# Scenario step implementations for locally managed ick ## Authentication setup IMPLEMENTS GIVEN an RSA key pair for token signing argv = [ os.path.join(srcdir, 'generate-rsa-key'), 'token.key', ] cliapp.runcmd(argv, stdout=None, stderr=None) IMPLEMENTS GIVEN an access token for (\S+) with scopes (.+) user = get_next_match() scopes = get_next_match() key = open('token.key').read() argv = [ os.path.join(srcdir, 'create-token'), scopes, user, ] token = cliapp.runcmd(argv, feed_stdin=key) store_token(user, token) vars['issuer'] = 'localhost' vars['audience'] = user ## Controller configuration IMPLEMENTS GIVEN controller config uses (\S+) at the state directory vars['statedir'] = get_next_match() IMPLEMENTS GIVEN controller config uses (\S+) as artifact store vars['artifact_store'] = get_next_match() IMPLEMENTS GIVEN controller config uses (\S+) as authentication vars['auth_url'] = get_next_match() ## Start and stop the controller IMPLEMENTS GIVEN a running ick controller import os, time, cliapp, yaml vars['controller.log'] = 'ick_controller.log' vars['gunicorn3.log'] = 'gunicorn3.log' vars['port'] = random_free_port() vars['url'] = 'http://127.0.0.1:{}'.format(vars['port']) assert vars['auth_url'] is not None config = { 'token-issuer': vars['issuer'], 'token-audience': vars['audience'], 'token-public-key': cat('token.key.pub'), 'log': [ { 'filename': vars['controller.log'], }, ], 'statedir': vars['statedir'], 'artifact-store': vars['artifact_store'], 'auth-url': vars['auth_url'], } env = dict(os.environ) env['ICK_CONTROLLER_CONFIG'] = 'ick_controller.yaml' yaml.safe_dump(config, open('ick_controller.yaml', 'w')) argv = [ 'gunicorn3', '--daemon', '--bind', '127.0.0.1:{}'.format(vars['port']), '--log-file', vars['gunicorn3.log'], '--log-level', 'debug', '-p', 'pid', 'ick_controller:app', ] cliapp.runcmd(argv, env=env) vars['pid'] = int(cat('pid')) wait_for_port(vars['port']) IMPLEMENTS WHEN user stops ick controller import os, signal os.kill(int(vars['pid']), signal.SIGTERM) IMPLEMENTS FINALLY stop ick controller import os, signal os.kill(vars['pid'], signal.SIGTERM) ## Controller state inspection IMPLEMENTS THEN controller state directory contains project (\S+) name = get_next_match() basename = encode_basename(name) filename = os.path.join(vars['statedir'], 'projects', basename) print 'filename', filename assertTrue(os.path.exists(filename)) IMPLEMENTS THEN controller state directory contains worker (\S+) name = get_next_match() basename = encode_basename(name) filename = os.path.join(vars['statedir'], 'workers', basename) print 'filename', filename assertTrue(os.path.exists(filename)) ## Check version result IMPLEMENTS THEN artifact store URL is (\S+) expected = get_next_match() body = vars['body'] obj = json.loads(body) actual = obj['artifact_store'] assertEqual(actual, expected) IMPLEMENTS THEN authentication URL is (\S+) expected = get_next_match() body = vars['body'] obj = json.loads(body) actual = obj['auth_url'] assertEqual(actual, expected) ## Start and stop artifact store IMPLEMENTS GIVEN artifact store config uses (\S+) at the blob directory vars['blobdir'] = get_next_match() IMPLEMENTS GIVEN a running artifact store import os, time, cliapp, yaml vars['artifact_store.log'] = 'artifact_store.log' vars['gunicorn3_as.log'] = 'gunicorn3_as.log' vars['bsport'] = random_free_port() vars['bsurl'] = 'http://127.0.0.1:{}'.format(vars['bsport']) config = { 'token-issuer': vars['issuer'], 'token-audience': vars['audience'], 'token-public-key': cat('token.key.pub'), 'log': [ { 'filename': vars['artifact_store.log'], }, ], 'blobdir': vars['blobdir'], } env = dict(os.environ) env['ARTIFACT_STORE_CONFIG'] = 'artifact_store.yaml' yaml.safe_dump(config, open('artifact_store.yaml', 'w')) argv = [ 'gunicorn3', '--daemon', '--bind', '127.0.0.1:{}'.format(vars['bsport']), '--log-file', vars['gunicorn3_as.log'], '--log-level', 'debug', '-p', 'bspid', 'artifact_store:app', ] cliapp.runcmd(argv, env=env) vars['bspid'] = int(cat('bspid')) wait_for_port(vars['bsport']) IMPLEMENTS FINALLY stop artifact store import os, signal os.kill(vars['bspid'], signal.SIGTERM)