NoSQL: Redis backend

Implement Redis as a NoSQL backend.

Change-Id: Id063a906b8020f5134f887d826b6ef69b3df47a8
This commit is contained in:
Emilien Macchi 2015-01-13 08:51:43 -05:00
parent 541f2b89a0
commit eeb8db61ca
2 changed files with 125 additions and 0 deletions

View File

@ -0,0 +1,46 @@
#
# Copyright (C) 2015 eNovance SAS <licensing@enovance.com>
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# == Class: cloud::database::nosql::redis
#
# Install a Redis server (used by OpenStack & monitoring services)
#
# === Parameters:
#
# [*port*]
# (optional) Port where Redis is binded.
# Used for firewall purpose.
# Default to 6379
#
# [*firewall_settings*]
# (optional) Allow to add custom parameters to firewall rules
# Should be an hash.
# Default to {}
#
class cloud::database::nosql::redis(
$port = 6379,
$firewall_settings = {},
) {
include ::redis
if $::cloud::manage_firewall {
cloud::firewall::rule{ '100 allow redis access':
port => $port,
extras => $firewall_settings,
}
}
}

View File

@ -0,0 +1,79 @@
#
# Copyright (C) 2014 eNovance SAS <licensing@enovance.com>
#
# Licensed under the Apache License, Version 2.0 (the "License"); you may
# not use this file except in compliance with the License. You may obtain
# a copy of the License at
#
# http://www.apache.org/licenses/LICENSE-2.0
#
# Unless required by applicable law or agreed to in writing, software
# distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
# WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
# License for the specific language governing permissions and limitations
# under the License.
#
# Unit tests for cloud::cache::redis
#
require 'spec_helper'
describe 'cloud::database::nosql::redis' do
shared_examples_for 'redis server' do
let :params do
{ :port => '6379' }
end
it { should create_class('redis') }
context 'with default firewall enabled' do
let :pre_condition do
"class { 'cloud': manage_firewall => true }"
end
it 'configure memcached firewall rules' do
is_expected.to contain_firewall('100 allow redis access').with(
:port => '6379',
:proto => 'tcp',
:action => 'accept',
)
end
end
context 'with custom firewall enabled' do
let :pre_condition do
"class { 'cloud': manage_firewall => true }"
end
before :each do
params.merge!(:firewall_settings => { 'limit' => '50/sec' } )
end
it 'configure memcached firewall rules with custom parameter' do
is_expected.to contain_firewall('100 allow redis access').with(
:port => '6379',
:proto => 'tcp',
:action => 'accept',
:limit => '50/sec',
)
end
end
end
context 'on Debian platforms' do
let :facts do
{ :osfamily => 'Debian' }
end
it_configures 'redis server'
end
context 'on RedHat platforms' do
let :facts do
{ :osfamily => 'RedHat' }
end
it_configures 'redis server'
end
end