chef-dk 2.4.17 → 2.5.3

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (374) hide show
  1. checksums.yaml +5 -5
  2. data/Gemfile +121 -119
  3. data/Gemfile.lock +802 -817
  4. data/LICENSE +201 -201
  5. data/README.md +333 -333
  6. data/Rakefile +74 -74
  7. data/acceptance/.shared/kitchen_acceptance/.kitchen.digitalocean.yml +27 -27
  8. data/acceptance/.shared/kitchen_acceptance/.kitchen.ec2.yml +287 -287
  9. data/acceptance/.shared/kitchen_acceptance/.kitchen.vagrant.yml +52 -52
  10. data/acceptance/.shared/kitchen_acceptance/libraries/kitchen.rb +51 -51
  11. data/acceptance/.shared/kitchen_acceptance/metadata.rb +1 -1
  12. data/acceptance/Gemfile +21 -20
  13. data/acceptance/Gemfile.lock +334 -334
  14. data/acceptance/README.md +132 -132
  15. data/acceptance/trivial/.acceptance/acceptance-cookbook/.gitignore +2 -2
  16. data/acceptance/trivial/.acceptance/acceptance-cookbook/metadata.rb +2 -2
  17. data/acceptance/trivial/.acceptance/acceptance-cookbook/recipes/destroy.rb +1 -1
  18. data/acceptance/trivial/.acceptance/acceptance-cookbook/recipes/provision.rb +1 -1
  19. data/acceptance/trivial/.acceptance/acceptance-cookbook/recipes/verify.rb +1 -1
  20. data/acceptance/trivial/.kitchen.yml +7 -7
  21. data/acceptance/trivial/test/integration/chefdk-current-install/inspec/chef_client_spec.rb +5 -5
  22. data/bin/chef +25 -25
  23. data/chef-dk.gemspec +60 -60
  24. data/lib/chef-dk.rb +19 -19
  25. data/lib/chef-dk/authenticated_http.rb +22 -22
  26. data/lib/chef-dk/builtin_commands.rb +59 -59
  27. data/lib/chef-dk/chef_runner.rb +114 -114
  28. data/lib/chef-dk/chef_server_api_multi.rb +73 -73
  29. data/lib/chef-dk/cli.rb +201 -201
  30. data/lib/chef-dk/command/base.rb +79 -79
  31. data/lib/chef-dk/command/clean_policy_cookbooks.rb +114 -114
  32. data/lib/chef-dk/command/clean_policy_revisions.rb +111 -111
  33. data/lib/chef-dk/command/delete_policy.rb +120 -120
  34. data/lib/chef-dk/command/delete_policy_group.rb +120 -120
  35. data/lib/chef-dk/command/diff.rb +315 -315
  36. data/lib/chef-dk/command/env.rb +89 -89
  37. data/lib/chef-dk/command/exec.rb +44 -44
  38. data/lib/chef-dk/command/export.rb +155 -155
  39. data/lib/chef-dk/command/gem.rb +47 -47
  40. data/lib/chef-dk/command/generate.rb +125 -125
  41. data/lib/chef-dk/command/generator_commands.rb +83 -83
  42. data/lib/chef-dk/command/generator_commands/app.rb +106 -106
  43. data/lib/chef-dk/command/generator_commands/attribute.rb +36 -36
  44. data/lib/chef-dk/command/generator_commands/base.rb +157 -157
  45. data/lib/chef-dk/command/generator_commands/build_cookbook.rb +125 -125
  46. data/lib/chef-dk/command/generator_commands/chef_exts/generator_desc_resource.rb +85 -85
  47. data/lib/chef-dk/command/generator_commands/chef_exts/quieter_doc_formatter.rb +38 -38
  48. data/lib/chef-dk/command/generator_commands/chef_exts/recipe_dsl_ext.rb +39 -39
  49. data/lib/chef-dk/command/generator_commands/cookbook.rb +241 -241
  50. data/lib/chef-dk/command/generator_commands/cookbook_code_file.rb +100 -100
  51. data/lib/chef-dk/command/generator_commands/cookbook_file.rb +45 -45
  52. data/lib/chef-dk/command/generator_commands/generator_generator.rb +174 -174
  53. data/lib/chef-dk/command/generator_commands/helpers.rb +36 -36
  54. data/lib/chef-dk/command/generator_commands/policyfile.rb +126 -126
  55. data/lib/chef-dk/command/generator_commands/recipe.rb +36 -36
  56. data/lib/chef-dk/command/generator_commands/repo.rb +123 -123
  57. data/lib/chef-dk/command/generator_commands/resource.rb +36 -36
  58. data/lib/chef-dk/command/generator_commands/template.rb +46 -46
  59. data/lib/chef-dk/command/install.rb +120 -120
  60. data/lib/chef-dk/command/provision.rb +436 -436
  61. data/lib/chef-dk/command/push.rb +117 -117
  62. data/lib/chef-dk/command/push_archive.rb +125 -125
  63. data/lib/chef-dk/command/shell_init.rb +179 -179
  64. data/lib/chef-dk/command/show_policy.rb +163 -163
  65. data/lib/chef-dk/command/undelete.rb +154 -154
  66. data/lib/chef-dk/command/update.rb +133 -133
  67. data/lib/chef-dk/command/verify.rb +629 -629
  68. data/lib/chef-dk/commands_map.rb +113 -113
  69. data/lib/chef-dk/completions/bash.sh.erb +5 -5
  70. data/lib/chef-dk/completions/chef.fish.erb +10 -10
  71. data/lib/chef-dk/completions/zsh.zsh.erb +21 -21
  72. data/lib/chef-dk/component_test.rb +227 -227
  73. data/lib/chef-dk/configurable.rb +88 -88
  74. data/lib/chef-dk/cookbook_metadata.rb +45 -45
  75. data/lib/chef-dk/cookbook_omnifetch.rb +32 -32
  76. data/lib/chef-dk/cookbook_profiler/git.rb +151 -151
  77. data/lib/chef-dk/cookbook_profiler/identifiers.rb +72 -72
  78. data/lib/chef-dk/cookbook_profiler/null_scm.rb +31 -31
  79. data/lib/chef-dk/exceptions.rb +150 -150
  80. data/lib/chef-dk/generator.rb +165 -165
  81. data/lib/chef-dk/helpers.rb +176 -176
  82. data/lib/chef-dk/pager.rb +105 -105
  83. data/lib/chef-dk/policyfile/artifactory_cookbook_source.rb +102 -102
  84. data/lib/chef-dk/policyfile/attribute_merge_checker.rb +110 -110
  85. data/lib/chef-dk/policyfile/chef_repo_cookbook_source.rb +138 -138
  86. data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +99 -99
  87. data/lib/chef-dk/policyfile/chef_server_lock_fetcher.rb +164 -164
  88. data/lib/chef-dk/policyfile/community_cookbook_source.rb +95 -95
  89. data/lib/chef-dk/policyfile/comparison_base.rb +123 -123
  90. data/lib/chef-dk/policyfile/cookbook_location_specification.rb +154 -154
  91. data/lib/chef-dk/policyfile/cookbook_locks.rb +466 -466
  92. data/lib/chef-dk/policyfile/cookbook_sources.rb +23 -23
  93. data/lib/chef-dk/policyfile/delivery_supermarket_source.rb +89 -89
  94. data/lib/chef-dk/policyfile/differ.rb +263 -263
  95. data/lib/chef-dk/policyfile/dsl.rb +288 -288
  96. data/lib/chef-dk/policyfile/included_policies_cookbook_source.rb +156 -156
  97. data/lib/chef-dk/policyfile/lister.rb +229 -229
  98. data/lib/chef-dk/policyfile/local_lock_fetcher.rb +123 -122
  99. data/lib/chef-dk/policyfile/lock_applier.rb +80 -80
  100. data/lib/chef-dk/policyfile/null_cookbook_source.rb +49 -49
  101. data/lib/chef-dk/policyfile/policyfile_location_specification.rb +122 -122
  102. data/lib/chef-dk/policyfile/read_cookbook_for_compat_mode_upload.rb +124 -124
  103. data/lib/chef-dk/policyfile/reports/install.rb +69 -69
  104. data/lib/chef-dk/policyfile/reports/table_printer.rb +57 -57
  105. data/lib/chef-dk/policyfile/reports/upload.rb +70 -70
  106. data/lib/chef-dk/policyfile/solution_dependencies.rb +312 -312
  107. data/lib/chef-dk/policyfile/source_uri.rb +57 -57
  108. data/lib/chef-dk/policyfile/storage_config.rb +102 -102
  109. data/lib/chef-dk/policyfile/undo_record.rb +139 -139
  110. data/lib/chef-dk/policyfile/undo_stack.rb +128 -128
  111. data/lib/chef-dk/policyfile/uploader.rb +213 -213
  112. data/lib/chef-dk/policyfile_compiler.rb +528 -528
  113. data/lib/chef-dk/policyfile_lock.rb +581 -581
  114. data/lib/chef-dk/policyfile_services/clean_policies.rb +95 -95
  115. data/lib/chef-dk/policyfile_services/clean_policy_cookbooks.rb +123 -123
  116. data/lib/chef-dk/policyfile_services/export_repo.rb +420 -420
  117. data/lib/chef-dk/policyfile_services/install.rb +162 -162
  118. data/lib/chef-dk/policyfile_services/push.rb +112 -112
  119. data/lib/chef-dk/policyfile_services/push_archive.rb +200 -200
  120. data/lib/chef-dk/policyfile_services/rm_policy.rb +141 -141
  121. data/lib/chef-dk/policyfile_services/rm_policy_group.rb +85 -85
  122. data/lib/chef-dk/policyfile_services/show_policy.rb +236 -236
  123. data/lib/chef-dk/policyfile_services/undelete.rb +108 -108
  124. data/lib/chef-dk/policyfile_services/update_attributes.rb +110 -110
  125. data/lib/chef-dk/service_exception_inspectors.rb +24 -24
  126. data/lib/chef-dk/service_exception_inspectors/base.rb +39 -39
  127. data/lib/chef-dk/service_exception_inspectors/http.rb +119 -119
  128. data/lib/chef-dk/service_exceptions.rb +142 -142
  129. data/lib/chef-dk/shell_out.rb +36 -36
  130. data/lib/chef-dk/skeletons/code_generator/files/default/Berksfile +4 -4
  131. data/lib/chef-dk/skeletons/code_generator/files/default/build_cookbook/.kitchen.yml +21 -21
  132. data/lib/chef-dk/skeletons/code_generator/files/default/build_cookbook/README.md +146 -146
  133. data/lib/chef-dk/skeletons/code_generator/files/default/build_cookbook/test-fixture-recipe.rb +9 -9
  134. data/lib/chef-dk/skeletons/code_generator/files/default/chefignore +107 -107
  135. data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README-policy.md +9 -9
  136. data/lib/chef-dk/skeletons/code_generator/files/default/cookbook_readmes/README.md +54 -54
  137. data/lib/chef-dk/skeletons/code_generator/files/default/delivery-config.json +17 -17
  138. data/lib/chef-dk/skeletons/code_generator/files/default/delivery-project.toml +36 -36
  139. data/lib/chef-dk/skeletons/code_generator/files/default/gitignore +22 -22
  140. data/lib/chef-dk/skeletons/code_generator/files/default/repo/README.md +24 -24
  141. data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/README.md +27 -27
  142. data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/attributes/default.rb +8 -8
  143. data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/metadata.rb +7 -7
  144. data/lib/chef-dk/skeletons/code_generator/files/default/repo/cookbooks/example/recipes/default.rb +9 -9
  145. data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/README.md +56 -56
  146. data/lib/chef-dk/skeletons/code_generator/files/default/repo/data_bags/example/example_item.json +3 -3
  147. data/lib/chef-dk/skeletons/code_generator/files/default/repo/dot-chef-repo.txt +6 -6
  148. data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/README.md +9 -9
  149. data/lib/chef-dk/skeletons/code_generator/files/default/repo/environments/example.json +12 -12
  150. data/lib/chef-dk/skeletons/code_generator/files/default/repo/policies/README.md +24 -24
  151. data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/README.md +9 -9
  152. data/lib/chef-dk/skeletons/code_generator/files/default/repo/roles/example.json +12 -12
  153. data/lib/chef-dk/skeletons/code_generator/files/default/spec_helper.rb +3 -3
  154. data/lib/chef-dk/skeletons/code_generator/files/default/spec_helper_policyfile.rb +3 -3
  155. data/lib/chef-dk/skeletons/code_generator/metadata.rb +8 -8
  156. data/lib/chef-dk/skeletons/code_generator/recipes/app.rb +89 -89
  157. data/lib/chef-dk/skeletons/code_generator/recipes/attribute.rb +13 -13
  158. data/lib/chef-dk/skeletons/code_generator/recipes/build_cookbook.rb +177 -177
  159. data/lib/chef-dk/skeletons/code_generator/recipes/cookbook.rb +152 -152
  160. data/lib/chef-dk/skeletons/code_generator/recipes/cookbook_file.rb +25 -25
  161. data/lib/chef-dk/skeletons/code_generator/recipes/helpers.rb +21 -21
  162. data/lib/chef-dk/skeletons/code_generator/recipes/policyfile.rb +9 -9
  163. data/lib/chef-dk/skeletons/code_generator/recipes/recipe.rb +52 -52
  164. data/lib/chef-dk/skeletons/code_generator/recipes/repo.rb +68 -68
  165. data/lib/chef-dk/skeletons/code_generator/recipes/resource.rb +13 -13
  166. data/lib/chef-dk/skeletons/code_generator/recipes/template.rb +32 -32
  167. data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.all_rights.erb +3 -3
  168. data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.apachev2.erb +201 -201
  169. data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv2.erb +339 -339
  170. data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.gplv3.erb +674 -674
  171. data/lib/chef-dk/skeletons/code_generator/templates/default/LICENSE.mit.erb +21 -21
  172. data/lib/chef-dk/skeletons/code_generator/templates/default/Policyfile.rb.erb +25 -25
  173. data/lib/chef-dk/skeletons/code_generator/templates/default/README.md.erb +4 -4
  174. data/lib/chef-dk/skeletons/code_generator/templates/default/build_cookbook/Berksfile.erb +7 -7
  175. data/lib/chef-dk/skeletons/code_generator/templates/default/build_cookbook/metadata.rb.erb +10 -10
  176. data/lib/chef-dk/skeletons/code_generator/templates/default/build_cookbook/recipe.rb.erb +8 -8
  177. data/lib/chef-dk/skeletons/code_generator/templates/default/helpers.rb.erb +39 -39
  178. data/lib/chef-dk/skeletons/code_generator/templates/default/inspec_default_test.rb.erb +18 -18
  179. data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen.yml.erb +26 -26
  180. data/lib/chef-dk/skeletons/code_generator/templates/default/kitchen_policyfile.yml.erb +33 -33
  181. data/lib/chef-dk/skeletons/code_generator/templates/default/metadata.rb.erb +20 -20
  182. data/lib/chef-dk/skeletons/code_generator/templates/default/recipe.rb.erb +5 -5
  183. data/lib/chef-dk/skeletons/code_generator/templates/default/recipe_spec.rb.erb +35 -35
  184. data/lib/chef-dk/skeletons/code_generator/templates/default/repo/gitignore.erb +128 -128
  185. data/lib/chef-dk/skeletons/code_generator/templates/default/resource.rb.erb +1 -1
  186. data/lib/chef-dk/ui.rb +57 -57
  187. data/lib/chef-dk/version.rb +20 -20
  188. data/lib/kitchen/provisioner/policyfile_zero.rb +195 -195
  189. data/omnibus_overrides.rb +22 -22
  190. data/spec/shared/a_file_generator.rb +125 -125
  191. data/spec/shared/a_generated_file.rb +12 -12
  192. data/spec/shared/command_with_ui_object.rb +11 -11
  193. data/spec/shared/custom_generator_cookbook.rb +136 -136
  194. data/spec/shared/fixture_cookbook_checksums.rb +46 -46
  195. data/spec/shared/setup_git_committer_config.rb +54 -54
  196. data/spec/shared/setup_git_cookbooks.rb +53 -53
  197. data/spec/spec_helper.rb +51 -51
  198. data/spec/test_helpers.rb +84 -84
  199. data/spec/unit/chef_runner_spec.rb +139 -139
  200. data/spec/unit/chef_server_api_multi_spec.rb +120 -120
  201. data/spec/unit/cli_spec.rb +377 -377
  202. data/spec/unit/command/base_spec.rb +172 -172
  203. data/spec/unit/command/clean_policy_cookbooks_spec.rb +180 -180
  204. data/spec/unit/command/clean_policy_revisions_spec.rb +180 -180
  205. data/spec/unit/command/delete_policy_group_spec.rb +206 -206
  206. data/spec/unit/command/delete_policy_spec.rb +206 -206
  207. data/spec/unit/command/diff_spec.rb +311 -311
  208. data/spec/unit/command/env_spec.rb +52 -52
  209. data/spec/unit/command/exec_spec.rb +178 -178
  210. data/spec/unit/command/export_spec.rb +199 -199
  211. data/spec/unit/command/generate_spec.rb +142 -142
  212. data/spec/unit/command/generator_commands/app_spec.rb +166 -166
  213. data/spec/unit/command/generator_commands/attribute_spec.rb +31 -31
  214. data/spec/unit/command/generator_commands/base_spec.rb +181 -181
  215. data/spec/unit/command/generator_commands/build_cookbook_spec.rb +377 -377
  216. data/spec/unit/command/generator_commands/chef_exts/generator_desc_resource_spec.rb +97 -97
  217. data/spec/unit/command/generator_commands/chef_exts/recipe_dsl_ext_spec.rb +111 -111
  218. data/spec/unit/command/generator_commands/cookbook_file_spec.rb +31 -31
  219. data/spec/unit/command/generator_commands/cookbook_spec.rb +756 -756
  220. data/spec/unit/command/generator_commands/generator_generator_spec.rb +227 -227
  221. data/spec/unit/command/generator_commands/helpers_spec.rb +31 -31
  222. data/spec/unit/command/generator_commands/policyfile_spec.rb +223 -223
  223. data/spec/unit/command/generator_commands/recipe_spec.rb +37 -37
  224. data/spec/unit/command/generator_commands/repo_spec.rb +374 -374
  225. data/spec/unit/command/generator_commands/resource_spec.rb +31 -31
  226. data/spec/unit/command/generator_commands/template_spec.rb +31 -31
  227. data/spec/unit/command/install_spec.rb +179 -179
  228. data/spec/unit/command/provision_spec.rb +589 -589
  229. data/spec/unit/command/push_archive_spec.rb +153 -153
  230. data/spec/unit/command/push_spec.rb +198 -198
  231. data/spec/unit/command/shell_init_spec.rb +339 -339
  232. data/spec/unit/command/show_policy_spec.rb +234 -234
  233. data/spec/unit/command/undelete_spec.rb +244 -244
  234. data/spec/unit/command/update_spec.rb +283 -283
  235. data/spec/unit/command/verify_spec.rb +341 -341
  236. data/spec/unit/commands_map_spec.rb +57 -57
  237. data/spec/unit/component_test_spec.rb +128 -128
  238. data/spec/unit/configurable_spec.rb +68 -68
  239. data/spec/unit/cookbook_metadata_spec.rb +96 -96
  240. data/spec/unit/cookbook_profiler/git_spec.rb +176 -176
  241. data/spec/unit/cookbook_profiler/identifiers_spec.rb +81 -81
  242. data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_one.rb +9 -9
  243. data/spec/unit/fixtures/chef-runner-cookbooks/test_cookbook/recipes/recipe_two.rb +9 -9
  244. data/spec/unit/fixtures/command/cli_test_command.rb +26 -26
  245. data/spec/unit/fixtures/command/explicit_path_example.rb +7 -7
  246. data/spec/unit/fixtures/configurable/test_config_loader.rb +5 -5
  247. data/spec/unit/fixtures/configurable/test_configurable.rb +10 -10
  248. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
  249. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/Berksfile +3 -3
  250. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
  251. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/chefignore +96 -96
  252. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
  253. data/spec/unit/fixtures/cookbook_cache/baz-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
  254. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/.kitchen.yml +16 -16
  255. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/Berksfile +3 -3
  256. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/README.md +4 -4
  257. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/chefignore +96 -96
  258. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/metadata.rb +8 -8
  259. data/spec/unit/fixtures/cookbook_cache/dep_of_bar-1.2.3/recipes/default.rb +8 -8
  260. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/.kitchen.yml +16 -16
  261. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/Berksfile +3 -3
  262. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/README.md +4 -4
  263. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/chefignore +96 -96
  264. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/metadata.rb +8 -8
  265. data/spec/unit/fixtures/cookbook_cache/foo-1.0.0/recipes/default.rb +8 -8
  266. data/spec/unit/fixtures/cookbooks_api/chef_server_universe.json +56 -56
  267. data/spec/unit/fixtures/cookbooks_api/pruned_chef_server_universe.json +30 -30
  268. data/spec/unit/fixtures/cookbooks_api/pruned_small_universe.json +1321 -1321
  269. data/spec/unit/fixtures/cookbooks_api/small_universe.json +2987 -2987
  270. data/spec/unit/fixtures/cookbooks_api/universe.json +1 -1
  271. data/spec/unit/fixtures/cookbooks_api/update_fixtures.rb +33 -33
  272. data/spec/unit/fixtures/dev_cookbooks/README.md +16 -16
  273. data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/integration_test +2 -2
  274. data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/berkshelf/verify_me +5 -5
  275. data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/chef/verify_me +3 -3
  276. data/spec/unit/fixtures/eg_omnibus_dir/valid/embedded/apps/test-kitchen/verify_me +2 -2
  277. data/spec/unit/fixtures/example_cookbook/.gitignore +17 -17
  278. data/spec/unit/fixtures/example_cookbook/.kitchen.yml +16 -16
  279. data/spec/unit/fixtures/example_cookbook/Berksfile +3 -3
  280. data/spec/unit/fixtures/example_cookbook/README.md +4 -4
  281. data/spec/unit/fixtures/example_cookbook/chefignore +96 -96
  282. data/spec/unit/fixtures/example_cookbook/metadata.rb +8 -8
  283. data/spec/unit/fixtures/example_cookbook/recipes/default.rb +8 -8
  284. data/spec/unit/fixtures/example_cookbook_metadata_json_only/.gitignore +17 -17
  285. data/spec/unit/fixtures/example_cookbook_metadata_json_only/.kitchen.yml +16 -16
  286. data/spec/unit/fixtures/example_cookbook_metadata_json_only/Berksfile +3 -3
  287. data/spec/unit/fixtures/example_cookbook_metadata_json_only/README.md +4 -4
  288. data/spec/unit/fixtures/example_cookbook_metadata_json_only/chefignore +96 -96
  289. data/spec/unit/fixtures/example_cookbook_metadata_json_only/metadata.json +5 -5
  290. data/spec/unit/fixtures/example_cookbook_metadata_json_only/recipes/default.rb +8 -8
  291. data/spec/unit/fixtures/example_cookbook_no_metadata/.gitignore +17 -17
  292. data/spec/unit/fixtures/example_cookbook_no_metadata/.kitchen.yml +16 -16
  293. data/spec/unit/fixtures/example_cookbook_no_metadata/Berksfile +3 -3
  294. data/spec/unit/fixtures/example_cookbook_no_metadata/README.md +4 -4
  295. data/spec/unit/fixtures/example_cookbook_no_metadata/chefignore +96 -96
  296. data/spec/unit/fixtures/example_cookbook_no_metadata/recipes/default.rb +8 -8
  297. data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/README.md +4 -4
  298. data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/chefignore +96 -96
  299. data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/metadata.rb +8 -8
  300. data/spec/unit/fixtures/local_path_cookbooks/another-local-cookbook/recipes/default.rb +8 -8
  301. data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/Berksfile +3 -3
  302. data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/README.md +4 -4
  303. data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/chefignore +96 -96
  304. data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/metadata.rb +9 -9
  305. data/spec/unit/fixtures/local_path_cookbooks/cookbook-with-a-dep/recipes/default.rb +8 -8
  306. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/.kitchen.yml +16 -16
  307. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/Berksfile +3 -3
  308. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/README.md +4 -4
  309. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/chefignore +96 -96
  310. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/metadata.rb +8 -8
  311. data/spec/unit/fixtures/local_path_cookbooks/local-cookbook/recipes/default.rb +8 -8
  312. data/spec/unit/fixtures/local_path_cookbooks/metadata-missing/README.md +2 -2
  313. data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/.kitchen.yml +16 -16
  314. data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/README.md +4 -4
  315. data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/metadata.rb +8 -8
  316. data/spec/unit/fixtures/local_path_cookbooks/noignore-f59ee7a5bca6a4e606b67f7f856b768d847c39bb/recipes/default.rb +8 -8
  317. data/spec/unit/generator_spec.rb +119 -119
  318. data/spec/unit/pager_spec.rb +117 -117
  319. data/spec/unit/policyfile/artifactory_cookbook_source_spec.rb +59 -59
  320. data/spec/unit/policyfile/attribute_merge_checker_spec.rb +80 -80
  321. data/spec/unit/policyfile/chef_repo_cookbook_source_spec.rb +93 -93
  322. data/spec/unit/policyfile/chef_server_cookbook_source_spec.rb +55 -55
  323. data/spec/unit/policyfile/chef_server_lock_fetcher_spec.rb +161 -161
  324. data/spec/unit/policyfile/community_cookbook_source_spec.rb +83 -83
  325. data/spec/unit/policyfile/comparison_base_spec.rb +340 -340
  326. data/spec/unit/policyfile/cookbook_location_specification_spec.rb +347 -347
  327. data/spec/unit/policyfile/cookbook_locks_spec.rb +527 -527
  328. data/spec/unit/policyfile/delivery_supermarket_source_spec.rb +129 -129
  329. data/spec/unit/policyfile/differ_spec.rb +686 -686
  330. data/spec/unit/policyfile/included_policies_cookbook_source_spec.rb +242 -242
  331. data/spec/unit/policyfile/lister_spec.rb +268 -268
  332. data/spec/unit/policyfile/local_lock_fetcher_spec.rb +173 -161
  333. data/spec/unit/policyfile/lock_applier_spec.rb +100 -100
  334. data/spec/unit/policyfile/null_cookbook_source_spec.rb +34 -34
  335. data/spec/unit/policyfile/read_cookbook_for_compat_mode_upload_spec.rb +92 -92
  336. data/spec/unit/policyfile/reports/install_spec.rb +114 -114
  337. data/spec/unit/policyfile/reports/upload_spec.rb +94 -94
  338. data/spec/unit/policyfile/solution_dependencies_spec.rb +170 -170
  339. data/spec/unit/policyfile/source_uri_spec.rb +36 -36
  340. data/spec/unit/policyfile/storage_config_spec.rb +180 -180
  341. data/spec/unit/policyfile/undo_record_spec.rb +258 -258
  342. data/spec/unit/policyfile/undo_stack_spec.rb +265 -265
  343. data/spec/unit/policyfile/uploader_spec.rb +409 -409
  344. data/spec/unit/policyfile_demands_spec.rb +1197 -1197
  345. data/spec/unit/policyfile_evaluation_spec.rb +638 -638
  346. data/spec/unit/policyfile_includes_dsl_spec.rb +159 -159
  347. data/spec/unit/policyfile_includes_spec.rb +720 -720
  348. data/spec/unit/policyfile_install_with_includes_spec.rb +232 -232
  349. data/spec/unit/policyfile_lock_build_spec.rb +1065 -1065
  350. data/spec/unit/policyfile_lock_install_spec.rb +137 -137
  351. data/spec/unit/policyfile_lock_serialization_spec.rb +424 -424
  352. data/spec/unit/policyfile_lock_validation_spec.rb +608 -608
  353. data/spec/unit/policyfile_services/clean_policies_spec.rb +236 -236
  354. data/spec/unit/policyfile_services/clean_policy_cookbooks_spec.rb +272 -272
  355. data/spec/unit/policyfile_services/export_repo_spec.rb +478 -478
  356. data/spec/unit/policyfile_services/install_spec.rb +209 -209
  357. data/spec/unit/policyfile_services/push_archive_spec.rb +374 -374
  358. data/spec/unit/policyfile_services/push_spec.rb +249 -249
  359. data/spec/unit/policyfile_services/rm_policy_group_spec.rb +237 -237
  360. data/spec/unit/policyfile_services/rm_policy_spec.rb +263 -263
  361. data/spec/unit/policyfile_services/show_policy_spec.rb +887 -887
  362. data/spec/unit/policyfile_services/undelete_spec.rb +302 -302
  363. data/spec/unit/policyfile_services/update_attributes_spec.rb +229 -229
  364. data/spec/unit/policyfile_services/update_spec.rb +140 -140
  365. data/spec/unit/service_exception_inspectors/base_spec.rb +41 -41
  366. data/spec/unit/service_exception_inspectors/http_spec.rb +138 -138
  367. data/spec/unit/shell_out_spec.rb +34 -34
  368. data/tasks/announce.rb +57 -57
  369. data/tasks/bin/bundle-platform.bat +2 -2
  370. data/tasks/dependencies.rb +89 -89
  371. data/tasks/templates/prerelease.md.erb +35 -35
  372. data/tasks/templates/release.md.erb +34 -34
  373. data/warning.txt +9 -9
  374. metadata +5 -5
@@ -1,159 +1,159 @@
1
- #
2
- # Copyright:: Copyright (c) 2017 Chef Software Inc.
3
- # License:: Apache License, Version 2.0
4
- #
5
- # Licensed under the Apache License, Version 2.0 (the "License");
6
- # you may not use this file except in compliance with the License.
7
- # You may obtain a copy of the License at
8
- #
9
- # http://www.apache.org/licenses/LICENSE-2.0
10
- #
11
- # Unless required by applicable law or agreed to in writing, software
12
- # distributed under the License is distributed on an "AS IS" BASIS,
13
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
- # See the License for the specific language governing permissions and
15
- # limitations under the License.
16
- #
17
-
18
- require "spec_helper"
19
- require "chef-dk/policyfile_compiler"
20
- require "chef-dk/exceptions"
21
-
22
- describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
23
-
24
- let(:run_list) { ["local::default"] }
25
- let(:included_policies) { [] }
26
-
27
- let(:policyfile) do
28
- policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
29
-
30
- p.run_list(*run_list)
31
- included_policies.each do |policy|
32
- p.include_policy(policy[0], policy[1])
33
- end
34
- end
35
-
36
- policyfile
37
- end
38
-
39
- describe "when include_policy specifies a policy on disk" do
40
- describe "and the included policy is correctly configured" do
41
- let(:included_policies) { [["foo", { path: "./foo.lock.json" }]] }
42
-
43
- it "has a included policy" do
44
- expect(policyfile.included_policies.length).to eq(1)
45
- end
46
-
47
- it "uses a local fetcher" do
48
- expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::LocalLockFetcher)
49
- end
50
-
51
- it "has a fetcher with no errors" do
52
- expect(policyfile.included_policies[0].fetcher.errors).to eq([])
53
- end
54
-
55
- it "has a fetcher that is valid" do
56
- expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
57
- end
58
- end
59
-
60
- end
61
-
62
- describe "when include_policy specifies a policy on a chef server" do
63
- let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo" }]] }
64
- describe "and policy_revision_id and policy_group are missing" do
65
- it "has a dsl with errors" do
66
- expect(policyfile.dsl.errors.length).to eq(1)
67
- expect(policyfile.dsl.errors[0]).to match(/policy_revision_id/)
68
- expect(policyfile.dsl.errors[0]).to match(/policy_group/)
69
- end
70
- end
71
-
72
- describe "and the policy name is missing" do
73
- let(:included_policies) { [["foo", { server: "http://example.com", policy_revision_id: "bar" }]] }
74
- it "has no errors" do
75
- expect(policyfile.dsl.errors.length).to eq(0)
76
- end
77
- end
78
-
79
- describe "and everything is correctly configured" do
80
- context "using policy_revision_id" do
81
- let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_revision_id: "bar" }]] }
82
- it "has a dsl with no errors" do
83
- expect(policyfile.dsl.errors.length).to eq(0)
84
- end
85
-
86
- it "has a included policy" do
87
- expect(policyfile.included_policies.length).to eq(1)
88
- end
89
-
90
- it "uses a server fetcher" do
91
- expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
92
- end
93
-
94
- it "has a fetcher with no errors" do
95
- expect(policyfile.included_policies[0].fetcher.errors).to eq([])
96
- end
97
-
98
- it "has a fetcher that is valid" do
99
- expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
100
- end
101
- end
102
- end
103
-
104
- context "using policy_group" do
105
- let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_group: "bar" }]] }
106
- it "has a dsl with no errors" do
107
- expect(policyfile.dsl.errors.length).to eq(0)
108
- end
109
-
110
- it "has a included policy" do
111
- expect(policyfile.included_policies.length).to eq(1)
112
- end
113
-
114
- it "uses a server fetcher" do
115
- expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
116
- end
117
-
118
- it "has a fetcher with no errors" do
119
- expect(policyfile.included_policies[0].fetcher.errors).to eq([])
120
- end
121
-
122
- it "has a fetcher that is valid" do
123
- expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
124
- end
125
- end
126
- end
127
-
128
- describe "when include_policy specifies a policy fetched with an unknown method" do
129
- let(:included_policies) { [["foo", { foofetch: "bar" }]] }
130
-
131
- it "has a included policy" do
132
- expect(policyfile.included_policies.length).to eq(1)
133
- end
134
-
135
- it "has a dsl with an errors" do
136
- expect(policyfile.dsl.errors.length).to eq(1)
137
- expect(policyfile.dsl.errors[0]).to match(/include_policy must use one of the following/)
138
- end
139
-
140
- it "errors when trying to get the fetcher" do
141
- expect { policyfile.included_policies[0].fetcher }.to raise_error(ChefDK::InvalidPolicyfileLocation)
142
- end
143
- end
144
-
145
- describe "when a policy with the same name is specified multiple times" do
146
- let(:included_policies) do
147
- [
148
- ["foo", { path: "./foo.lock.json" }],
149
- ["foo", { path: "./foo.lock.json" }],
150
- ]
151
- end
152
-
153
- it "has a dsl with errors" do
154
- expect(policyfile.dsl.errors.length).to eq(1)
155
- expect(policyfile.dsl.errors[0]).to match(/assigned conflicting locations/)
156
- end
157
- end
158
-
159
- end
1
+ #
2
+ # Copyright:: Copyright (c) 2017 Chef Software Inc.
3
+ # License:: Apache License, Version 2.0
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+
18
+ require "spec_helper"
19
+ require "chef-dk/policyfile_compiler"
20
+ require "chef-dk/exceptions"
21
+
22
+ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
23
+
24
+ let(:run_list) { ["local::default"] }
25
+ let(:included_policies) { [] }
26
+
27
+ let(:policyfile) do
28
+ policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
29
+
30
+ p.run_list(*run_list)
31
+ included_policies.each do |policy|
32
+ p.include_policy(policy[0], policy[1])
33
+ end
34
+ end
35
+
36
+ policyfile
37
+ end
38
+
39
+ describe "when include_policy specifies a policy on disk" do
40
+ describe "and the included policy is correctly configured" do
41
+ let(:included_policies) { [["foo", { path: "./foo.lock.json" }]] }
42
+
43
+ it "has a included policy" do
44
+ expect(policyfile.included_policies.length).to eq(1)
45
+ end
46
+
47
+ it "uses a local fetcher" do
48
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::LocalLockFetcher)
49
+ end
50
+
51
+ it "has a fetcher with no errors" do
52
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
53
+ end
54
+
55
+ it "has a fetcher that is valid" do
56
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
57
+ end
58
+ end
59
+
60
+ end
61
+
62
+ describe "when include_policy specifies a policy on a chef server" do
63
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo" }]] }
64
+ describe "and policy_revision_id and policy_group are missing" do
65
+ it "has a dsl with errors" do
66
+ expect(policyfile.dsl.errors.length).to eq(1)
67
+ expect(policyfile.dsl.errors[0]).to match(/policy_revision_id/)
68
+ expect(policyfile.dsl.errors[0]).to match(/policy_group/)
69
+ end
70
+ end
71
+
72
+ describe "and the policy name is missing" do
73
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_revision_id: "bar" }]] }
74
+ it "has no errors" do
75
+ expect(policyfile.dsl.errors.length).to eq(0)
76
+ end
77
+ end
78
+
79
+ describe "and everything is correctly configured" do
80
+ context "using policy_revision_id" do
81
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_revision_id: "bar" }]] }
82
+ it "has a dsl with no errors" do
83
+ expect(policyfile.dsl.errors.length).to eq(0)
84
+ end
85
+
86
+ it "has a included policy" do
87
+ expect(policyfile.included_policies.length).to eq(1)
88
+ end
89
+
90
+ it "uses a server fetcher" do
91
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
92
+ end
93
+
94
+ it "has a fetcher with no errors" do
95
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
96
+ end
97
+
98
+ it "has a fetcher that is valid" do
99
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
100
+ end
101
+ end
102
+ end
103
+
104
+ context "using policy_group" do
105
+ let(:included_policies) { [["foo", { server: "http://example.com", policy_name: "foo", policy_group: "bar" }]] }
106
+ it "has a dsl with no errors" do
107
+ expect(policyfile.dsl.errors.length).to eq(0)
108
+ end
109
+
110
+ it "has a included policy" do
111
+ expect(policyfile.included_policies.length).to eq(1)
112
+ end
113
+
114
+ it "uses a server fetcher" do
115
+ expect(policyfile.included_policies[0].fetcher).to be_a(ChefDK::Policyfile::ChefServerLockFetcher)
116
+ end
117
+
118
+ it "has a fetcher with no errors" do
119
+ expect(policyfile.included_policies[0].fetcher.errors).to eq([])
120
+ end
121
+
122
+ it "has a fetcher that is valid" do
123
+ expect(policyfile.included_policies[0].fetcher.valid?).to eq(true)
124
+ end
125
+ end
126
+ end
127
+
128
+ describe "when include_policy specifies a policy fetched with an unknown method" do
129
+ let(:included_policies) { [["foo", { foofetch: "bar" }]] }
130
+
131
+ it "has a included policy" do
132
+ expect(policyfile.included_policies.length).to eq(1)
133
+ end
134
+
135
+ it "has a dsl with an errors" do
136
+ expect(policyfile.dsl.errors.length).to eq(1)
137
+ expect(policyfile.dsl.errors[0]).to match(/include_policy must use one of the following/)
138
+ end
139
+
140
+ it "errors when trying to get the fetcher" do
141
+ expect { policyfile.included_policies[0].fetcher }.to raise_error(ChefDK::InvalidPolicyfileLocation)
142
+ end
143
+ end
144
+
145
+ describe "when a policy with the same name is specified multiple times" do
146
+ let(:included_policies) do
147
+ [
148
+ ["foo", { path: "./foo.lock.json" }],
149
+ ["foo", { path: "./foo.lock.json" }],
150
+ ]
151
+ end
152
+
153
+ it "has a dsl with errors" do
154
+ expect(policyfile.dsl.errors.length).to eq(1)
155
+ expect(policyfile.dsl.errors[0]).to match(/assigned conflicting locations/)
156
+ end
157
+ end
158
+
159
+ end
@@ -1,720 +1,720 @@
1
- # -*- coding: UTF-8 -*-
2
- #
3
- # Copyright:: Copyright (c) 2014 Chef Software Inc.
4
- # License:: Apache License, Version 2.0
5
- #
6
- # Licensed under the Apache License, Version 2.0 (the "License");
7
- # you may not use this file except in compliance with the License.
8
- # You may obtain a copy of the License at
9
- #
10
- # http://www.apache.org/licenses/LICENSE-2.0
11
- #
12
- # Unless required by applicable law or agreed to in writing, software
13
- # distributed under the License is distributed on an "AS IS" BASIS,
14
- # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
- # See the License for the specific language governing permissions and
16
- # limitations under the License.
17
- #
18
-
19
- require "spec_helper"
20
- require "chef-dk/policyfile_compiler"
21
- require "chef-dk/exceptions"
22
-
23
- describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
24
-
25
- def expand_run_list(r)
26
- r.map do |item|
27
- "recipe[#{item}]"
28
- end
29
- end
30
-
31
- let(:run_list) { ["local::default"] }
32
- let(:run_list_expanded) { expand_run_list(run_list) }
33
- let(:named_run_list) { {} }
34
- let(:named_run_list_expanded) do
35
- named_run_list.inject({}) do |acc, (key, val)|
36
- acc[key] = expand_run_list(val)
37
- acc
38
- end
39
- end
40
- let(:default_attributes) { {} }
41
- let(:override_attributes) { {} }
42
-
43
- let(:default_source) { nil }
44
-
45
- let(:external_cookbook_universe) do
46
- {
47
- "cookbookA" => {
48
- "1.0.0" => [ ],
49
- "2.0.0" => [ ],
50
- },
51
- "cookbookB" => {
52
- "1.0.0" => [ ],
53
- "2.0.0" => [ ],
54
- },
55
- "cookbookC" => {
56
- "1.0.0" => [ ],
57
- "2.0.0" => [ ],
58
- },
59
- "local" => {
60
- "1.0.0" => [ ["cookbookC", "= 1.0.0" ] ],
61
- },
62
- "local_easy" => {
63
- "1.0.0" => [ ["cookbookC", "= 2.0.0" ] ],
64
- },
65
- }
66
- end
67
-
68
- let(:included_policy_default_attributes) { {} }
69
- let(:included_policy_override_attributes) { {} }
70
- let(:included_policy_expanded_named_runlist) { nil }
71
- let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
72
- let(:included_policy_cookbooks) do
73
- [
74
- {
75
- name: "cookbookA",
76
- version: "2.0.0",
77
- },
78
- ]
79
- end
80
-
81
- let(:included_policy_lock_data) do
82
- cookbook_locks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
83
- acc[cookbook_info[:name]] = {
84
- "version" => cookbook_info[:version],
85
- "identifier" => "identifier",
86
- "dotted_decimal_identifier" => "dotted_decimal_identifier",
87
- "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
88
- "origin" => "uri",
89
- "source_options" => {},
90
- }
91
- acc
92
- end
93
-
94
- solution_dependencies_lock = included_policy_cookbooks.map do |cookbook_info|
95
- [cookbook_info[:name], cookbook_info[:version]]
96
- end
97
-
98
- solution_dependencies_cookbooks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
99
- acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
100
- acc
101
- end
102
-
103
- {
104
- "name" => "included_policyfile",
105
- "revision_id" => "myrevisionid",
106
- "run_list" => included_policy_expanded_runlist,
107
- "cookbook_locks" => cookbook_locks,
108
- "default_attributes" => included_policy_default_attributes,
109
- "override_attributes" => included_policy_override_attributes,
110
- "solution_dependencies" => {
111
- "Policyfile" => solution_dependencies_lock,
112
- "dependencies" => solution_dependencies_cookbooks,
113
- },
114
- }.tap do |core|
115
- core["named_run_lists"] = included_policy_expanded_named_runlist if included_policy_expanded_named_runlist
116
- end
117
- end
118
-
119
- let(:included_policy_lock_name) { "included" }
120
- let(:included_policy_fetcher) do
121
- instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
122
- allow(double).to receive(:lock_data).and_return(included_policy_lock_data)
123
- allow(double).to receive(:valid?).and_return(true)
124
- allow(double).to receive(:errors).and_return([])
125
- end
126
- end
127
-
128
- let(:lock_source_options) { { :path => "somelocation" } }
129
- let(:included_policy_lock_spec) do
130
- ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_lock_name, lock_source_options, nil).tap do |spec|
131
- allow(spec).to receive(:valid?).and_return(true)
132
- allow(spec).to receive(:fetcher).and_return(included_policy_fetcher)
133
- allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
134
- end
135
- end
136
-
137
- let (:included_policies) { [] }
138
-
139
- let(:policyfile) do
140
- policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
141
- if default_source
142
- p.default_source.replace([default_source])
143
- else
144
- allow(p.default_source.first).to receive(:universe_graph).and_return(external_cookbook_universe)
145
- allow(p.default_source.first).to receive(:null?).and_return(false)
146
- end
147
- p.run_list(*run_list)
148
-
149
- named_run_list.each do |name, run_list|
150
- p.named_run_list(name, *run_list)
151
- end
152
-
153
- default_attributes.each do |(name, value)|
154
- p.default[name] = value
155
- end
156
-
157
- override_attributes.each do |(name, value)|
158
- p.override[name] = value
159
- end
160
-
161
- allow(p).to receive(:included_policies).and_return(included_policies)
162
- end
163
-
164
- policyfile
165
- end
166
-
167
- let(:policyfile_lock) do
168
- policyfile.lock
169
- end
170
-
171
- context "when no policies are included" do
172
-
173
- it "does not emit included policies information in the lockfile" do
174
- expect(policyfile_lock.to_lock["included_policies"]).to eq(nil)
175
- end
176
-
177
- end
178
-
179
- context "when one policy is included" do
180
-
181
- let(:included_policies) { [included_policy_lock_spec] }
182
-
183
- # currently you must have a run list in a policyfile, but it should now
184
- # become possible to make a combo-policy just by combining other policies
185
- context "when the including policy does not have a run list" do
186
- let(:run_list) { [] }
187
-
188
- it "emits a lockfile with an identical run list as the included policy" do
189
- expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist)
190
- end
191
-
192
- end
193
-
194
- context "when the including policy has a run list" do
195
-
196
- it "appends run list items from the including policy to the included policy's run list, removing duplicates" do
197
- expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist + run_list_expanded)
198
- end
199
-
200
- end
201
-
202
- context "when the policies have named run lists" do
203
-
204
- let(:included_policy_expanded_named_runlist) do
205
- {
206
- "shared" => ["recipe[cookbookA::included]"],
207
- }
208
- end
209
-
210
- context "and no named run lists are shared between the including and included policy" do
211
-
212
- let(:named_run_list) do
213
- {
214
- "local" => ["local::foo"],
215
- }
216
- end
217
-
218
- it "preserves the named run lists as given in both policies" do
219
- expect(policyfile_lock.to_lock["named_run_lists"]).to include(included_policy_expanded_named_runlist, named_run_list_expanded)
220
- end
221
-
222
- end
223
-
224
- context "and some named run lists are shared between the including and included policy" do
225
-
226
- let(:named_run_list) do
227
- {
228
- "shared" => ["local::foo"],
229
- }
230
- end
231
-
232
- it "appends run lists items from the including policy's run lists to the included policy's run lists" do
233
- expect(policyfile_lock.to_lock["named_run_lists"]["shared"]).to eq(included_policy_expanded_named_runlist["shared"] + named_run_list_expanded["shared"])
234
- end
235
-
236
- end
237
-
238
- end
239
-
240
- context "when no cookbooks are shared as dependencies or transitive dependencies" do
241
- let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
242
- let(:run_list) { ["cookbookA::default"] }
243
-
244
- it "does not raise a have conflicting dependency requirements error" do
245
- expect { policyfile_lock.to_lock }.not_to raise_error
246
- end
247
-
248
- it "emits a lockfile where cookbooks pulled from the upstream are at identical versions" do
249
- expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
250
- have_key("cookbookC (2.0.0)"))
251
- end
252
- end
253
-
254
- context "when some cookbooks are shared as dependencies or transitive dependencies" do
255
- let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
256
- let(:included_policy_cookbooks) do
257
- [
258
- {
259
- name: "cookbookC",
260
- version: "2.0.0",
261
- },
262
- ]
263
- end
264
-
265
- context "and the including policy does not specify any sources" do
266
- let(:run_list) { [] }
267
- it "it defaults to those provided in the included policy lock" do
268
- expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
269
- have_key("cookbookC (2.0.0)"))
270
- end
271
- end
272
-
273
- context "and the including policy specifies a source that is equivalent to the included policy" do
274
- let(:run_list) { [] }
275
- let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
276
-
277
- before do
278
- allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
279
- allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({})
280
- allow(default_source).to receive(:null?).and_return(false)
281
- allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
282
- allow(default_source).to receive(:desc).and_return("source double")
283
- end
284
-
285
- it "it defaults to those provided in the included policy lock" do
286
- expect { policyfile_lock.to_lock }.not_to raise_error
287
- end
288
- end
289
-
290
- context "and the including policy specifies a source that is not equivalent to the included policy" do
291
- let(:run_list) { [] }
292
- let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
293
-
294
- before do
295
- allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
296
- allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({ "foo" => "bar" })
297
- allow(default_source).to receive(:null?).and_return(false)
298
- allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
299
- allow(default_source).to receive(:desc).and_return("source double")
300
- end
301
-
302
- it "it raises an error" do
303
- expect { policyfile_lock.to_lock }.to raise_error(ChefDK::IncludePolicyCookbookSourceConflict)
304
- end
305
- end
306
-
307
- context "and the including policy's dependencies can be solved with the included policy's locks" do
308
- let(:run_list) { ["local_easy::default"] }
309
-
310
- it "solves the dependencies added by the top-level policyfile and emits them in the lockfile" do
311
- expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
312
- have_key("cookbookC (2.0.0)"))
313
- end
314
-
315
- end
316
-
317
- context "and the including policy's dependencies cannot be solved with the included policy's locks" do
318
- let(:run_list) { ["local::default"] }
319
-
320
- it "raises an error describing the conflict" do
321
- expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError)
322
- end
323
-
324
- it "includes the source of the conflicting dependency constraint from the including policy" do
325
- expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError) do |e|
326
- expect(e.to_s).to match(/`cookbookC \(= 2.0.0\)`/) # This one comes from the included policy
327
- expect(e.to_s).to match(/`cookbookC \(= 1.0.0\)` required by `local-1.0.0`/) # This one comes from the included policy
328
- end
329
- end
330
- end
331
- end
332
-
333
- context "when default attributes are specified" do
334
- let(:default_attributes) do
335
- {
336
- "shared" => {
337
- "foo" => "bar",
338
- },
339
- }
340
- end
341
-
342
- context "when the included policy does not have attributes that conflict with the including policy" do
343
- let(:included_policy_default_attributes) do
344
- {
345
- "not_shared" => {
346
- "foo" => "bar",
347
- },
348
- }
349
- end
350
-
351
- it "emits a lockfile with the attributes from both merged" do
352
- expect(policyfile_lock.to_lock["default_attributes"]).to include(included_policy_default_attributes, default_attributes)
353
- end
354
-
355
- end
356
-
357
- context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
358
- let(:included_policy_default_attributes) { default_attributes }
359
-
360
- it "emits a lockfile with the attributes from both merged" do
361
- expect(policyfile_lock.to_lock["default_attributes"]).to eq(default_attributes)
362
- end
363
-
364
- end
365
-
366
- context "when the included policy has attributes that conflict with the including policy's attributes" do
367
- let(:included_policy_default_attributes) do
368
- {
369
- "shared" => {
370
- "foo" => "not_bar",
371
- },
372
- }
373
- end
374
-
375
- it "raises an error describing all attribute conflicts" do
376
- expect { policyfile_lock.to_lock }.to raise_error(
377
- ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
378
- "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
379
- end
380
- end
381
- end
382
-
383
- context "when override attributes are specified" do
384
- let(:override_attributes) do
385
- {
386
- "shared" => {
387
- "foo" => "bar",
388
- },
389
- }
390
- end
391
-
392
- context "when the included policy does not have attributes that conflict with the including policy" do
393
- let(:included_policy_override_attributes) do
394
- {
395
- "not_shared" => {
396
- "foo" => "bar",
397
- },
398
- }
399
- end
400
-
401
- it "emits a lockfile with the attributes from both merged" do
402
- expect(policyfile_lock.to_lock["override_attributes"]).to include(included_policy_override_attributes, override_attributes)
403
- end
404
-
405
- end
406
-
407
- context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
408
- let(:included_policy_override_attributes) { override_attributes }
409
-
410
- it "emits a lockfile with the attributes from both merged" do
411
- expect(policyfile_lock.to_lock["override_attributes"]).to eq(override_attributes)
412
- end
413
-
414
- end
415
-
416
- context "when the included policy has attributes that conflict with the including policy's attributes" do
417
- let(:included_policy_override_attributes) do
418
- {
419
- "shared" => {
420
- "foo" => "not_bar",
421
- },
422
- }
423
- end
424
-
425
- it "raises an error describing all attribute conflicts" do
426
- expect { policyfile_lock.to_lock }.to raise_error(
427
- ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
428
- "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
429
- end
430
- end
431
- end
432
- end
433
-
434
- context "when several policies are included" do
435
- let(:included_policy_2_default_attributes) { {} }
436
- let(:included_policy_2_override_attributes) { {} }
437
- let(:included_policy_2_expanded_named_runlist) { nil }
438
- let(:included_policy_2_expanded_runlist) { ["recipe[cookbookA::default]"] }
439
- let(:included_policy_2_cookbooks) do
440
- [
441
- {
442
- name: "cookbookA",
443
- version: "2.0.0",
444
- },
445
- ]
446
- end
447
-
448
- let(:included_policy_2_lock_data) do
449
- cookbook_locks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
450
- acc[cookbook_info[:name]] = {
451
- "version" => cookbook_info[:version],
452
- "identifier" => "identifier",
453
- "dotted_decimal_identifier" => "dotted_decimal_identifier",
454
- "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
455
- "origin" => "uri",
456
- "source_options" => {},
457
- }
458
- acc
459
- end
460
-
461
- solution_dependencies_lock = included_policy_2_cookbooks.map do |cookbook_info|
462
- [cookbook_info[:name], cookbook_info[:version]]
463
- end
464
-
465
- solution_dependencies_cookbooks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
466
- acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
467
- acc
468
- end
469
-
470
- {
471
- "name" => "included_policy_2file",
472
- "revision_id" => "myrevisionid",
473
- "run_list" => included_policy_2_expanded_runlist,
474
- "cookbook_locks" => cookbook_locks,
475
- "default_attributes" => included_policy_2_default_attributes,
476
- "override_attributes" => included_policy_2_override_attributes,
477
- "solution_dependencies" => {
478
- "Policyfile" => solution_dependencies_lock,
479
- "dependencies" => solution_dependencies_cookbooks,
480
- },
481
- }.tap do |core|
482
- core["named_run_lists"] = included_policy_2_expanded_named_runlist if included_policy_2_expanded_named_runlist
483
- end
484
- end
485
-
486
- let(:included_policy_2_lock_name) { "included2" }
487
- let(:included_policy_2_fetcher) do
488
- instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
489
- allow(double).to receive(:lock_data).and_return(included_policy_2_lock_data)
490
- allow(double).to receive(:valid?).and_return(true)
491
- allow(double).to receive(:errors).and_return([])
492
- end
493
- end
494
-
495
- let(:included_policy_2_lock_spec) do
496
- ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_2_lock_name, lock_source_options, nil).tap do |spec|
497
- allow(spec).to receive(:valid?).and_return(true)
498
- allow(spec).to receive(:fetcher).and_return(included_policy_2_fetcher)
499
- allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
500
- end
501
- end
502
-
503
- let(:included_policies) { [included_policy_lock_spec, included_policy_2_lock_spec] }
504
-
505
- let(:run_list) { ["local::default"] }
506
-
507
- context "when no cookbooks are shared as dependencies or transitive dependencies by included policies" do
508
- let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
509
- let(:included_policy_cookbooks) do
510
- [
511
- {
512
- name: "cookbookA",
513
- version: "2.0.0",
514
- },
515
- ]
516
- end
517
-
518
- let(:included_policy_2_expanded_runlist) { ["recipe[cookbookB::default]"] }
519
- let(:included_policy_2_cookbooks) do
520
- [
521
- {
522
- name: "cookbookB",
523
- version: "2.0.0",
524
- },
525
- ]
526
- end
527
-
528
- it "does not raise a have conflicting dependency requirements error" do
529
- expect { policyfile_lock.to_lock }.not_to raise_error
530
- end
531
-
532
- it "emits a lockfile with the correct dependencies" do
533
- expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
534
- "cookbookA (2.0.0)" => [],
535
- "cookbookB (2.0.0)" => [],
536
- "cookbookC (1.0.0)" => [],
537
- "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
538
- })
539
- end
540
- end
541
-
542
- context "when some cookbooks appear as dependencies or transitive dependencies of some included policies" do
543
- let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
544
- let(:included_policy_2_expanded_runlist) { ["recipe[cookbookC::default]"] }
545
-
546
- context "and the locked versions of the cookbooks match" do
547
- let(:included_policy_cookbooks) do
548
- [
549
- {
550
- name: "cookbookC",
551
- version: "1.0.0",
552
- },
553
- ]
554
- end
555
-
556
- let(:included_policy_2_cookbooks) do
557
- [
558
- {
559
- name: "cookbookC",
560
- version: "1.0.0",
561
- },
562
- ]
563
- end
564
-
565
- it "solves the dependencies with the matching versions" do
566
- expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
567
- "cookbookC (1.0.0)" => [],
568
- "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
569
- })
570
- end
571
- end
572
-
573
- context "and the locked versions of the cookbooks do not match" do
574
- let(:included_policy_cookbooks) do
575
- [
576
- {
577
- name: "cookbookC",
578
- version: "1.0.0",
579
- },
580
- ]
581
- end
582
-
583
- let(:included_policy_2_cookbooks) do
584
- [
585
- {
586
- name: "cookbookC",
587
- version: "2.0.0",
588
- },
589
- ]
590
- end
591
-
592
- it "raises an error describing the conflict" do
593
- expect { policyfile_lock }.to raise_error(
594
- ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookVersions,
595
- /Multiple versions provided for cookbook cookbookC/
596
- )
597
- end
598
- end
599
- end
600
-
601
- context "when default attributes are specified" do
602
- context "when the included policies do not have conflicting attributes" do
603
- let(:included_policy_default_attributes) do
604
- {
605
- "not_conflict" => {
606
- "foo" => "bar",
607
- },
608
- }
609
- end
610
- let(:included_policy_2_default_attributes) do
611
- {
612
- "not_conflict" => {
613
- "foo" => "bar",
614
- },
615
- }
616
- end
617
- let(:default_attributes) do
618
- {
619
- "not_conflict" => {
620
- "bar" => "baz",
621
- },
622
- }
623
- end
624
-
625
- it "emits a lockfile with the included policies' attributes merged" do
626
- expect(policyfile_lock.to_lock["default_attributes"]).to eq({
627
- "not_conflict" => {
628
- "foo" => "bar",
629
- "bar" => "baz",
630
- },
631
- })
632
- end
633
- end
634
-
635
- context "when the included policies have conflicting attributes" do
636
- let(:included_policy_default_attributes) do
637
- {
638
- "conflict" => {
639
- "foo" => "bar",
640
- },
641
- }
642
- end
643
-
644
- let(:included_policy_2_default_attributes) do
645
- {
646
- "conflict" => {
647
- "foo" => "baz",
648
- },
649
- }
650
- end
651
-
652
- it "raises an error describing the conflict" do
653
- expect { policyfile_lock }.to raise_error(
654
- ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
655
- "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
656
- end
657
- end
658
- end
659
-
660
- context "when override attributes are specified" do
661
- context "when the included policies do not have conflicting attributes" do
662
- let(:included_policy_override_attributes) do
663
- {
664
- "not_conflict" => {
665
- "foo" => "bar",
666
- },
667
- }
668
- end
669
- let(:included_policy_2_override_attributes) do
670
- {
671
- "not_conflict" => {
672
- "foo" => "bar",
673
- },
674
- }
675
- end
676
- let(:override_attributes) do
677
- {
678
- "not_conflict" => {
679
- "bar" => "baz",
680
- },
681
- }
682
- end
683
-
684
- it "emits a lockfile with the included policies' attributes merged" do
685
- expect(policyfile_lock.to_lock["override_attributes"]).to eq({
686
- "not_conflict" => {
687
- "foo" => "bar",
688
- "bar" => "baz",
689
- },
690
- })
691
- end
692
- end
693
-
694
- context "when the included policies have conflicting attributes" do
695
- let(:included_policy_override_attributes) do
696
- {
697
- "conflict" => {
698
- "foo" => "bar",
699
- },
700
- }
701
- end
702
-
703
- let(:included_policy_2_override_attributes) do
704
- {
705
- "conflict" => {
706
- "foo" => "baz",
707
- },
708
- }
709
- end
710
-
711
- it "raises an error describing the conflict" do
712
- expect { policyfile_lock }.to raise_error(
713
- ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
714
- "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
715
- end
716
- end
717
- end
718
-
719
- end
720
- end
1
+ # -*- coding: UTF-8 -*-
2
+ #
3
+ # Copyright:: Copyright (c) 2014 Chef Software Inc.
4
+ # License:: Apache License, Version 2.0
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+
19
+ require "spec_helper"
20
+ require "chef-dk/policyfile_compiler"
21
+ require "chef-dk/exceptions"
22
+
23
+ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
24
+
25
+ def expand_run_list(r)
26
+ r.map do |item|
27
+ "recipe[#{item}]"
28
+ end
29
+ end
30
+
31
+ let(:run_list) { ["local::default"] }
32
+ let(:run_list_expanded) { expand_run_list(run_list) }
33
+ let(:named_run_list) { {} }
34
+ let(:named_run_list_expanded) do
35
+ named_run_list.inject({}) do |acc, (key, val)|
36
+ acc[key] = expand_run_list(val)
37
+ acc
38
+ end
39
+ end
40
+ let(:default_attributes) { {} }
41
+ let(:override_attributes) { {} }
42
+
43
+ let(:default_source) { nil }
44
+
45
+ let(:external_cookbook_universe) do
46
+ {
47
+ "cookbookA" => {
48
+ "1.0.0" => [ ],
49
+ "2.0.0" => [ ],
50
+ },
51
+ "cookbookB" => {
52
+ "1.0.0" => [ ],
53
+ "2.0.0" => [ ],
54
+ },
55
+ "cookbookC" => {
56
+ "1.0.0" => [ ],
57
+ "2.0.0" => [ ],
58
+ },
59
+ "local" => {
60
+ "1.0.0" => [ ["cookbookC", "= 1.0.0" ] ],
61
+ },
62
+ "local_easy" => {
63
+ "1.0.0" => [ ["cookbookC", "= 2.0.0" ] ],
64
+ },
65
+ }
66
+ end
67
+
68
+ let(:included_policy_default_attributes) { {} }
69
+ let(:included_policy_override_attributes) { {} }
70
+ let(:included_policy_expanded_named_runlist) { nil }
71
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
72
+ let(:included_policy_cookbooks) do
73
+ [
74
+ {
75
+ name: "cookbookA",
76
+ version: "2.0.0",
77
+ },
78
+ ]
79
+ end
80
+
81
+ let(:included_policy_lock_data) do
82
+ cookbook_locks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
83
+ acc[cookbook_info[:name]] = {
84
+ "version" => cookbook_info[:version],
85
+ "identifier" => "identifier",
86
+ "dotted_decimal_identifier" => "dotted_decimal_identifier",
87
+ "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
88
+ "origin" => "uri",
89
+ "source_options" => {},
90
+ }
91
+ acc
92
+ end
93
+
94
+ solution_dependencies_lock = included_policy_cookbooks.map do |cookbook_info|
95
+ [cookbook_info[:name], cookbook_info[:version]]
96
+ end
97
+
98
+ solution_dependencies_cookbooks = included_policy_cookbooks.inject({}) do |acc, cookbook_info|
99
+ acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
100
+ acc
101
+ end
102
+
103
+ {
104
+ "name" => "included_policyfile",
105
+ "revision_id" => "myrevisionid",
106
+ "run_list" => included_policy_expanded_runlist,
107
+ "cookbook_locks" => cookbook_locks,
108
+ "default_attributes" => included_policy_default_attributes,
109
+ "override_attributes" => included_policy_override_attributes,
110
+ "solution_dependencies" => {
111
+ "Policyfile" => solution_dependencies_lock,
112
+ "dependencies" => solution_dependencies_cookbooks,
113
+ },
114
+ }.tap do |core|
115
+ core["named_run_lists"] = included_policy_expanded_named_runlist if included_policy_expanded_named_runlist
116
+ end
117
+ end
118
+
119
+ let(:included_policy_lock_name) { "included" }
120
+ let(:included_policy_fetcher) do
121
+ instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
122
+ allow(double).to receive(:lock_data).and_return(included_policy_lock_data)
123
+ allow(double).to receive(:valid?).and_return(true)
124
+ allow(double).to receive(:errors).and_return([])
125
+ end
126
+ end
127
+
128
+ let(:lock_source_options) { { :path => "somelocation" } }
129
+ let(:included_policy_lock_spec) do
130
+ ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_lock_name, lock_source_options, nil).tap do |spec|
131
+ allow(spec).to receive(:valid?).and_return(true)
132
+ allow(spec).to receive(:fetcher).and_return(included_policy_fetcher)
133
+ allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
134
+ end
135
+ end
136
+
137
+ let (:included_policies) { [] }
138
+
139
+ let(:policyfile) do
140
+ policyfile = ChefDK::PolicyfileCompiler.new.build do |p|
141
+ if default_source
142
+ p.default_source.replace([default_source])
143
+ else
144
+ allow(p.default_source.first).to receive(:universe_graph).and_return(external_cookbook_universe)
145
+ allow(p.default_source.first).to receive(:null?).and_return(false)
146
+ end
147
+ p.run_list(*run_list)
148
+
149
+ named_run_list.each do |name, run_list|
150
+ p.named_run_list(name, *run_list)
151
+ end
152
+
153
+ default_attributes.each do |(name, value)|
154
+ p.default[name] = value
155
+ end
156
+
157
+ override_attributes.each do |(name, value)|
158
+ p.override[name] = value
159
+ end
160
+
161
+ allow(p).to receive(:included_policies).and_return(included_policies)
162
+ end
163
+
164
+ policyfile
165
+ end
166
+
167
+ let(:policyfile_lock) do
168
+ policyfile.lock
169
+ end
170
+
171
+ context "when no policies are included" do
172
+
173
+ it "does not emit included policies information in the lockfile" do
174
+ expect(policyfile_lock.to_lock["included_policies"]).to eq(nil)
175
+ end
176
+
177
+ end
178
+
179
+ context "when one policy is included" do
180
+
181
+ let(:included_policies) { [included_policy_lock_spec] }
182
+
183
+ # currently you must have a run list in a policyfile, but it should now
184
+ # become possible to make a combo-policy just by combining other policies
185
+ context "when the including policy does not have a run list" do
186
+ let(:run_list) { [] }
187
+
188
+ it "emits a lockfile with an identical run list as the included policy" do
189
+ expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist)
190
+ end
191
+
192
+ end
193
+
194
+ context "when the including policy has a run list" do
195
+
196
+ it "appends run list items from the including policy to the included policy's run list, removing duplicates" do
197
+ expect(policyfile_lock.to_lock["run_list"]).to eq(included_policy_expanded_runlist + run_list_expanded)
198
+ end
199
+
200
+ end
201
+
202
+ context "when the policies have named run lists" do
203
+
204
+ let(:included_policy_expanded_named_runlist) do
205
+ {
206
+ "shared" => ["recipe[cookbookA::included]"],
207
+ }
208
+ end
209
+
210
+ context "and no named run lists are shared between the including and included policy" do
211
+
212
+ let(:named_run_list) do
213
+ {
214
+ "local" => ["local::foo"],
215
+ }
216
+ end
217
+
218
+ it "preserves the named run lists as given in both policies" do
219
+ expect(policyfile_lock.to_lock["named_run_lists"]).to include(included_policy_expanded_named_runlist, named_run_list_expanded)
220
+ end
221
+
222
+ end
223
+
224
+ context "and some named run lists are shared between the including and included policy" do
225
+
226
+ let(:named_run_list) do
227
+ {
228
+ "shared" => ["local::foo"],
229
+ }
230
+ end
231
+
232
+ it "appends run lists items from the including policy's run lists to the included policy's run lists" do
233
+ expect(policyfile_lock.to_lock["named_run_lists"]["shared"]).to eq(included_policy_expanded_named_runlist["shared"] + named_run_list_expanded["shared"])
234
+ end
235
+
236
+ end
237
+
238
+ end
239
+
240
+ context "when no cookbooks are shared as dependencies or transitive dependencies" do
241
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
242
+ let(:run_list) { ["cookbookA::default"] }
243
+
244
+ it "does not raise a have conflicting dependency requirements error" do
245
+ expect { policyfile_lock.to_lock }.not_to raise_error
246
+ end
247
+
248
+ it "emits a lockfile where cookbooks pulled from the upstream are at identical versions" do
249
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
250
+ have_key("cookbookC (2.0.0)"))
251
+ end
252
+ end
253
+
254
+ context "when some cookbooks are shared as dependencies or transitive dependencies" do
255
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
256
+ let(:included_policy_cookbooks) do
257
+ [
258
+ {
259
+ name: "cookbookC",
260
+ version: "2.0.0",
261
+ },
262
+ ]
263
+ end
264
+
265
+ context "and the including policy does not specify any sources" do
266
+ let(:run_list) { [] }
267
+ it "it defaults to those provided in the included policy lock" do
268
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
269
+ have_key("cookbookC (2.0.0)"))
270
+ end
271
+ end
272
+
273
+ context "and the including policy specifies a source that is equivalent to the included policy" do
274
+ let(:run_list) { [] }
275
+ let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
276
+
277
+ before do
278
+ allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
279
+ allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({})
280
+ allow(default_source).to receive(:null?).and_return(false)
281
+ allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
282
+ allow(default_source).to receive(:desc).and_return("source double")
283
+ end
284
+
285
+ it "it defaults to those provided in the included policy lock" do
286
+ expect { policyfile_lock.to_lock }.not_to raise_error
287
+ end
288
+ end
289
+
290
+ context "and the including policy specifies a source that is not equivalent to the included policy" do
291
+ let(:run_list) { [] }
292
+ let(:default_source) { instance_double("ChefDK::Policyfile::NullCookbookSource") }
293
+
294
+ before do
295
+ allow(default_source).to receive(:preferred_cookbooks).and_return(["cookbookC"])
296
+ allow(default_source).to receive(:source_options_for).with("cookbookC", "2.0.0").and_return({ "foo" => "bar" })
297
+ allow(default_source).to receive(:null?).and_return(false)
298
+ allow(default_source).to receive(:universe_graph).and_return(external_cookbook_universe)
299
+ allow(default_source).to receive(:desc).and_return("source double")
300
+ end
301
+
302
+ it "it raises an error" do
303
+ expect { policyfile_lock.to_lock }.to raise_error(ChefDK::IncludePolicyCookbookSourceConflict)
304
+ end
305
+ end
306
+
307
+ context "and the including policy's dependencies can be solved with the included policy's locks" do
308
+ let(:run_list) { ["local_easy::default"] }
309
+
310
+ it "solves the dependencies added by the top-level policyfile and emits them in the lockfile" do
311
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
312
+ have_key("cookbookC (2.0.0)"))
313
+ end
314
+
315
+ end
316
+
317
+ context "and the including policy's dependencies cannot be solved with the included policy's locks" do
318
+ let(:run_list) { ["local::default"] }
319
+
320
+ it "raises an error describing the conflict" do
321
+ expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError)
322
+ end
323
+
324
+ it "includes the source of the conflicting dependency constraint from the including policy" do
325
+ expect { policyfile_lock.to_lock }.to raise_error(Solve::Errors::NoSolutionError) do |e|
326
+ expect(e.to_s).to match(/`cookbookC \(= 2.0.0\)`/) # This one comes from the included policy
327
+ expect(e.to_s).to match(/`cookbookC \(= 1.0.0\)` required by `local-1.0.0`/) # This one comes from the included policy
328
+ end
329
+ end
330
+ end
331
+ end
332
+
333
+ context "when default attributes are specified" do
334
+ let(:default_attributes) do
335
+ {
336
+ "shared" => {
337
+ "foo" => "bar",
338
+ },
339
+ }
340
+ end
341
+
342
+ context "when the included policy does not have attributes that conflict with the including policy" do
343
+ let(:included_policy_default_attributes) do
344
+ {
345
+ "not_shared" => {
346
+ "foo" => "bar",
347
+ },
348
+ }
349
+ end
350
+
351
+ it "emits a lockfile with the attributes from both merged" do
352
+ expect(policyfile_lock.to_lock["default_attributes"]).to include(included_policy_default_attributes, default_attributes)
353
+ end
354
+
355
+ end
356
+
357
+ context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
358
+ let(:included_policy_default_attributes) { default_attributes }
359
+
360
+ it "emits a lockfile with the attributes from both merged" do
361
+ expect(policyfile_lock.to_lock["default_attributes"]).to eq(default_attributes)
362
+ end
363
+
364
+ end
365
+
366
+ context "when the included policy has attributes that conflict with the including policy's attributes" do
367
+ let(:included_policy_default_attributes) do
368
+ {
369
+ "shared" => {
370
+ "foo" => "not_bar",
371
+ },
372
+ }
373
+ end
374
+
375
+ it "raises an error describing all attribute conflicts" do
376
+ expect { policyfile_lock.to_lock }.to raise_error(
377
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
378
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
379
+ end
380
+ end
381
+ end
382
+
383
+ context "when override attributes are specified" do
384
+ let(:override_attributes) do
385
+ {
386
+ "shared" => {
387
+ "foo" => "bar",
388
+ },
389
+ }
390
+ end
391
+
392
+ context "when the included policy does not have attributes that conflict with the including policy" do
393
+ let(:included_policy_override_attributes) do
394
+ {
395
+ "not_shared" => {
396
+ "foo" => "bar",
397
+ },
398
+ }
399
+ end
400
+
401
+ it "emits a lockfile with the attributes from both merged" do
402
+ expect(policyfile_lock.to_lock["override_attributes"]).to include(included_policy_override_attributes, override_attributes)
403
+ end
404
+
405
+ end
406
+
407
+ context "when the included policy has attributes that conflict with the including policy, but provide the same value" do
408
+ let(:included_policy_override_attributes) { override_attributes }
409
+
410
+ it "emits a lockfile with the attributes from both merged" do
411
+ expect(policyfile_lock.to_lock["override_attributes"]).to eq(override_attributes)
412
+ end
413
+
414
+ end
415
+
416
+ context "when the included policy has attributes that conflict with the including policy's attributes" do
417
+ let(:included_policy_override_attributes) do
418
+ {
419
+ "shared" => {
420
+ "foo" => "not_bar",
421
+ },
422
+ }
423
+ end
424
+
425
+ it "raises an error describing all attribute conflicts" do
426
+ expect { policyfile_lock.to_lock }.to raise_error(
427
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
428
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
429
+ end
430
+ end
431
+ end
432
+ end
433
+
434
+ context "when several policies are included" do
435
+ let(:included_policy_2_default_attributes) { {} }
436
+ let(:included_policy_2_override_attributes) { {} }
437
+ let(:included_policy_2_expanded_named_runlist) { nil }
438
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookA::default]"] }
439
+ let(:included_policy_2_cookbooks) do
440
+ [
441
+ {
442
+ name: "cookbookA",
443
+ version: "2.0.0",
444
+ },
445
+ ]
446
+ end
447
+
448
+ let(:included_policy_2_lock_data) do
449
+ cookbook_locks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
450
+ acc[cookbook_info[:name]] = {
451
+ "version" => cookbook_info[:version],
452
+ "identifier" => "identifier",
453
+ "dotted_decimal_identifier" => "dotted_decimal_identifier",
454
+ "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
455
+ "origin" => "uri",
456
+ "source_options" => {},
457
+ }
458
+ acc
459
+ end
460
+
461
+ solution_dependencies_lock = included_policy_2_cookbooks.map do |cookbook_info|
462
+ [cookbook_info[:name], cookbook_info[:version]]
463
+ end
464
+
465
+ solution_dependencies_cookbooks = included_policy_2_cookbooks.inject({}) do |acc, cookbook_info|
466
+ acc["#{cookbook_info[:name]} (#{cookbook_info[:version]})"] = external_cookbook_universe[cookbook_info[:name]][cookbook_info[:version]]
467
+ acc
468
+ end
469
+
470
+ {
471
+ "name" => "included_policy_2file",
472
+ "revision_id" => "myrevisionid",
473
+ "run_list" => included_policy_2_expanded_runlist,
474
+ "cookbook_locks" => cookbook_locks,
475
+ "default_attributes" => included_policy_2_default_attributes,
476
+ "override_attributes" => included_policy_2_override_attributes,
477
+ "solution_dependencies" => {
478
+ "Policyfile" => solution_dependencies_lock,
479
+ "dependencies" => solution_dependencies_cookbooks,
480
+ },
481
+ }.tap do |core|
482
+ core["named_run_lists"] = included_policy_2_expanded_named_runlist if included_policy_2_expanded_named_runlist
483
+ end
484
+ end
485
+
486
+ let(:included_policy_2_lock_name) { "included2" }
487
+ let(:included_policy_2_fetcher) do
488
+ instance_double("ChefDK::Policyfile::LocalLockFetcher").tap do |double|
489
+ allow(double).to receive(:lock_data).and_return(included_policy_2_lock_data)
490
+ allow(double).to receive(:valid?).and_return(true)
491
+ allow(double).to receive(:errors).and_return([])
492
+ end
493
+ end
494
+
495
+ let(:included_policy_2_lock_spec) do
496
+ ChefDK::Policyfile::PolicyfileLocationSpecification.new(included_policy_2_lock_name, lock_source_options, nil).tap do |spec|
497
+ allow(spec).to receive(:valid?).and_return(true)
498
+ allow(spec).to receive(:fetcher).and_return(included_policy_2_fetcher)
499
+ allow(spec).to receive(:source_options_for_lock).and_return(lock_source_options)
500
+ end
501
+ end
502
+
503
+ let(:included_policies) { [included_policy_lock_spec, included_policy_2_lock_spec] }
504
+
505
+ let(:run_list) { ["local::default"] }
506
+
507
+ context "when no cookbooks are shared as dependencies or transitive dependencies by included policies" do
508
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookA::default]"] }
509
+ let(:included_policy_cookbooks) do
510
+ [
511
+ {
512
+ name: "cookbookA",
513
+ version: "2.0.0",
514
+ },
515
+ ]
516
+ end
517
+
518
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookB::default]"] }
519
+ let(:included_policy_2_cookbooks) do
520
+ [
521
+ {
522
+ name: "cookbookB",
523
+ version: "2.0.0",
524
+ },
525
+ ]
526
+ end
527
+
528
+ it "does not raise a have conflicting dependency requirements error" do
529
+ expect { policyfile_lock.to_lock }.not_to raise_error
530
+ end
531
+
532
+ it "emits a lockfile with the correct dependencies" do
533
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
534
+ "cookbookA (2.0.0)" => [],
535
+ "cookbookB (2.0.0)" => [],
536
+ "cookbookC (1.0.0)" => [],
537
+ "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
538
+ })
539
+ end
540
+ end
541
+
542
+ context "when some cookbooks appear as dependencies or transitive dependencies of some included policies" do
543
+ let(:included_policy_expanded_runlist) { ["recipe[cookbookC::default]"] }
544
+ let(:included_policy_2_expanded_runlist) { ["recipe[cookbookC::default]"] }
545
+
546
+ context "and the locked versions of the cookbooks match" do
547
+ let(:included_policy_cookbooks) do
548
+ [
549
+ {
550
+ name: "cookbookC",
551
+ version: "1.0.0",
552
+ },
553
+ ]
554
+ end
555
+
556
+ let(:included_policy_2_cookbooks) do
557
+ [
558
+ {
559
+ name: "cookbookC",
560
+ version: "1.0.0",
561
+ },
562
+ ]
563
+ end
564
+
565
+ it "solves the dependencies with the matching versions" do
566
+ expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to eq({
567
+ "cookbookC (1.0.0)" => [],
568
+ "local (1.0.0)" => [["cookbookC", "= 1.0.0"]],
569
+ })
570
+ end
571
+ end
572
+
573
+ context "and the locked versions of the cookbooks do not match" do
574
+ let(:included_policy_cookbooks) do
575
+ [
576
+ {
577
+ name: "cookbookC",
578
+ version: "1.0.0",
579
+ },
580
+ ]
581
+ end
582
+
583
+ let(:included_policy_2_cookbooks) do
584
+ [
585
+ {
586
+ name: "cookbookC",
587
+ version: "2.0.0",
588
+ },
589
+ ]
590
+ end
591
+
592
+ it "raises an error describing the conflict" do
593
+ expect { policyfile_lock }.to raise_error(
594
+ ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookVersions,
595
+ /Multiple versions provided for cookbook cookbookC/
596
+ )
597
+ end
598
+ end
599
+ end
600
+
601
+ context "when default attributes are specified" do
602
+ context "when the included policies do not have conflicting attributes" do
603
+ let(:included_policy_default_attributes) do
604
+ {
605
+ "not_conflict" => {
606
+ "foo" => "bar",
607
+ },
608
+ }
609
+ end
610
+ let(:included_policy_2_default_attributes) do
611
+ {
612
+ "not_conflict" => {
613
+ "foo" => "bar",
614
+ },
615
+ }
616
+ end
617
+ let(:default_attributes) do
618
+ {
619
+ "not_conflict" => {
620
+ "bar" => "baz",
621
+ },
622
+ }
623
+ end
624
+
625
+ it "emits a lockfile with the included policies' attributes merged" do
626
+ expect(policyfile_lock.to_lock["default_attributes"]).to eq({
627
+ "not_conflict" => {
628
+ "foo" => "bar",
629
+ "bar" => "baz",
630
+ },
631
+ })
632
+ end
633
+ end
634
+
635
+ context "when the included policies have conflicting attributes" do
636
+ let(:included_policy_default_attributes) do
637
+ {
638
+ "conflict" => {
639
+ "foo" => "bar",
640
+ },
641
+ }
642
+ end
643
+
644
+ let(:included_policy_2_default_attributes) do
645
+ {
646
+ "conflict" => {
647
+ "foo" => "baz",
648
+ },
649
+ }
650
+ end
651
+
652
+ it "raises an error describing the conflict" do
653
+ expect { policyfile_lock }.to raise_error(
654
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
655
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
656
+ end
657
+ end
658
+ end
659
+
660
+ context "when override attributes are specified" do
661
+ context "when the included policies do not have conflicting attributes" do
662
+ let(:included_policy_override_attributes) do
663
+ {
664
+ "not_conflict" => {
665
+ "foo" => "bar",
666
+ },
667
+ }
668
+ end
669
+ let(:included_policy_2_override_attributes) do
670
+ {
671
+ "not_conflict" => {
672
+ "foo" => "bar",
673
+ },
674
+ }
675
+ end
676
+ let(:override_attributes) do
677
+ {
678
+ "not_conflict" => {
679
+ "bar" => "baz",
680
+ },
681
+ }
682
+ end
683
+
684
+ it "emits a lockfile with the included policies' attributes merged" do
685
+ expect(policyfile_lock.to_lock["override_attributes"]).to eq({
686
+ "not_conflict" => {
687
+ "foo" => "bar",
688
+ "bar" => "baz",
689
+ },
690
+ })
691
+ end
692
+ end
693
+
694
+ context "when the included policies have conflicting attributes" do
695
+ let(:included_policy_override_attributes) do
696
+ {
697
+ "conflict" => {
698
+ "foo" => "bar",
699
+ },
700
+ }
701
+ end
702
+
703
+ let(:included_policy_2_override_attributes) do
704
+ {
705
+ "conflict" => {
706
+ "foo" => "baz",
707
+ },
708
+ }
709
+ end
710
+
711
+ it "raises an error describing the conflict" do
712
+ expect { policyfile_lock }.to raise_error(
713
+ ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
714
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
715
+ end
716
+ end
717
+ end
718
+
719
+ end
720
+ end