require 'spec_helper_acceptance' describe 'basic swift' do context 'default parameters' do it 'should work with no errors' do pp= <<-EOS Exec { logoutput => 'on_failure' } include ::apt # some packages are not autoupgraded in trusty. # it will be fixed in liberty, but broken in kilo. $need_to_be_upgraded = ['python-tz', 'python-pbr'] apt::source { 'trusty-updates-kilo': location => 'http://ubuntu-cloud.archive.canonical.com/ubuntu/', release => 'trusty-updates', required_packages => 'ubuntu-cloud-keyring', repos => 'kilo/main', trusted_source => true, } ~> exec { '/usr/bin/apt-get -y dist-upgrade': refreshonly => true, } Apt::Source['trusty-updates-kilo'] -> Package<| |> class { '::mysql::server': } package { 'curl': ensure => present } class { '::memcached': listen_ip => '127.0.0.1', } # Keystone resources, needed by Swift to run class { '::keystone::db::mysql': password => 'keystone', } class { '::keystone': verbose => true, debug => true, database_connection => 'mysql://keystone:keystone@127.0.0.1/keystone', admin_token => 'admin_token', enabled => true, } class { '::keystone::roles::admin': email => 'test@example.tld', password => 'a_big_secret', } class { '::keystone::endpoint': public_url => "https://${::fqdn}:5000/", admin_url => "https://${::fqdn}:35357/", } # Swift resources class { '::swift': # not sure how I want to deal with this shared secret swift_hash_suffix => 'secrete', package_ensure => latest, } class { '::swift::keystone::auth': password => 'a_big_secret', } # === Configure Storage class { '::swift::storage': storage_local_net_ip => '127.0.0.1', } # create xfs partitions on a loopback device and mounts them swift::storage::loopback { '2': require => Class['swift'], } # sets up storage nodes which is composed of a single # device that contains an endpoint for an object, account, and container swift::storage::node { '2': mnt_base_dir => '/srv/node', weight => 1, manage_ring => true, zone => '2', storage_local_net_ip => '127.0.0.1', require => Swift::Storage::Loopback[2] , } class { '::swift::ringbuilder': part_power => '18', replicas => '1', min_part_hours => 1, require => Class['swift'], } class { '::swift::proxy': proxy_local_net_ip => '127.0.0.1', pipeline => ['healthcheck', 'cache', 'tempauth', 'proxy-server'], account_autocreate => true, require => Class['swift::ringbuilder'], } class { '::swift::proxy::authtoken': admin_password => 'a_big_secret', } class { ['::swift::proxy::healthcheck', '::swift::proxy::cache', '::swift::proxy::tempauth']: } EOS # Need to be run 2 times because we have an exported when creating the ring. apply_manifest(pp, :catch_failures => false) apply_manifest(pp, :catch_failures => true) # The third run tests idempotency apply_manifest(pp, :catch_changes => true) end describe port(8080) do it { is_expected.to be_listening.with('tcp') } end end end