chef-dk 4.1.7 → 4.2.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (98) hide show
  1. checksums.yaml +4 -4
  2. data/Gemfile +4 -2
  3. data/Gemfile.lock +113 -17
  4. data/lib/chef-dk/builtin_commands.rb +3 -0
  5. data/lib/chef-dk/cli.rb +3 -1
  6. data/lib/chef-dk/command/clean_policy_cookbooks.rb +1 -0
  7. data/lib/chef-dk/command/clean_policy_revisions.rb +1 -0
  8. data/lib/chef-dk/command/delete_policy.rb +1 -0
  9. data/lib/chef-dk/command/delete_policy_group.rb +1 -0
  10. data/lib/chef-dk/command/describe_cookbook.rb +1 -0
  11. data/lib/chef-dk/command/diff.rb +5 -3
  12. data/lib/chef-dk/command/env.rb +6 -6
  13. data/lib/chef-dk/command/export.rb +1 -0
  14. data/lib/chef-dk/command/generate.rb +1 -0
  15. data/lib/chef-dk/command/generator_commands/chef_exts/quieter_doc_formatter.rb +2 -4
  16. data/lib/chef-dk/command/generator_commands/generator_generator.rb +1 -0
  17. data/lib/chef-dk/command/install.rb +1 -0
  18. data/lib/chef-dk/command/push.rb +1 -0
  19. data/lib/chef-dk/command/push_archive.rb +1 -1
  20. data/lib/chef-dk/command/shell_init.rb +3 -2
  21. data/lib/chef-dk/command/show_policy.rb +1 -0
  22. data/lib/chef-dk/command/undelete.rb +1 -0
  23. data/lib/chef-dk/command/update.rb +1 -0
  24. data/lib/chef-dk/command/verify.rb +1 -1
  25. data/lib/chef-dk/component_test.rb +2 -1
  26. data/lib/chef-dk/configurable.rb +3 -2
  27. data/lib/chef-dk/cookbook_profiler/null_scm.rb +1 -2
  28. data/lib/chef-dk/generator.rb +1 -1
  29. data/lib/chef-dk/helpers.rb +2 -1
  30. data/lib/chef-dk/policyfile/artifactory_cookbook_source.rb +1 -1
  31. data/lib/chef-dk/policyfile/attribute_merge_checker.rb +1 -1
  32. data/lib/chef-dk/policyfile/chef_repo_cookbook_source.rb +1 -1
  33. data/lib/chef-dk/policyfile/chef_server_cookbook_source.rb +3 -3
  34. data/lib/chef-dk/policyfile/chef_server_lock_fetcher.rb +5 -5
  35. data/lib/chef-dk/policyfile/community_cookbook_source.rb +1 -1
  36. data/lib/chef-dk/policyfile/comparison_base.rb +1 -0
  37. data/lib/chef-dk/policyfile/cookbook_location_specification.rb +4 -4
  38. data/lib/chef-dk/policyfile/cookbook_locks.rb +8 -5
  39. data/lib/chef-dk/policyfile/delivery_supermarket_source.rb +1 -1
  40. data/lib/chef-dk/policyfile/differ.rb +6 -2
  41. data/lib/chef-dk/policyfile/dsl.rb +4 -2
  42. data/lib/chef-dk/policyfile/git_lock_fetcher.rb +2 -2
  43. data/lib/chef-dk/policyfile/included_policies_cookbook_source.rb +1 -1
  44. data/lib/chef-dk/policyfile/lister.rb +2 -2
  45. data/lib/chef-dk/policyfile/local_lock_fetcher.rb +7 -5
  46. data/lib/chef-dk/policyfile/lock_applier.rb +1 -1
  47. data/lib/chef-dk/policyfile/null_cookbook_source.rb +1 -2
  48. data/lib/chef-dk/policyfile/policyfile_location_specification.rb +3 -3
  49. data/lib/chef-dk/policyfile/remote_lock_fetcher.rb +1 -1
  50. data/lib/chef-dk/policyfile/solution_dependencies.rb +13 -11
  51. data/lib/chef-dk/policyfile/storage_config.rb +1 -0
  52. data/lib/chef-dk/policyfile/undo_record.rb +10 -8
  53. data/lib/chef-dk/policyfile/uploader.rb +3 -1
  54. data/lib/chef-dk/policyfile_compiler.rb +17 -13
  55. data/lib/chef-dk/policyfile_lock.rb +17 -15
  56. data/lib/chef-dk/policyfile_services/clean_policies.rb +3 -3
  57. data/lib/chef-dk/policyfile_services/clean_policy_cookbooks.rb +2 -2
  58. data/lib/chef-dk/policyfile_services/export_repo.rb +4 -2
  59. data/lib/chef-dk/policyfile_services/install.rb +3 -1
  60. data/lib/chef-dk/policyfile_services/push.rb +6 -5
  61. data/lib/chef-dk/policyfile_services/push_archive.rb +6 -5
  62. data/lib/chef-dk/policyfile_services/rm_policy.rb +6 -2
  63. data/lib/chef-dk/policyfile_services/rm_policy_group.rb +2 -2
  64. data/lib/chef-dk/policyfile_services/show_policy.rb +2 -2
  65. data/lib/chef-dk/policyfile_services/undelete.rb +2 -2
  66. data/lib/chef-dk/version.rb +1 -1
  67. data/lib/kitchen/provisioner/policyfile_zero.rb +3 -6
  68. data/spec/unit/cli_spec.rb +6 -6
  69. data/spec/unit/command/base_spec.rb +1 -1
  70. data/spec/unit/command/env_spec.rb +1 -1
  71. data/spec/unit/command/exec_spec.rb +1 -1
  72. data/spec/unit/command/export_spec.rb +1 -1
  73. data/spec/unit/command/generator_commands/recipe_spec.rb +2 -1
  74. data/spec/unit/command/generator_commands/repo_spec.rb +6 -6
  75. data/spec/unit/command/verify_spec.rb +1 -1
  76. data/spec/unit/policyfile/attribute_merge_checker_spec.rb +10 -8
  77. data/spec/unit/policyfile/chef_server_lock_fetcher_spec.rb +4 -2
  78. data/spec/unit/policyfile/cookbook_locks_spec.rb +9 -9
  79. data/spec/unit/policyfile/git_lock_fetcher_spec.rb +5 -5
  80. data/spec/unit/policyfile/included_policies_cookbook_source_spec.rb +5 -3
  81. data/spec/unit/policyfile/lister_spec.rb +5 -5
  82. data/spec/unit/policyfile/local_lock_fetcher_spec.rb +1 -1
  83. data/spec/unit/policyfile/lock_applier_spec.rb +2 -2
  84. data/spec/unit/policyfile/reports/install_spec.rb +14 -14
  85. data/spec/unit/policyfile/reports/upload_spec.rb +3 -3
  86. data/spec/unit/policyfile/uploader_spec.rb +13 -12
  87. data/spec/unit/policyfile_demands_spec.rb +4 -4
  88. data/spec/unit/policyfile_includes_spec.rb +14 -7
  89. data/spec/unit/policyfile_install_with_includes_spec.rb +8 -7
  90. data/spec/unit/policyfile_lock_build_spec.rb +17 -18
  91. data/spec/unit/policyfile_services/clean_policy_cookbooks_spec.rb +5 -5
  92. data/spec/unit/policyfile_services/push_archive_spec.rb +6 -6
  93. data/spec/unit/policyfile_services/push_spec.rb +8 -8
  94. data/spec/unit/policyfile_services/rm_policy_group_spec.rb +5 -5
  95. data/spec/unit/policyfile_services/rm_policy_spec.rb +5 -5
  96. data/spec/unit/policyfile_services/update_attributes_spec.rb +2 -1
  97. data/spec/unit/service_exception_inspectors/http_spec.rb +7 -7
  98. metadata +2 -2
@@ -141,11 +141,11 @@ describe ChefDK::Policyfile::GitLockFetcher do
141
141
  expect(
142
142
  relative_path_fetcher.lock_data["cookbook_locks"][cookbook_name]["source_options"]
143
143
  ).to match(
144
- {
145
- "git" => repo,
146
- "revision" => git_revision,
147
- }
148
- )
144
+ {
145
+ "git" => repo,
146
+ "revision" => git_revision,
147
+ }
148
+ )
149
149
  expect(
150
150
  relative_path_fetcher.lock_data["cookbook_locks"][cookbook_name]["source_options"]
151
151
  ).not_to match(source_options_rel)
@@ -69,7 +69,7 @@ describe ChefDK::Policyfile::IncludedPoliciesCookbookSource do
69
69
  "cache_key" => "#{cookbook_info[:name]}-#{cookbook_info[:version]}",
70
70
  "origin" => "uri",
71
71
  "source_options" => { "version" => cookbook_info[:version] }.tap do |so|
72
- so["nonce"] = nonce if !nonce.nil?
72
+ so["nonce"] = nonce unless nonce.nil?
73
73
  end,
74
74
  }
75
75
  acc
@@ -222,7 +222,8 @@ describe ChefDK::Policyfile::IncludedPoliciesCookbookSource do
222
222
 
223
223
  it "raises an error when check_for_conflicts! is called" do
224
224
  expect { cookbook_source.check_for_conflicts! }.to raise_error(
225
- ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookSources)
225
+ ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookSources
226
+ )
226
227
  end
227
228
  end
228
229
 
@@ -231,7 +232,8 @@ describe ChefDK::Policyfile::IncludedPoliciesCookbookSource do
231
232
 
232
233
  it "raises an error when check_for_conflicts! is called" do
233
234
  expect { cookbook_source.check_for_conflicts! }.to raise_error(
234
- ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookVersions)
235
+ ChefDK::Policyfile::IncludedPoliciesCookbookSource::ConflictingCookbookVersions
236
+ )
235
237
  end
236
238
  end
237
239
 
@@ -26,9 +26,9 @@ describe ChefDK::Policyfile::Lister do
26
26
 
27
27
  let(:config) do
28
28
  double("Chef::Config",
29
- chef_server_url: "https://localhost:10443",
30
- client_key: "/path/to/client/key.pem",
31
- node_name: "deuce")
29
+ chef_server_url: "https://localhost:10443",
30
+ client_key: "/path/to/client/key.pem",
31
+ node_name: "deuce")
32
32
  end
33
33
 
34
34
  let(:http_client) { instance_double(Chef::ServerAPI) }
@@ -39,8 +39,8 @@ describe ChefDK::Policyfile::Lister do
39
39
 
40
40
  it "configures an HTTP client" do
41
41
  expect(Chef::ServerAPI).to receive(:new).with("https://localhost:10443",
42
- signing_key_filename: "/path/to/client/key.pem",
43
- client_name: "deuce")
42
+ signing_key_filename: "/path/to/client/key.pem",
43
+ client_name: "deuce")
44
44
  info_fetcher.http_client
45
45
  end
46
46
 
@@ -70,7 +70,7 @@ describe ChefDK::Policyfile::LocalLockFetcher do
70
70
  end
71
71
  end
72
72
 
73
- [:relative, :absolute].each do |mode|
73
+ %i{relative absolute}.each do |mode|
74
74
  context "When path is #{mode}" do
75
75
  let(:path) { "foo/bar/baz/foo.lock.json" }
76
76
  let(:lock_file_path_abs) { "#{tempdir}/#{path}" }
@@ -27,12 +27,12 @@ describe ChefDK::Policyfile::LockApplier do
27
27
 
28
28
  let(:included_policy_1) do
29
29
  instance_double("ChefDK::Policyfile::PolicyfileLocationSpec",
30
- name: "policy1")
30
+ name: "policy1")
31
31
  end
32
32
 
33
33
  let(:included_policy_2) do
34
34
  instance_double("ChefDK::Policyfile::PolicyfileLocationSpec",
35
- name: "policy2")
35
+ name: "policy2")
36
36
  end
37
37
 
38
38
  let(:included_policy_lock_1) do
@@ -42,18 +42,18 @@ describe ChefDK::Policyfile::Reports::Install do
42
42
 
43
43
  let(:fixed_version_cookbook_one) do
44
44
  instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
45
- installed?: false,
46
- name: "short-name",
47
- version_constraint: ">= 0.0.0",
48
- source_type: :git)
45
+ installed?: false,
46
+ name: "short-name",
47
+ version_constraint: ">= 0.0.0",
48
+ source_type: :git)
49
49
  end
50
50
 
51
51
  let(:fixed_version_cookbook_two) do
52
52
  instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
53
- installed?: true,
54
- name: "this-name-is-longer",
55
- version_constraint: "~> 10.0.0",
56
- source_type: :path)
53
+ installed?: true,
54
+ name: "this-name-is-longer",
55
+ version_constraint: "~> 10.0.0",
56
+ source_type: :path)
57
57
  end
58
58
 
59
59
  let(:fixed_version_cookbooks) do
@@ -80,16 +80,16 @@ describe ChefDK::Policyfile::Reports::Install do
80
80
 
81
81
  let(:cookbook_one) do
82
82
  instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
83
- installed?: false,
84
- name: "short-name",
85
- version_constraint: Semverse::Constraint.new("= 10.0.4"))
83
+ installed?: false,
84
+ name: "short-name",
85
+ version_constraint: Semverse::Constraint.new("= 10.0.4"))
86
86
  end
87
87
 
88
88
  let(:cookbook_two) do
89
89
  instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
90
- installed?: true,
91
- name: "this-name-is-longer",
92
- version_constraint: Semverse::Constraint.new("= 1.2.3"))
90
+ installed?: true,
91
+ name: "this-name-is-longer",
92
+ version_constraint: Semverse::Constraint.new("= 1.2.3"))
93
93
  end
94
94
 
95
95
  let(:graph_solution_cookbooks) do
@@ -50,9 +50,9 @@ describe ChefDK::Policyfile::Reports::Upload do
50
50
 
51
51
  def cb_with_lock(name, version, identifier)
52
52
  lock = instance_double("ChefDK::Policyfile::CookbookLock",
53
- name: name,
54
- version: version,
55
- identifier: identifier)
53
+ name: name,
54
+ version: version,
55
+ identifier: identifier)
56
56
 
57
57
  ChefDK::Policyfile::Uploader::LockedCookbookForUpload.new(nil, lock)
58
58
  end
@@ -48,7 +48,8 @@ describe ChefDK::Policyfile::Uploader do
48
48
 
49
49
  let(:policyfile_lock) do
50
50
  instance_double("ChefDK::PolicyfileLock", name: "example",
51
- to_lock: policyfile_lock_data) end
51
+ to_lock: policyfile_lock_data)
52
+ end
52
53
 
53
54
  let(:policy_group) { "unit-test" }
54
55
 
@@ -58,9 +59,9 @@ describe ChefDK::Policyfile::Uploader do
58
59
 
59
60
  let(:uploader) do
60
61
  described_class.new(policyfile_lock,
61
- policy_group,
62
- http_client: http_client,
63
- policy_document_native_api: policy_document_native_api)
62
+ policy_group,
63
+ http_client: http_client,
64
+ policy_document_native_api: policy_document_native_api)
64
65
  end
65
66
 
66
67
  let(:policyfile_as_data_bag_item) do
@@ -101,16 +102,16 @@ describe ChefDK::Policyfile::Uploader do
101
102
  cache_path = "/home/user/cache_path/#{name}"
102
103
 
103
104
  lock = instance_double("ChefDK::Policyfile::CookbookLock",
104
- name: name,
105
- version: "1.0.0",
106
- identifier: identifier,
107
- dotted_decimal_identifier: dotted_decimal_id,
108
- cookbook_path: cache_path)
105
+ name: name,
106
+ version: "1.0.0",
107
+ identifier: identifier,
108
+ dotted_decimal_identifier: dotted_decimal_id,
109
+ cookbook_path: cache_path)
109
110
 
110
111
  cookbook_version = instance_double("Chef::CookbookVersion",
111
- name: name,
112
- identifier: lock.identifier,
113
- version: dotted_decimal_id)
112
+ name: name,
113
+ identifier: lock.identifier,
114
+ version: dotted_decimal_id)
114
115
 
115
116
  allow(cookbook_version).to receive(:identifier=).with(lock.identifier)
116
117
 
@@ -208,10 +208,10 @@ describe ChefDK::PolicyfileCompiler, "when expressing the Policyfile graph deman
208
208
  s << " #{remote_cb_source_opts}"
209
209
 
210
210
  instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
211
- name: "remote-cb",
212
- version_constraint: Semverse::Constraint.new("= 1.1.1"),
213
- ensure_cached: nil,
214
- to_s: s)
211
+ name: "remote-cb",
212
+ version_constraint: Semverse::Constraint.new("= 1.1.1"),
213
+ ensure_cached: nil,
214
+ to_s: s)
215
215
  end
216
216
 
217
217
  before do
@@ -247,7 +247,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
247
247
 
248
248
  it "emits a lockfile where cookbooks pulled from the upstream are at identical versions" do
249
249
  expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
250
- have_key("cookbookC (2.0.0)"))
250
+ have_key("cookbookC (2.0.0)")
251
+ )
251
252
  end
252
253
  end
253
254
 
@@ -266,7 +267,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
266
267
  let(:run_list) { [] }
267
268
  it "it defaults to those provided in the included policy lock" do
268
269
  expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
269
- have_key("cookbookC (2.0.0)"))
270
+ have_key("cookbookC (2.0.0)")
271
+ )
270
272
  end
271
273
  end
272
274
 
@@ -309,7 +311,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
309
311
 
310
312
  it "solves the dependencies added by the top-level policyfile and emits them in the lockfile" do
311
313
  expect(policyfile_lock.to_lock["solution_dependencies"]["dependencies"]).to(
312
- have_key("cookbookC (2.0.0)"))
314
+ have_key("cookbookC (2.0.0)")
315
+ )
313
316
  end
314
317
 
315
318
  end
@@ -375,7 +378,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
375
378
  it "raises an error describing all attribute conflicts" do
376
379
  expect { policyfile_lock.to_lock }.to raise_error(
377
380
  ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
378
- "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
381
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]"
382
+ )
379
383
  end
380
384
  end
381
385
  end
@@ -425,7 +429,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
425
429
  it "raises an error describing all attribute conflicts" do
426
430
  expect { policyfile_lock.to_lock }.to raise_error(
427
431
  ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
428
- "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]")
432
+ "Attribute '[shared][foo]' provided conflicting values by the following sources [\"user-specified\", \"included\"]"
433
+ )
429
434
  end
430
435
  end
431
436
  end
@@ -652,7 +657,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
652
657
  it "raises an error describing the conflict" do
653
658
  expect { policyfile_lock }.to raise_error(
654
659
  ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
655
- "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
660
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]"
661
+ )
656
662
  end
657
663
  end
658
664
  end
@@ -711,7 +717,8 @@ describe ChefDK::PolicyfileCompiler, "including upstream policy locks" do
711
717
  it "raises an error describing the conflict" do
712
718
  expect { policyfile_lock }.to raise_error(
713
719
  ChefDK::Policyfile::AttributeMergeChecker::ConflictError,
714
- "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]")
720
+ "Attribute '[conflict][foo]' provided conflicting values by the following sources [\"included\", \"included2\"]"
721
+ )
715
722
  end
716
723
  end
717
724
  end
@@ -162,10 +162,10 @@ describe ChefDK::PolicyfileLock, "installing cookbooks from included policies" d
162
162
 
163
163
  allow(ChefDK::Policyfile::CookbookLocationSpecification).to receive(:new) do |cookbook_name, version_constraint, source_opts, storage_config|
164
164
  double = instance_double("ChefDK::Policyfile::CookbookLocationSpecification",
165
- name: cookbook_name,
166
- version_constraint: Semverse::Constraint.new(version_constraint),
167
- ensure_cached: nil,
168
- to_s: "#{cookbook_name} #{version_constraint}")
165
+ name: cookbook_name,
166
+ version_constraint: Semverse::Constraint.new(version_constraint),
167
+ ensure_cached: nil,
168
+ to_s: "#{cookbook_name} #{version_constraint}")
169
169
  allow(double).to receive(:cookbook_has_recipe?).and_return(true)
170
170
  allow(double).to receive(:installed?).and_return(true)
171
171
  allow(double).to receive(:mirrors_canonical_upstream?).and_return(true)
@@ -207,8 +207,8 @@ describe ChefDK::PolicyfileLock, "installing cookbooks from included policies" d
207
207
  allow(mock).to receive(:validate!)
208
208
  allow(mock).to receive(:cookbook_version) do
209
209
  instance_double("Chef::CookbookVersion",
210
- version: mock.source_options[:version],
211
- manifest_records_by_path: [])
210
+ version: mock.source_options[:version],
211
+ manifest_records_by_path: [])
212
212
  end
213
213
  mock
214
214
  end
@@ -226,7 +226,8 @@ describe ChefDK::PolicyfileLock, "installing cookbooks from included policies" d
226
226
  "revision_id" => "myrevisionid",
227
227
  "source_options" => lock_source_options,
228
228
  },
229
- ])
229
+ ]
230
+ )
230
231
  end
231
232
  end
232
233
  end
@@ -30,7 +30,7 @@ describe ChefDK::PolicyfileLock, "building a lockfile" do
30
30
  def expect_hash_equal(actual, expected)
31
31
  expected.each do |key, expected_value|
32
32
  expect(actual).to have_key(key)
33
- if expected_value.kind_of?(Hash)
33
+ if expected_value.is_a?(Hash)
34
34
  expect_hash_equal(actual[key], expected_value)
35
35
  else
36
36
  expect(actual[key]).to eq(expected_value)
@@ -876,18 +876,18 @@ describe ChefDK::PolicyfileLock, "building a lockfile" do
876
876
 
877
877
  let(:cached_location_spec) do
878
878
  double( "ChefDK::Policyfile::CookbookLocationSpecification",
879
- mirrors_canonical_upstream?: true,
880
- cache_key: "foo-1.0.0",
881
- uri: cached_cookbook_uri,
882
- source_options_for_lock: { "artifactserver" => cached_cookbook_uri, "version" => "1.0.0" })
879
+ mirrors_canonical_upstream?: true,
880
+ cache_key: "foo-1.0.0",
881
+ uri: cached_cookbook_uri,
882
+ source_options_for_lock: { "artifactserver" => cached_cookbook_uri, "version" => "1.0.0" })
883
883
  end
884
884
 
885
885
  let(:local_location_spec) do
886
886
  double( "ChefDK::Policyfile::CookbookLocationSpecification",
887
- mirrors_canonical_upstream?: false,
888
- relative_paths_root: relative_paths_root,
889
- relative_path: "bar",
890
- source_options_for_lock: { "path" => "bar" })
887
+ mirrors_canonical_upstream?: false,
888
+ relative_paths_root: relative_paths_root,
889
+ relative_path: "bar",
890
+ source_options_for_lock: { "path" => "bar" })
891
891
  end
892
892
 
893
893
  let(:policyfile_solution_dependencies) do
@@ -933,15 +933,14 @@ describe ChefDK::PolicyfileLock, "building a lockfile" do
933
933
 
934
934
  let(:policyfile_compiler) do
935
935
  double( "ChefDK::PolicyfileCompiler",
936
- name: "my-policyfile",
937
- normalized_run_list: %w{recipe[foo::default] recipe[bar::default]},
938
- normalized_named_run_lists: { "rl2" => %w{recipe[bar::default]} },
939
- all_cookbook_location_specs: { "foo" => cached_location_spec, "bar" => local_location_spec },
940
- solution_dependencies: policyfile_solution_dependencies,
941
- default_attributes: policyfile_default_attrs,
942
- override_attributes: policyfile_override_attrs,
943
- included_policies: []
944
- )
936
+ name: "my-policyfile",
937
+ normalized_run_list: %w{recipe[foo::default] recipe[bar::default]},
938
+ normalized_named_run_lists: { "rl2" => %w{recipe[bar::default]} },
939
+ all_cookbook_location_specs: { "foo" => cached_location_spec, "bar" => local_location_spec },
940
+ solution_dependencies: policyfile_solution_dependencies,
941
+ default_attributes: policyfile_default_attrs,
942
+ override_attributes: policyfile_override_attrs,
943
+ included_policies: [])
945
944
  end
946
945
 
947
946
  let(:policyfile_lock) do
@@ -78,9 +78,9 @@ describe ChefDK::PolicyfileServices::CleanPolicyCookbooks do
78
78
 
79
79
  let(:chef_config) do
80
80
  double("Chef::Config",
81
- chef_server_url: "https://localhost:10443",
82
- client_key: "/path/to/client/key.pem",
83
- node_name: "deuce")
81
+ chef_server_url: "https://localhost:10443",
82
+ client_key: "/path/to/client/key.pem",
83
+ node_name: "deuce")
84
84
  end
85
85
 
86
86
  subject(:clean_policy_cookbooks_service) do
@@ -89,8 +89,8 @@ describe ChefDK::PolicyfileServices::CleanPolicyCookbooks do
89
89
 
90
90
  it "configures an HTTP client with the user's credentials" do
91
91
  expect(Chef::ServerAPI).to receive(:new).with("https://localhost:10443",
92
- signing_key_filename: "/path/to/client/key.pem",
93
- client_name: "deuce")
92
+ signing_key_filename: "/path/to/client/key.pem",
93
+ client_name: "deuce")
94
94
  clean_policy_cookbooks_service.http_client
95
95
  end
96
96
 
@@ -98,10 +98,10 @@ describe ChefDK::PolicyfileServices::PushArchive do
98
98
 
99
99
  let(:config) do
100
100
  double("Chef::Config",
101
- chef_server_url: "https://localhost:10443",
102
- client_key: "/path/to/client/key.pem",
103
- node_name: "deuce",
104
- policy_document_native_api: true)
101
+ chef_server_url: "https://localhost:10443",
102
+ client_key: "/path/to/client/key.pem",
103
+ node_name: "deuce",
104
+ policy_document_native_api: true)
105
105
  end
106
106
 
107
107
  let(:ui) { TestHelpers::TestUI.new }
@@ -121,8 +121,8 @@ describe ChefDK::PolicyfileServices::PushArchive do
121
121
 
122
122
  it "configures an HTTP client" do
123
123
  expect(Chef::ServerAPI).to receive(:new).with("https://localhost:10443",
124
- signing_key_filename: "/path/to/client/key.pem",
125
- client_name: "deuce")
124
+ signing_key_filename: "/path/to/client/key.pem",
125
+ client_name: "deuce")
126
126
  push_archive_service.http_client
127
127
  end
128
128
 
@@ -48,10 +48,10 @@ describe ChefDK::PolicyfileServices::Push do
48
48
 
49
49
  let(:config) do
50
50
  double("Chef::Config",
51
- chef_server_url: "https://localhost:10443",
52
- client_key: "/path/to/client/key.pem",
53
- node_name: "deuce",
54
- policy_document_native_api: policy_document_native_api)
51
+ chef_server_url: "https://localhost:10443",
52
+ client_key: "/path/to/client/key.pem",
53
+ node_name: "deuce",
54
+ policy_document_native_api: policy_document_native_api)
55
55
  end
56
56
 
57
57
  let(:ui) { TestHelpers::TestUI.new }
@@ -60,8 +60,8 @@ describe ChefDK::PolicyfileServices::Push do
60
60
 
61
61
  it "configures an HTTP client" do
62
62
  expect(Chef::ServerAPI).to receive(:new).with("https://localhost:10443",
63
- signing_key_filename: "/path/to/client/key.pem",
64
- client_name: "deuce")
63
+ signing_key_filename: "/path/to/client/key.pem",
64
+ client_name: "deuce")
65
65
  push_service.http_client
66
66
  end
67
67
 
@@ -190,8 +190,8 @@ describe ChefDK::PolicyfileServices::Push do
190
190
  expect(push_service).to receive(:http_client).and_return(http_client)
191
191
 
192
192
  expect(ChefDK::Policyfile::Uploader).to receive(:new)
193
- .with(push_service.policyfile_lock, policy_group, http_client: http_client, ui: ui, policy_document_native_api: policy_document_native_api)
194
- .and_return(uploader)
193
+ .with(push_service.policyfile_lock, policy_group, http_client: http_client, ui: ui, policy_document_native_api: policy_document_native_api)
194
+ .and_return(uploader)
195
195
  end
196
196
 
197
197
  context "when the policy document native API is disabled" do