--- /dev/null
+require 'spec_helper'
+require 'puppet'
+require 'puppet/type/nova_admin_tenant_id_setter'
+
+provider_class = Puppet::Type.type(:nova_admin_tenant_id_setter).provider(:ruby)
+
+# used to simulate an authentication response from Keystone
+# (POST v2.0/tokens)
+auth_response = {
+ 'access' => {
+ 'token' => {
+ 'id' => 'TOKEN',
+ }
+ }
+}
+
+# used to simulate a response to GET v2.0/tenants
+tenants_response = {
+ 'tenants' => [
+ {
+ 'name' => 'services',
+ 'id' => 'UUID_SERVICES'
+ },
+ {
+ 'name' => 'multiple_matches_tenant',
+ 'id' => 'UUID1'
+ },
+ {
+ 'name' => 'multiple_matches_tenant',
+ 'id' => 'UUID2'
+ },
+ ]
+}
+
+# Stub for ini_setting resource
+Puppet::Type.newtype(:ini_setting) do
+end
+
+# Stub for ini_setting provider
+Puppet::Type.newtype(:ini_setting).provide(:ruby) do
+ def create
+ end
+end
+
+describe 'Puppet::Type.type(:nova_admin_tenant_id_setter)' do
+ let :params do
+ {
+ :name => 'nova_admin_tenant_id',
+ :tenant_name => 'services',
+ :auth_username => 'nova',
+ :auth_password => 'secret',
+ :auth_tenant_name => 'admin',
+ :auth_url => 'http://127.0.0.1:35357/v2.0',
+ }
+ end
+
+ it 'should have a non-nil provider' do
+ expect(provider_class).not_to be_nil
+ end
+
+ context 'when url is correct' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").
+ to_return(:status => 200,
+ :body => auth_response.to_json,
+ :headers => {})
+ stub_request(:get, "http://127.0.0.1:35357/v2.0/tenants").
+ with(:headers => {'X-Auth-Token'=>'TOKEN'}).
+ to_return(:status => 200,
+ :body => tenants_response.to_json,
+ :headers => {})
+ end
+
+ it 'should create a resource' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect(provider.create).to be_nil
+ end
+
+ context 'when tenant id already set' do
+ it 'should create a resource, with exists? true' do
+ mock = { 'DEFAULT' => { 'nova_admin_tenant_id' => 'UUID_SERVICES' } }
+ Puppet::Util::IniConfig::File.expects(:new).returns(mock)
+ mock.expects(:read).with('/etc/neutron/neutron.conf')
+
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_true
+ expect(provider.create).to be_nil
+ end
+ end
+ end
+
+ # What happens if we ask for a tenant that does not exist?
+ context 'when tenant cannot be found' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").
+ to_return(:status => 200,
+ :body => auth_response.to_json,
+ :headers => {})
+ stub_request(:get, "http://127.0.0.1:35357/v2.0/tenants").
+ with(:headers => {'X-Auth-Token'=>'TOKEN'}).
+ to_return(:status => 200,
+ :body => tenants_response.to_json,
+ :headers => {})
+
+ params.merge!(:tenant_name => 'bad_tenant_name')
+ end
+
+ it 'should receive an api error' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect { provider.create }.to raise_error KeystoneAPIError, /Unable to find matching tenant/
+ end
+ end
+
+ # What happens if we ask for a tenant name that results in multiple
+ # matches?
+ context 'when there are multiple matching tenants' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").
+ to_return(:status => 200,
+ :body => auth_response.to_json,
+ :headers => {})
+ stub_request(:get, "http://127.0.0.1:35357/v2.0/tenants").
+ with(:headers => {'X-Auth-Token'=>'TOKEN'}).
+ to_return(:status => 200,
+ :body => tenants_response.to_json,
+ :headers => {})
+
+ params.merge!(:tenant_name => 'multiple_matches_tenant')
+ end
+
+ it 'should receive an api error' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect { provider.create }.to raise_error KeystoneAPIError, /Found multiple matches for tenant name/
+ end
+ end
+
+ # What happens if we pass a bad password?
+ context 'when password is incorrect' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").
+ to_return(:status => 401,
+ :body => auth_response.to_json,
+ :headers => {})
+ end
+
+ it 'should receive an authentication error' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect { provider.create }.to raise_error KeystoneAPIError
+ end
+ end
+
+ # What happens if the server is not listening?
+ context 'when keystone server is unavailable' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").to_raise Errno::ECONNREFUSED
+ end
+
+ it 'should receive a connection error' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect { provider.create }.to raise_error KeystoneConnectionError
+ end
+ end
+
+ # What happens if we mistype the hostname?
+ context 'when keystone server is unknown' do
+ before :each do
+ stub_request(:post, "http://127.0.0.1:35357/v2.0/tokens").to_raise SocketError, 'getaddrinfo: Name or service not known'
+ end
+
+ it 'should receive a connection error' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect { provider.create }.to raise_error KeystoneConnectionError
+ end
+ end
+
+ context 'when using secure keystone endpoint' do
+ before :each do
+ params.merge!(:auth_url => "https://127.0.0.1:35357/v2.0")
+ stub_request(:post, "https://127.0.0.1:35357/v2.0/tokens").
+ to_return(:status => 200,
+ :body => auth_response.to_json,
+ :headers => {})
+ stub_request(:get, "https://127.0.0.1:35357/v2.0/tenants").
+ with(:headers => {'X-Auth-Token'=>'TOKEN'}).
+ to_return(:status => 200,
+ :body => tenants_response.to_json,
+ :headers => {})
+ end
+
+ it 'should create a resource' do
+ resource = Puppet::Type::Nova_admin_tenant_id_setter.new(params)
+ provider = provider_class.new(resource)
+ expect(provider.exists?).to be_false
+ expect(provider.create).to be_nil
+ end
+ end
+
+end
+