summaryrefslogtreecommitdiff
path: root/yarns/900-local.yarn
blob: e9e8a7cc06713c11eb2389d8790c8a4a786498f7 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
<!--

Copyright 2017-2019 Lars Wirzenius

This program is free software: you can redistribute it and/or modify
it under the terms of the GNU Affero General Public License as published by
the Free Software Foundation, either version 3 of the License, or
(at your option) any later version.

This program is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
GNU Affero General Public License for more details.

You should have received a copy of the GNU Affero General Public License
along with this program.  If not, see <http://www.gnu.org/licenses/>.

-->

# Scenario step implementations for locally managed ick

## Authentication setup

    IMPLEMENTS GIVEN an RSA key pair for token signing
    argv = [
        os.path.join(srcdir, 'generate-rsa-key'),
        'token.key',
    ]
    cliapp.runcmd(argv, stdout=None, stderr=None)

    IMPLEMENTS GIVEN an access token for (\S+) with scopes (.+)
    user = get_next_match()
    scopes = get_next_match()
    key = open('token.key').read()
    argv = [
        os.path.join(srcdir, 'create-token'),
        scopes,
        user,
    ]
    token = cliapp.runcmd(argv, feed_stdin=key)
    store_token(user, token)
    V['issuer'] = 'localhost'
    V['audience'] = user

## Controller configuration

    IMPLEMENTS GIVEN controller config uses (\S+) at the state directory
    V['statedir'] = get_next_match()

    IMPLEMENTS GIVEN controller config uses (\S+) as artifact store
    V['artifact_store'] = get_next_match()

    IMPLEMENTS GIVEN controller config uses (\S+) as authentication
    V['auth_url'] = get_next_match()

    IMPLEMENTS GIVEN controller config uses (\S+) as notify
    V['notify_url'] = get_next_match()
    assert V['notify_url'] is not None

## Start and stop the controller

    IMPLEMENTS GIVEN a running ick controller
    start_controller()

    IMPLEMENTS WHEN user stops ick controller
    stop_controller()

    IMPLEMENTS FINALLY stop ick controller
    stop_controller()

## Controller state inspection

    IMPLEMENTS THEN controller state directory contains project (\S+)
    name = get_next_match()
    basename = encode_basename(name)
    filename = os.path.join(V['statedir'], 'projects', basename)
    print 'name', name
    print 'basename', basename
    print 'filename', filename
    assertTrue(os.path.exists(filename))

    IMPLEMENTS THEN controller state directory contains worker (\S+)
    name = get_next_match()
    basename = encode_basename(name)
    filename = os.path.join(V['statedir'], 'workers', basename)
    print 'filename', filename
    assertTrue(os.path.exists(filename))

## Check version result

    IMPLEMENTS THEN artifact store URL is (\S+)
    expected = get_next_match()
    body = V['body']
    obj = json.loads(body)
    actual = obj['artifact_store']
    assertEqual(actual, expected)

    IMPLEMENTS THEN authentication URL is (\S+)
    expected = get_next_match()
    body = V['body']
    obj = json.loads(body)
    actual = obj['auth_url']
    assertEqual(actual, expected)

    IMPLEMENTS THEN notify URL is (\S+)
    expected = get_next_match()
    body = V['body']
    obj = json.loads(body)
    actual = obj['notify_url']
    assertEqual(actual, expected)

## Start and stop artifact store

    IMPLEMENTS GIVEN artifact store config uses (\S+) at the blob directory
    V['blobdir'] = get_next_match()

    IMPLEMENTS GIVEN a running artifact store
    start_artifact_store()

    IMPLEMENTS FINALLY stop artifact store
    stop_artifact_store()