cookbooks appear as dependencies or transitive dependencies of some included policies" do
543
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
544
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookC::default]"] }
545
+
546
+ context "and the locked versions of the cookbooks match" do
547
+ let(:included_policy_cookbooks) do
548
+ [
549
+ {
550
+ name: "cookbookC",
551
+ version: "1.0.0",
552
+ },
553
+ ]
554
+ end
555
+
556
+ let(:included_policy_2_cookbooks) do
557
+ [
558
+ {
559
+ name: "cookbookC",
560
+ version: "1.0.0",
561
+ },
562
+ ]
563
+ end
564
+
565
+ it "solves the dependencies with the matching versions" do
566
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
567
+ "cookbookC (1.0.0)" => [],
568
+ "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
569
+ })
570
+ end
571
+ end
572
+
573
+ context "and the locked versions of the cookbooks do not match" do
574
+ let(:included_policy_cookbooks) do
575
+ [
576
+ {
577
+ name: "cookbookC",
578
+ version: "1.0.0",
579
+ },
580
+ ]
581
+ end
582
+
583
+ let(:included_policy_2_cookbooks) do
584
+ [
585
+ {
586
+ name: "cookbookC",
587
+ version: "2.0.0",
588
+ },
589
+ ]
590
+ end
591
+
592
+ it "raises an error describing the conflict" do
593
+ expect { policyfile_lock }.to raise_error(
594
+ ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookVersions,
595
+ /Multiple versions provided for cookbook cookbookC/
596
+ )
597
+ end
598
+ end
599
+ end
600
+
601
+ context "when default attributes are specified" do
602
+ context "when the included policies do not have conflicting attributes" do
603
+ let(:included_policy_default_attributes) do
604
+ {
605
+ "not_conflict" => {
606
+ "foo" => "bar",
607
+ },
608
+ }
609
+ end
610
+ let(:included_policy_2_default_attributes) do
611
+ {
612
+ "not_conflict" => {
613
+ "foo" => "bar",
614
+ },
615
+ }
616
+ end
617
+ let(:default_attributes) do
618
+ {
619
+ "not_conflict" => {
620
+ "bar" => "baz",
621
+ },
622
+ }
623
+ end
624
+
625
+ it "emits a lockfile with the included policies' attributes merged" do
626
+ expect(policyfile_lock.to_lock["default_attributes"]).to eq({
627
+ "not_conflict" => {
628
+ "foo" => "bar",
629
+ "bar" => "baz",
630
+ },
631
+ })
632
+ end
633
+ end
634
+
635
+ context "when the included policies have conflicting attributes" do
636
+ let(:included_policy_default_attributes) do
637
+ {
638
+ "conflict" => {
639
+ "foo" => "bar",
640
+ },
641
+ }
642
+ end
643
+
644
+ let(:included_policy_2_default_attributes) do
645
+ {
646
+ "conflict" => {
647
+ "foo" => "baz",
648
+ },
649
+ }
650
+ end
651
+
652
+ it "raises an error describing the conflict" do
653
+ expect { policyfile_lock }.to raise_error(
654
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
655
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
656
+ end
657
+ end
658
+ end
659
+
660
+ context "when override attributes are specified" do
661
+ context "when the included policies do not have conflicting attributes" do
662
+ let(:included_policy_override_attributes) do
663
+ {
664
+ "not_conflict" => {
665
+ "foo" => "bar",
666
+ },
667
+ }
668
+ end
669
+ let(:included_policy_2_override_attributes) do
670
+ {
671
+ "not_conflict" => {
672
+ "foo" => "bar",
673
+ },
674
+ }
675
+ end
676
+ let(:override_attributes) do
677
+ {
678
+ "not_conflict" => {
679
+ "bar" => "baz",
680
+ },
681
+ }
682
+ end
683
+
684
+ it "emits a lockfile with the included policies' attributes merged" do
685
+ expect(policyfile_lock.to_lock["override_attributes"]).to eq({
686
+ "not_conflict" => {
687
+ "foo" => "bar",
688
+ "bar" => "baz",
689
+ },
690
+ })
691
+ end
692
+ end
693
+
694
+ context "when the included policies have conflicting attributes" do
695
+ let(:included_policy_override_attributes) do
696
+ {
697
+ "conflict" => {
698
+ "foo" => "bar",
699
+ },
700
+ }
701
+ end
702
+
703
+ let(:included_policy_2_override_attributes) do
704
+ {
705
+ "conflict" => {
706
+ "foo" => "baz",
707
+ },
708
+ }
709
+ end
710
+
711
+ it "raises an error describing the conflict" do
712
+ expect { policyfile_lock }.to raise_error(
713
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
714
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
715
+ end
716
+ end
717
+ end
718
+
719
+ end
720
+ end