470 lines
21 KiB
Ruby
470 lines
21 KiB
Ruby
require 'spec_helper'
|
|
|
|
describe 'heat' do
|
|
|
|
let :params do
|
|
{
|
|
:package_ensure => 'present',
|
|
:verbose => 'False',
|
|
:debug => 'False',
|
|
:use_stderr => 'True',
|
|
:log_dir => '/var/log/heat',
|
|
:rabbit_host => '127.0.0.1',
|
|
:rabbit_port => 5672,
|
|
:rabbit_userid => '<SERVICE DEFAULT>',
|
|
:rabbit_password => '',
|
|
:rabbit_virtual_host => '<SERVICE DEFAULT>',
|
|
:database_connection => 'mysql://user@host/database',
|
|
:database_idle_timeout => 3600,
|
|
:auth_uri => 'http://127.0.0.1:5000/v2.0',
|
|
:keystone_ec2_uri => 'http://127.0.0.1:5000/v2.0/ec2tokens',
|
|
:flavor => 'keystone',
|
|
:keystone_password => 'secretpassword',
|
|
}
|
|
end
|
|
|
|
let :qpid_params do
|
|
{
|
|
:rpc_backend => "qpid",
|
|
:qpid_hostname => 'localhost',
|
|
:qpid_port => 5672,
|
|
:qpid_username => 'guest',
|
|
:qpid_password => 'guest',
|
|
}
|
|
end
|
|
|
|
shared_examples_for 'heat' do
|
|
|
|
context 'with rabbit_host parameter' do
|
|
it_configures 'a heat base installation'
|
|
it_configures 'rabbit without HA support (with backward compatibility)'
|
|
end
|
|
|
|
context 'with rabbit_hosts parameter' do
|
|
context 'with one server' do
|
|
before { params.merge!( :rabbit_hosts => ['127.0.0.1:5672'] ) }
|
|
it_configures 'a heat base installation'
|
|
it_configures 'rabbit without HA support (without backward compatibility)'
|
|
end
|
|
|
|
context 'with multiple servers' do
|
|
before { params.merge!(
|
|
:rabbit_hosts => ['rabbit1:5672', 'rabbit2:5672'],
|
|
:amqp_durable_queues => true) }
|
|
it_configures 'a heat base installation'
|
|
it_configures 'rabbit with HA support'
|
|
end
|
|
end
|
|
|
|
context 'with rabbit heartbeat configured' do
|
|
before { params.merge!(
|
|
:rabbit_heartbeat_timeout_threshold => '60',
|
|
:rabbit_heartbeat_rate => '10' ) }
|
|
it_configures 'a heat base installation'
|
|
it_configures 'rabbit with heartbeat configured'
|
|
end
|
|
|
|
context 'with qpid instance' do
|
|
before {params.merge!(qpid_params) }
|
|
|
|
it_configures 'a heat base installation'
|
|
it_configures 'qpid as rpc backend'
|
|
end
|
|
|
|
it_configures 'with SSL enabled with kombu'
|
|
it_configures 'with SSL enabled without kombu'
|
|
it_configures 'with SSL disabled'
|
|
it_configures 'with SSL wrongly configured'
|
|
it_configures "with custom keystone identity_uri"
|
|
it_configures "with custom keystone identity_uri and auth_uri"
|
|
it_configures 'with enable_stack_adopt and enable_stack_abandon set'
|
|
end
|
|
|
|
shared_examples_for 'a heat base installation' do
|
|
|
|
it { is_expected.to contain_class('heat::logging') }
|
|
it { is_expected.to contain_class('heat::params') }
|
|
|
|
it 'installs heat common package' do
|
|
is_expected.to contain_package('heat-common').with(
|
|
:ensure => 'present',
|
|
:name => platform_params[:common_package_name],
|
|
:tag => ['openstack', 'heat-package'],
|
|
)
|
|
end
|
|
|
|
it 'has db_sync enabled' do
|
|
is_expected.to contain_class('heat::db::sync')
|
|
end
|
|
|
|
it 'configures auth_uri' do
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_uri').with_value( params[:auth_uri] )
|
|
end
|
|
|
|
it 'configures keystone_ec2_uri' do
|
|
is_expected.to contain_heat_config('ec2authtoken/auth_uri').with_value( params[:keystone_ec2_uri] )
|
|
end
|
|
|
|
it { is_expected.to contain_heat_config('paste_deploy/flavor').with_value('keystone') }
|
|
|
|
it 'keeps keystone secrets secret' do
|
|
is_expected.to contain_heat_config('keystone_authtoken/admin_password').with_secret(true)
|
|
end
|
|
|
|
|
|
end
|
|
|
|
shared_examples_for 'rabbit without HA support (with backward compatibility)' do
|
|
it 'configures rabbit' do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_userid').with_value( params[:rabbit_userid] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_value( params[:rabbit_password] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_secret( true )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_virtual_host').with_value( params[:rabbit_virtual_host] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value(false)
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_timeout_threshold').with_value('0')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_rate').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_host').with_value( params[:rabbit_host] ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_port').with_value( params[:rabbit_port] ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_hosts').with_value( "#{params[:rabbit_host]}:#{params[:rabbit_port]}" ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_ha_queues').with_value('false') }
|
|
it { is_expected.to contain_heat_config('DEFAULT/rpc_response_timeout').with_value('<SERVICE DEFAULT>') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/amqp_durable_queues').with_value(false) }
|
|
end
|
|
|
|
shared_examples_for 'rabbit without HA support (without backward compatibility)' do
|
|
it 'configures rabbit' do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_userid').with_value( params[:rabbit_userid] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_secret( true )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_value( params[:rabbit_password] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_virtual_host').with_value( params[:rabbit_virtual_host] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value(false)
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_timeout_threshold').with_value('0')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_rate').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_host').with_ensure('absent') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_port').with_ensure('absent') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_hosts').with_value( params[:rabbit_hosts].join(',') ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_ha_queues').with_value('false') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/amqp_durable_queues').with_value(false) }
|
|
end
|
|
|
|
shared_examples_for 'rabbit with HA support' do
|
|
it 'configures rabbit' do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_userid').with_value( params[:rabbit_userid] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_value( params[:rabbit_password] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_secret( true )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_virtual_host').with_value( params[:rabbit_virtual_host] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value(false)
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_timeout_threshold').with_value('0')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_rate').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_host').with_ensure('absent') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_port').with_ensure('absent') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_hosts').with_value( params[:rabbit_hosts].join(',') ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_ha_queues').with_value('true') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/amqp_durable_queues').with_value(true) }
|
|
end
|
|
|
|
shared_examples_for 'single rabbit_host with ha queues' do
|
|
let :params do
|
|
req_params.merge({'rabbit_ha_queues' => true})
|
|
end
|
|
|
|
it 'should contain rabbit_ha_queues' do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_ha_queues').with_value('true')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'rabbit with heartbeat configured' do
|
|
it 'configures rabbit' do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_userid').with_value( params[:rabbit_userid] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_value( params[:rabbit_password] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_password').with_secret( true )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_virtual_host').with_value( params[:rabbit_virtual_host] )
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value(false)
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_timeout_threshold').with_value('60') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_rabbit/heartbeat_rate').with_value('10') }
|
|
end
|
|
|
|
shared_examples_for 'qpid as rpc backend' do
|
|
context("with default parameters") do
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect').with_value(true) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect_timeout').with_value('0') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect_limit').with_value('0') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect_interval_min').with_value('0') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect_interval_max').with_value('0') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_reconnect_interval').with_value('0') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_heartbeat').with_value('<SERVICE DEFAULT>') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_protocol').with_value('<SERVICE DEFAULT>') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_tcp_nodelay').with_value('<SERVICE DEFAULT>') }
|
|
it { is_expected.to contain_heat_config('DEFAULT/rpc_response_timeout').with_value('<SERVICE DEFAULT>') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/amqp_durable_queues').with_value(false) }
|
|
end
|
|
|
|
context("with mandatory parameters set") do
|
|
it { is_expected.to contain_heat_config('DEFAULT/rpc_backend').with_value('qpid') }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_hostname').with_value( params[:qpid_hostname] ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_port').with_value( params[:qpid_port] ) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_username').with_value( params[:qpid_username]) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_password').with_value(params[:qpid_password]) }
|
|
it { is_expected.to contain_heat_config('oslo_messaging_qpid/qpid_password').with_secret( true ) }
|
|
end
|
|
|
|
context("failing if the rpc_backend is not present") do
|
|
before { params.delete( :rpc_backend) }
|
|
it { expect { is_expected.to raise_error(Puppet::Error) } }
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with SSL enabled with kombu' do
|
|
before do
|
|
params.merge!(
|
|
:rabbit_use_ssl => true,
|
|
:kombu_ssl_ca_certs => '/path/to/ssl/ca/certs',
|
|
:kombu_ssl_certfile => '/path/to/ssl/cert/file',
|
|
:kombu_ssl_keyfile => '/path/to/ssl/keyfile',
|
|
:kombu_ssl_version => 'TLSv1'
|
|
)
|
|
end
|
|
|
|
it do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value('true')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('/path/to/ssl/ca/certs')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('/path/to/ssl/cert/file')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('/path/to/ssl/keyfile')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('TLSv1')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with SSL enabled without kombu' do
|
|
before do
|
|
params.merge!(
|
|
:rabbit_use_ssl => true
|
|
)
|
|
end
|
|
|
|
it do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value('true')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with SSL disabled' do
|
|
before do
|
|
params.merge!(
|
|
:rabbit_use_ssl => false,
|
|
)
|
|
end
|
|
|
|
it do
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/rabbit_use_ssl').with_value('false')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_ca_certs').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_certfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_keyfile').with_value('<SERVICE DEFAULT>')
|
|
is_expected.to contain_heat_config('oslo_messaging_rabbit/kombu_ssl_version').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with SSL wrongly configured' do
|
|
before do
|
|
params.merge!(
|
|
:rabbit_use_ssl => false
|
|
)
|
|
end
|
|
|
|
context 'without required parameters' do
|
|
|
|
context 'with rabbit_use_ssl => false and kombu_ssl_ca_certs parameter' do
|
|
before { params.merge!(:kombu_ssl_ca_certs => '/path/to/ssl/ca/certs')}
|
|
it_raises 'a Puppet::Error', /The kombu_ssl_ca_certs parameter requires rabbit_use_ssl to be set to true/
|
|
end
|
|
|
|
context 'with rabbit_use_ssl => false and kombu_ssl_certfile parameter' do
|
|
before { params.merge!(:kombu_ssl_certfile => '/path/to/ssl/cert/file')}
|
|
it_raises 'a Puppet::Error', /The kombu_ssl_certfile parameter requires rabbit_use_ssl to be set to true/
|
|
end
|
|
|
|
context 'with rabbit_use_ssl => false and kombu_ssl_keyfile parameter' do
|
|
before { params.merge!(:kombu_ssl_keyfile => '/path/to/ssl/keyfile')}
|
|
it_raises 'a Puppet::Error', /The kombu_ssl_keyfile parameter requires rabbit_use_ssl to be set to true/
|
|
end
|
|
context 'with kombu_ssl_certfile set to default and custom kombu_ssl_keyfile parameter' do
|
|
before { params.merge!(
|
|
:rabbit_use_ssl => true,
|
|
:kombu_ssl_keyfile => '/path/to/ssl/keyfile',
|
|
)}
|
|
it_raises 'a Puppet::Error', /The kombu_ssl_certfile and kombu_ssl_keyfile parameters must be used together/
|
|
end
|
|
context 'with kombu_ssl_keyfile set to default and custom kombu_ssl_certfile parameter' do
|
|
before { params.merge!(
|
|
:rabbit_use_ssl => true,
|
|
:kombu_ssl_certfile => '/path/to/ssl/cert/file',
|
|
)}
|
|
it_raises 'a Puppet::Error', /The kombu_ssl_certfile and kombu_ssl_keyfile parameters must be used together/
|
|
end
|
|
end
|
|
|
|
end
|
|
|
|
shared_examples_for 'with ec2authtoken auth uri set' do
|
|
before do
|
|
params.merge!(
|
|
:keystone_ec2_uri => 'http://1.2.3.4:35357/v2.0/ec2tokens'
|
|
)
|
|
end
|
|
|
|
it do
|
|
is_expected.to contain_heat_config('ec2authtoken/auth_uri').with_value('http://1.2.3.4:35357/v2.0/ec2tokens')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with auth uri set' do
|
|
before do
|
|
params.merge!(
|
|
:auth_uri => 'http://1.2.3.4:35357/v2.0'
|
|
)
|
|
end
|
|
|
|
it do
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_uri').with_value('http://1.2.3.4:35357/v2.0')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with region_name set' do
|
|
before do
|
|
params.merge!(
|
|
:region_name => "East",
|
|
)
|
|
end
|
|
|
|
it 'has region_name set when specified' do
|
|
is_expected.to contain_heat_config('DEFAULT/region_name_for_services').with_value('East')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'without region_name set' do
|
|
it 'doesnt have region_name set by default' do
|
|
is_expected.to contain_heat_config('DEFAULT/region_name_for_services').with_value('<SERVICE DEFAULT>')
|
|
end
|
|
end
|
|
|
|
shared_examples_for "with custom keystone identity_uri" do
|
|
before do
|
|
params.merge!({
|
|
:identity_uri => 'https://foo.bar:1234/',
|
|
})
|
|
end
|
|
it 'configures identity_uri' do
|
|
is_expected.to contain_heat_config('keystone_authtoken/identity_uri').with_value("https://foo.bar:1234/");
|
|
end
|
|
end
|
|
|
|
shared_examples_for "with custom keystone identity_uri and auth_uri" do
|
|
before do
|
|
params.merge!({
|
|
:identity_uri => 'https://foo.bar:35357/',
|
|
:auth_uri => 'https://foo.bar:5000/v2.0/',
|
|
})
|
|
end
|
|
it 'configures identity_uri and auth_uri but deprecates old auth settings' do
|
|
is_expected.to contain_heat_config('keystone_authtoken/identity_uri').with_value("https://foo.bar:35357/");
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_uri').with_value("https://foo.bar:5000/v2.0/");
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_port').with(:ensure => 'absent')
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_protocol').with(:ensure => 'absent')
|
|
is_expected.to contain_heat_config('keystone_authtoken/auth_host').with(:ensure => 'absent')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with instance_user set to a string' do
|
|
before do
|
|
params.merge!(
|
|
:instance_user => "fred",
|
|
)
|
|
end
|
|
|
|
it 'has instance_user set when specified' do
|
|
is_expected.to contain_heat_config('DEFAULT/instance_user').with_value('fred')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'with instance_user set to an empty string' do
|
|
before do
|
|
params.merge!(
|
|
:instance_user => "",
|
|
)
|
|
end
|
|
|
|
it 'has instance_user set to an empty string when specified' do
|
|
is_expected.to contain_heat_config('DEFAULT/instance_user').with_value('')
|
|
end
|
|
end
|
|
|
|
shared_examples_for 'without instance_user set' do
|
|
it 'doesnt have instance_user set by default' do
|
|
is_expected.to contain_heat_config('DEFAULT/instance_user').with_enure('absent')
|
|
end
|
|
end
|
|
|
|
shared_examples_for "with enable_stack_adopt and enable_stack_abandon set" do
|
|
before do
|
|
params.merge!({
|
|
:enable_stack_adopt => true,
|
|
:enable_stack_abandon => true,
|
|
})
|
|
end
|
|
it 'sets enable_stack_adopt and enable_stack_abandon' do
|
|
is_expected.to contain_heat_config('DEFAULT/enable_stack_adopt').with_value(true);
|
|
is_expected.to contain_heat_config('DEFAULT/enable_stack_abandon').with_value(true);
|
|
end
|
|
end
|
|
|
|
context 'on Debian platforms' do
|
|
let :facts do
|
|
@default_facts.merge({
|
|
:osfamily => 'Debian',
|
|
})
|
|
end
|
|
|
|
let :platform_params do
|
|
{ :common_package_name => 'heat-common' }
|
|
end
|
|
|
|
it_configures 'heat'
|
|
end
|
|
|
|
context 'on RedHat platforms' do
|
|
let :facts do
|
|
@default_facts.merge({
|
|
:osfamily => 'RedHat',
|
|
})
|
|
end
|
|
|
|
let :platform_params do
|
|
{ :common_package_name => 'openstack-heat-common' }
|
|
end
|
|
|
|
it_configures 'heat'
|
|
end
|
|
end
|