1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
|
<!--
Copyright 2017 Lars Wirzenius
-->
# Scenario step implementations
## Authentication setup
IMPLEMENTS GIVEN an RSA key pair for token signing
argv = [
os.path.join(srcdir, 'generate-rsa-key'),
'token.key',
]
cliapp.runcmd(argv, stdout=None, stderr=None)
IMPLEMENTS GIVEN an access token for scopes (.+)
scopes = get_next_match()
vars['issuer'] = 'yarn-issuer'
vars['audience'] = 'yarn-audience'
argv = [
os.path.join(srcdir, 'create-token'),
'token.key',
vars['issuer'],
vars['audience'],
scopes,
]
token = cliapp.runcmd(argv)
write('token.jwt', token)
## Controller configuration
IMPLEMENTS GIVEN controller config uses (\S+) at the state directory
vars['statedir'] = get_next_match()
## Start and stop the controller
IMPLEMENTS GIVEN a running ick controller
import os, time, cliapp, yaml
vars['controller.log'] = 'ick_controller.log'
vars['gunicorn3.log'] = 'gunicorn3.log'
vars['port'] = random_free_port()
vars['url'] = 'http://127.0.0.1:{}'.format(vars['port'])
config = {
'token-issuer': vars['issuer'],
'token-audience': vars['audience'],
'token-public-key': cat('token.key.pub'),
'log': [
{
'filename': vars['controller.log'],
},
],
'statedir': vars['statedir'],
}
env = dict(os.environ)
env['ICK_CONTROLLER_CONFIG'] = 'ick_controller.yaml'
yaml.safe_dump(config, open('ick_controller.yaml', 'w'))
argv = [
'gunicorn3',
'--daemon',
'--bind', '127.0.0.1:{}'.format(vars['port']),
'--log-file', vars['gunicorn3.log'],
'--log-level', 'debug',
'-p', 'pid',
'ick_controller:app',
]
cliapp.runcmd(argv, env=env)
vars['pid'] = int(cat('pid'))
wait_for_port(vars['port'])
IMPLEMENTS WHEN user stops ick controller
import os, signal
os.kill(vars['pid'], signal.SIGTERM)
IMPLEMENTS FINALLY stop ick controller
import os, signal
os.kill(vars['pid'], signal.SIGTERM)
## HTTP requests of various kinds
IMPLEMENTS WHEN user makes request GET (\S+)
path = get_next_match()
token = cat('token.jwt')
url = vars['url']
status, content_type, body = get(url + path, token)
vars['status_code'] = status
vars['content_type'] = content_type
vars['body'] = body
IMPLEMENTS WHEN user makes request POST (\S+) (.+)
path = get_next_match()
body_text = get_next_match()
print('path', path)
print('body', body_text)
token = cat('token.jwt')
url = vars['url']
status, content_type, body = post(url + path, body_text, token)
vars['status_code'] = status
vars['content_type'] = content_type
vars['body'] = body
IMPLEMENTS WHEN user makes request PUT (\S+) (.+)
path = get_next_match()
body_text = get_next_match()
print('path', path)
print('body', body_text)
token = cat('token.jwt')
url = vars['url']
status, content_type, body = put(url + path, body_text, token)
vars['status_code'] = status
vars['content_type'] = content_type
vars['body'] = body
IMPLEMENTS WHEN user makes request DELETE (\S+)
path = get_next_match()
token = cat('token.jwt')
url = vars['url']
status, content_type, body = delete(url + path, token)
vars['status_code'] = status
vars['content_type'] = content_type
vars['body'] = body
## HTTP response inspection
IMPLEMENTS THEN result has status code (\d+)
print(cat('token.jwt'))
expected = int(get_next_match())
assertEqual(expected, vars['status_code'])
IMPLEMENTS THEN body matches (.+)
expected_text = get_next_match()
expected = json.loads(expected_text)
print('actual body', repr(vars['body']))
actual = json.loads(vars['body'])
assertEqual(expected, actual)
## Controller state inspection
IMPLEMENTS THEN controller state directory contains project (\S+)
name = get_next_match()
filename = os.path.join(vars['statedir'], 'projects', name + '.yaml')
assertTrue(os.path.exists(filename))
|