chef 11.10.0.alpha.1-x86-mingw32 → 11.10.0.rc.0-x86-mingw32
Sign up to get free protection for your applications and to get access to all the features.
- data/README.md +57 -36
- data/distro/common/html/chef-client.8.html +4 -4
- data/distro/common/html/chef-expander.8.html +4 -4
- data/distro/common/html/chef-expanderctl.8.html +4 -4
- data/distro/common/html/chef-server-webui.8.html +4 -4
- data/distro/common/html/chef-server.8.html +4 -4
- data/distro/common/html/chef-shell.1.html +4 -4
- data/distro/common/html/chef-solo.8.html +4 -4
- data/distro/common/html/chef-solr.8.html +5 -5
- data/distro/common/html/knife-bootstrap.1.html +4 -4
- data/distro/common/html/knife-client.1.html +4 -4
- data/distro/common/html/knife-configure.1.html +4 -4
- data/distro/common/html/knife-cookbook-site.1.html +4 -4
- data/distro/common/html/knife-cookbook.1.html +4 -4
- data/distro/common/html/knife-data-bag.1.html +4 -4
- data/distro/common/html/knife-environment.1.html +4 -4
- data/distro/common/html/knife-exec.1.html +4 -4
- data/distro/common/html/knife-index.1.html +4 -4
- data/distro/common/html/knife-node.1.html +4 -4
- data/distro/common/html/knife-role.1.html +4 -4
- data/distro/common/html/knife-search.1.html +4 -4
- data/distro/common/html/knife-ssh.1.html +4 -4
- data/distro/common/html/knife-status.1.html +4 -4
- data/distro/common/html/knife-tag.1.html +4 -4
- data/distro/common/html/knife.1.html +4 -4
- data/distro/common/man/man1/knife-bootstrap.1 +58 -64
- data/distro/common/man/man1/knife-client.1 +19 -22
- data/distro/common/man/man1/knife-configure.1 +37 -46
- data/distro/common/man/man1/knife-cookbook-site.1 +14 -17
- data/distro/common/man/man1/knife-cookbook.1 +15 -18
- data/distro/common/man/man1/knife-data-bag.1 +14 -17
- data/distro/common/man/man1/knife-delete.1 +38 -47
- data/distro/common/man/man1/knife-deps.1 +39 -48
- data/distro/common/man/man1/knife-diff.1 +43 -52
- data/distro/common/man/man1/knife-download.1 +47 -53
- data/distro/common/man/man1/knife-edit.1 +32 -41
- data/distro/common/man/man1/knife-environment.1 +14 -17
- data/distro/common/man/man1/knife-exec.1 +52 -61
- data/distro/common/man/man1/knife-index-rebuild.1 +1 -61
- data/distro/common/man/man1/knife-list.1 +47 -59
- data/distro/common/man/man1/knife-node.1 +15 -18
- data/distro/common/man/man1/knife-raw.1 +28 -46
- data/distro/common/man/man1/knife-recipe-list.1 +1 -61
- data/distro/common/man/man1/knife-role.1 +19 -25
- data/distro/common/man/man1/knife-search.1 +53 -62
- data/distro/common/man/man1/knife-show.1 +36 -28
- data/distro/common/man/man1/knife-ssh.1 +55 -61
- data/distro/common/man/man1/knife-status.1 +34 -43
- data/distro/common/man/man1/knife-tag.1 +14 -17
- data/distro/common/man/man1/knife-upload.1 +47 -56
- data/distro/common/man/man1/knife-user.1 +17 -20
- data/distro/common/man/man1/knife-xargs.1 +60 -69
- data/lib/chef/application.rb +3 -1
- data/lib/chef/application/windows_service.rb +0 -1
- data/lib/chef/client.rb +41 -152
- data/lib/chef/config.rb +19 -23
- data/lib/chef/data_bag.rb +1 -1
- data/lib/chef/data_bag_item.rb +1 -1
- data/lib/chef/exceptions.rb +8 -0
- data/lib/chef/formatters/doc.rb +15 -0
- data/lib/chef/formatters/error_inspectors/api_error_formatting.rb +2 -1
- data/lib/chef/http.rb +18 -8
- data/lib/chef/http/authenticator.rb +4 -0
- data/lib/chef/http/cookie_manager.rb +3 -0
- data/lib/chef/http/decompressor.rb +4 -0
- data/lib/chef/http/json_input.rb +4 -0
- data/lib/chef/http/json_output.rb +4 -0
- data/lib/chef/http/validate_content_length.rb +94 -0
- data/lib/chef/knife.rb +0 -1
- data/lib/chef/knife/configure.rb +6 -6
- data/lib/chef/knife/cookbook_create.rb +2 -2
- data/lib/chef/knife/core/subcommand_loader.rb +49 -3
- data/lib/chef/knife/ssh.rb +34 -4
- data/lib/chef/mixin/path_sanity.rb +1 -0
- data/lib/chef/monologger.rb +1 -2
- data/lib/chef/node.rb +7 -0
- data/lib/chef/policy_builder.rb +49 -0
- data/lib/chef/policy_builder/expand_node_object.rb +230 -0
- data/lib/chef/policy_builder/policyfile.rb +338 -0
- data/lib/chef/provider/file.rb +15 -5
- data/lib/chef/provider/group.rb +6 -2
- data/lib/chef/provider/group/windows.rb +12 -2
- data/lib/chef/provider/http_request.rb +3 -2
- data/lib/chef/provider/package.rb +1 -0
- data/lib/chef/provider/package/aix.rb +1 -1
- data/lib/chef/provider/service/debian.rb +7 -2
- data/lib/chef/resource/file.rb +8 -1
- data/lib/chef/resource/package.rb +9 -0
- data/lib/chef/resource/service.rb +0 -1
- data/lib/chef/rest.rb +2 -0
- data/lib/chef/run_context.rb +1 -1
- data/lib/chef/util/file_edit.rb +1 -1
- data/lib/chef/util/windows/net_group.rb +7 -6
- data/lib/chef/version.rb +1 -1
- data/lib/chef/win32/version.rb +31 -18
- data/spec/data/cookbooks/preseed/templates/default/preseed-template-variables.seed +1 -0
- data/spec/functional/resource/file_spec.rb +0 -1
- data/spec/functional/resource/group_spec.rb +96 -16
- data/spec/functional/resource/package_spec.rb +17 -0
- data/spec/functional/resource/user_spec.rb +2 -2
- data/spec/functional/win32/versions_spec.rb +39 -0
- data/spec/integration/client/client_spec.rb +27 -28
- data/spec/spec_helper.rb +2 -0
- data/spec/support/platform_helpers.rb +7 -1
- data/spec/support/shared/functional/file_resource.rb +83 -43
- data/spec/unit/application_spec.rb +7 -5
- data/spec/unit/client_spec.rb +10 -3
- data/spec/unit/config_spec.rb +0 -30
- data/spec/unit/cookbook_spec.rb +1 -0
- data/spec/unit/data_bag_item_spec.rb +8 -0
- data/spec/unit/data_bag_spec.rb +6 -0
- data/spec/unit/http_spec.rb +48 -0
- data/spec/unit/knife/core/subcommand_loader_spec.rb +77 -1
- data/spec/unit/knife/ssh_spec.rb +107 -0
- data/spec/unit/mixin/path_sanity_spec.rb +6 -0
- data/spec/unit/mixin/securable_spec.rb +77 -3
- data/spec/unit/monologger_spec.rb +45 -0
- data/spec/unit/node_spec.rb +16 -0
- data/spec/unit/policy_builder/expand_node_object_spec.rb +320 -0
- data/spec/unit/policy_builder/policyfile_spec.rb +399 -0
- data/spec/unit/policy_builder_spec.rb +26 -0
- data/spec/unit/provider/deploy_spec.rb +3 -0
- data/spec/unit/provider/group/windows_spec.rb +1 -0
- data/spec/unit/provider/http_request_spec.rb +23 -1
- data/spec/unit/provider/service/debian_service_spec.rb +50 -19
- data/spec/unit/recipe_spec.rb +4 -0
- data/spec/unit/resource/package_spec.rb +5 -0
- data/spec/unit/rest_spec.rb +375 -278
- data/spec/unit/run_context_spec.rb +4 -0
- metadata +120 -75
- checksums.yaml +0 -7
data/spec/unit/client_spec.rb
CHANGED
@@ -169,6 +169,7 @@ shared_examples_for Chef::Client do
|
|
169
169
|
|
170
170
|
it "should identify the node and run ohai, then register the client" do
|
171
171
|
mock_chef_rest_for_node = mock("Chef::REST (node)")
|
172
|
+
mock_chef_rest_for_cookbook_sync = mock("Chef::REST (cookbook sync)")
|
172
173
|
mock_chef_rest_for_node_save = mock("Chef::REST (node save)")
|
173
174
|
mock_chef_runner = mock("Chef::Runner")
|
174
175
|
|
@@ -201,7 +202,8 @@ shared_examples_for Chef::Client do
|
|
201
202
|
# ---Client#sync_cookbooks -- downloads the list of cookbooks to sync
|
202
203
|
#
|
203
204
|
Chef::CookbookSynchronizer.any_instance.should_receive(:sync_cookbooks)
|
204
|
-
|
205
|
+
Chef::REST.should_receive(:new).with(Chef::Config[:chef_server_url]).and_return(mock_chef_rest_for_cookbook_sync)
|
206
|
+
mock_chef_rest_for_cookbook_sync.should_receive(:post).with("environments/_default/cookbook_versions", {:run_list => []}).and_return({})
|
205
207
|
|
206
208
|
# --Client#converge
|
207
209
|
Chef::Runner.should_receive(:new).and_return(mock_chef_runner)
|
@@ -274,6 +276,7 @@ shared_examples_for Chef::Client do
|
|
274
276
|
Chef::Client.clear_notifications
|
275
277
|
Chef::Node.stub!(:find_or_create).and_return(@node)
|
276
278
|
@node.stub!(:save)
|
279
|
+
@client.load_node
|
277
280
|
@client.build_node
|
278
281
|
end
|
279
282
|
|
@@ -329,7 +332,10 @@ shared_examples_for Chef::Client do
|
|
329
332
|
@node[:roles].should be_nil
|
330
333
|
@node[:recipes].should be_nil
|
331
334
|
|
332
|
-
@client.
|
335
|
+
@client.policy_builder.stub!(:node).and_return(@node)
|
336
|
+
|
337
|
+
# chefspec and possibly others use the return value of this method
|
338
|
+
@client.build_node.should == @node
|
333
339
|
|
334
340
|
# check post-conditions.
|
335
341
|
@node[:roles].should_not be_nil
|
@@ -434,7 +440,8 @@ shared_examples_for Chef::Client do
|
|
434
440
|
|
435
441
|
@node.should_receive(:save).and_return(nil)
|
436
442
|
|
437
|
-
@client.
|
443
|
+
@client.policy_builder.stub(:node).and_return(@node)
|
444
|
+
@client.policy_builder.build_node
|
438
445
|
|
439
446
|
@node[:roles].should_not be_nil
|
440
447
|
@node[:roles].should eql(['test_role'])
|
data/spec/unit/config_spec.rb
CHANGED
@@ -121,29 +121,6 @@ describe Chef::Config do
|
|
121
121
|
|
122
122
|
end
|
123
123
|
|
124
|
-
describe "config attribute writer: log_method=" do
|
125
|
-
describe "when given an object that responds to sync= e.g. IO" do
|
126
|
-
it "should configure itself to use the IO as log_location" do
|
127
|
-
Chef::Config.log_location = STDOUT
|
128
|
-
Chef::Config.log_location.should == STDOUT
|
129
|
-
end
|
130
|
-
end
|
131
|
-
|
132
|
-
describe "when given an object that is stringable (to_str)" do
|
133
|
-
before do
|
134
|
-
@mockfile = mock("File", :path => "/var/log/chef/client.log", :sync= => true)
|
135
|
-
File.should_receive(:new).
|
136
|
-
with("/var/log/chef/client.log", "a").
|
137
|
-
and_return(@mockfile)
|
138
|
-
end
|
139
|
-
|
140
|
-
it "should configure itself to use a File object based upon the String" do
|
141
|
-
Chef::Config.log_location = "/var/log/chef/client.log"
|
142
|
-
Chef::Config.log_location.path.should == "/var/log/chef/client.log"
|
143
|
-
end
|
144
|
-
end
|
145
|
-
end
|
146
|
-
|
147
124
|
describe "class method: plaform_specific_path" do
|
148
125
|
it "should return given path on non-windows systems" do
|
149
126
|
platform_mock :unix do
|
@@ -354,13 +331,6 @@ describe Chef::Config do
|
|
354
331
|
end
|
355
332
|
end
|
356
333
|
|
357
|
-
describe "Chef::Config[:log_location]" do
|
358
|
-
it "raises ConfigurationError when log_location directory is missing" do
|
359
|
-
missing_path = "/tmp/non-existing-dir/file"
|
360
|
-
expect{Chef::Config.log_location = missing_path}.to raise_error Chef::Exceptions::ConfigurationError
|
361
|
-
end
|
362
|
-
end
|
363
|
-
|
364
334
|
describe "Chef::Config[:event_handlers]" do
|
365
335
|
it "sets a event_handlers to an empty array by default" do
|
366
336
|
Chef::Config[:event_handlers].should eq([])
|
data/spec/unit/cookbook_spec.rb
CHANGED
@@ -70,6 +70,7 @@ describe Chef::CookbookVersion do
|
|
70
70
|
|
71
71
|
it "should allow you to include a fully-qualified recipe using the DSL" do
|
72
72
|
# DSL method include_recipe allows multiple arguments, so extract the first
|
73
|
+
@node.should_receive(:loaded_recipe).with(:openldap, "gigantor")
|
73
74
|
recipe = @run_context.include_recipe("openldap::gigantor").first
|
74
75
|
|
75
76
|
recipe.recipe_name.should == "gigantor"
|
@@ -70,6 +70,14 @@ describe Chef::DataBagItem do
|
|
70
70
|
lambda { @data_bag_item.raw_data = { "id" => "h1-_" } }.should_not raise_error(ArgumentError)
|
71
71
|
end
|
72
72
|
|
73
|
+
it "should accept alphanum.alphanum for the id" do
|
74
|
+
lambda { @data_bag_item.raw_data = { "id" => "foo.bar" } }.should_not raise_error(ArgumentError)
|
75
|
+
end
|
76
|
+
|
77
|
+
it "should accept .alphanum for the id" do
|
78
|
+
lambda { @data_bag_item.raw_data = { "id" => ".bozo" } }.should_not raise_error(ArgumentError)
|
79
|
+
end
|
80
|
+
|
73
81
|
it "should raise an exception if the id contains anything but alphanum/-/_" do
|
74
82
|
lambda { @data_bag_item.raw_data = { "id" => "!@#" } }.should raise_error(ArgumentError)
|
75
83
|
end
|
data/spec/unit/data_bag_spec.rb
CHANGED
@@ -47,6 +47,12 @@ describe Chef::DataBag do
|
|
47
47
|
it "should throw an ArgumentError if you feed it anything but a string" do
|
48
48
|
lambda { @data_bag.name Hash.new }.should raise_error(ArgumentError)
|
49
49
|
end
|
50
|
+
|
51
|
+
[ ".", "-", "_", "1"].each do |char|
|
52
|
+
it "should allow a '#{char}' character in the data bag name" do
|
53
|
+
@data_bag.name("clown#{char}clown").should == "clown#{char}clown"
|
54
|
+
end
|
55
|
+
end
|
50
56
|
end
|
51
57
|
|
52
58
|
describe "deserialize" do
|
@@ -0,0 +1,48 @@
|
|
1
|
+
#
|
2
|
+
# Author:: Xabier de Zuazo (xabier@onddo.com)
|
3
|
+
# Copyright:: Copyright (c) 2014 Onddo Labs, SL.
|
4
|
+
# License:: Apache License, Version 2.0
|
5
|
+
#
|
6
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
+
# you may not use this file except in compliance with the License.
|
8
|
+
# You may obtain a copy of the License at
|
9
|
+
#
|
10
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
+
#
|
12
|
+
# Unless required by applicable law or agreed to in writing, software
|
13
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
+
# See the License for the specific language governing permissions and
|
16
|
+
# limitations under the License.
|
17
|
+
#
|
18
|
+
|
19
|
+
require 'spec_helper'
|
20
|
+
|
21
|
+
require 'chef/http'
|
22
|
+
require 'chef/http/basic_client'
|
23
|
+
|
24
|
+
describe Chef::HTTP do
|
25
|
+
|
26
|
+
describe "head" do
|
27
|
+
|
28
|
+
it 'should return nil for a "200 Success" response (CHEF-4762)' do
|
29
|
+
resp = Net::HTTPOK.new("1.1", 200, "OK")
|
30
|
+
resp.should_receive(:read_body).and_return(nil)
|
31
|
+
http = Chef::HTTP.new("")
|
32
|
+
Chef::HTTP::BasicClient.any_instance.should_receive(:request).and_return(["request", resp])
|
33
|
+
|
34
|
+
http.head("http://www.getchef.com/").should eql(nil)
|
35
|
+
end
|
36
|
+
|
37
|
+
it 'should return false for a "304 Not Modified" response (CHEF-4762)' do
|
38
|
+
resp = Net::HTTPNotModified.new("1.1", 304, "Not Modified")
|
39
|
+
resp.should_receive(:read_body).and_return(nil)
|
40
|
+
http = Chef::HTTP.new("")
|
41
|
+
Chef::HTTP::BasicClient.any_instance.should_receive(:request).and_return(["request", resp])
|
42
|
+
|
43
|
+
http.head("http://www.getchef.com/").should eql(false)
|
44
|
+
end
|
45
|
+
|
46
|
+
end # head
|
47
|
+
|
48
|
+
end
|
@@ -20,6 +20,7 @@ require 'spec_helper'
|
|
20
20
|
|
21
21
|
describe Chef::Knife::SubcommandLoader do
|
22
22
|
before do
|
23
|
+
|
23
24
|
@home = File.join(CHEF_SPEC_DATA, 'knife-home')
|
24
25
|
@env = {'HOME' => @home}
|
25
26
|
@loader = Chef::Knife::SubcommandLoader.new(File.join(CHEF_SPEC_DATA, 'knife-site-subcommands'), @env)
|
@@ -46,7 +47,7 @@ describe Chef::Knife::SubcommandLoader do
|
|
46
47
|
$LOAD_PATH.should_receive(:map).and_return([])
|
47
48
|
if Gem::Specification.respond_to? :latest_specs
|
48
49
|
Gem::Specification.should_receive(:latest_specs).with(true).and_return(gems)
|
49
|
-
gems[0].should_receive(:matches_for_glob).with(/chef\/knife\/\*\.rb{(.*),\.rb,(.*)}/).and_return(gem_files)
|
50
|
+
gems[0].should_receive(:matches_for_glob).with(/chef\/knife\/\*\.rb\{(.*),\.rb,(.*)\}/).and_return(gem_files)
|
50
51
|
else
|
51
52
|
Gem.source_index.should_receive(:latest_specs).with(true).and_return(gems)
|
52
53
|
gems[0].should_receive(:require_paths).twice.and_return(['lib'])
|
@@ -71,4 +72,79 @@ describe Chef::Knife::SubcommandLoader do
|
|
71
72
|
expected_command = File.join(CHEF_SPEC_DATA, 'knife-site-subcommands', 'plugins', 'knife', 'example_subcommand.rb')
|
72
73
|
@loader.site_subcommands.should include(expected_command)
|
73
74
|
end
|
75
|
+
|
76
|
+
describe "finding 3rd party plugins" do
|
77
|
+
let(:env_home) { "/home/alice" }
|
78
|
+
let(:manifest_path) { env_home + "/.chef/plugin_manifest.json" }
|
79
|
+
|
80
|
+
before do
|
81
|
+
env_dup = ENV.to_hash
|
82
|
+
ENV.stub(:[]).and_return { |key| env_dup[key] }
|
83
|
+
ENV.stub(:[]).with("HOME").and_return(env_home)
|
84
|
+
end
|
85
|
+
|
86
|
+
context "when there is not a ~/.chef/plugin_manifest.json file" do
|
87
|
+
before do
|
88
|
+
File.stub(:exist?).with(manifest_path).and_return(false)
|
89
|
+
end
|
90
|
+
|
91
|
+
it "searches rubygems for plugins" do
|
92
|
+
if Gem::Specification.respond_to?(:latest_specs)
|
93
|
+
Gem::Specification.should_receive(:latest_specs).and_call_original
|
94
|
+
else
|
95
|
+
Gem.source_index.should_receive(:latest_specs).and_call_original
|
96
|
+
end
|
97
|
+
@loader.subcommand_files.each do |require_path|
|
98
|
+
require_path.should match(/chef\/knife\/.*|plugins\/knife\/.*/)
|
99
|
+
end
|
100
|
+
end
|
101
|
+
|
102
|
+
context "and HOME environment variable is not set" do
|
103
|
+
before do
|
104
|
+
ENV.stub(:[]).with("HOME").and_return(nil)
|
105
|
+
end
|
106
|
+
|
107
|
+
it "searches rubygems for plugins" do
|
108
|
+
if Gem::Specification.respond_to?(:latest_specs)
|
109
|
+
Gem::Specification.should_receive(:latest_specs).and_call_original
|
110
|
+
else
|
111
|
+
Gem.source_index.should_receive(:latest_specs).and_call_original
|
112
|
+
end
|
113
|
+
@loader.subcommand_files.each do |require_path|
|
114
|
+
require_path.should match(/chef\/knife\/.*|plugins\/knife\/.*/)
|
115
|
+
end
|
116
|
+
end
|
117
|
+
end
|
118
|
+
|
119
|
+
end
|
120
|
+
|
121
|
+
context "when there is a ~/.chef/plugin_manifest.json file" do
|
122
|
+
let(:ec2_server_create_plugin) { "/usr/lib/ruby/gems/knife-ec2-0.5.12/lib/chef/knife/ec2_server_create.rb" }
|
123
|
+
|
124
|
+
let(:manifest_content) do
|
125
|
+
{ "plugins" => {
|
126
|
+
"knife-ec2" => {
|
127
|
+
"paths" => [
|
128
|
+
ec2_server_create_plugin
|
129
|
+
]
|
130
|
+
}
|
131
|
+
}
|
132
|
+
}
|
133
|
+
end
|
134
|
+
|
135
|
+
let(:manifest_json) { Chef::JSONCompat.to_json(manifest_content) }
|
136
|
+
|
137
|
+
before do
|
138
|
+
File.stub(:exist?).with(manifest_path).and_return(true)
|
139
|
+
File.stub(:read).with(manifest_path).and_return(manifest_json)
|
140
|
+
end
|
141
|
+
|
142
|
+
it "uses paths from the manifest instead of searching gems" do
|
143
|
+
Gem::Specification.should_not_receive(:latest_specs).and_call_original
|
144
|
+
@loader.subcommand_files.should include(ec2_server_create_plugin)
|
145
|
+
end
|
146
|
+
|
147
|
+
end
|
148
|
+
end
|
149
|
+
|
74
150
|
end
|
data/spec/unit/knife/ssh_spec.rb
CHANGED
@@ -280,4 +280,111 @@ describe Chef::Knife::Ssh do
|
|
280
280
|
end
|
281
281
|
end
|
282
282
|
end
|
283
|
+
|
284
|
+
describe "#configure_password" do
|
285
|
+
before do
|
286
|
+
@knife.config.delete(:ssh_password_ng)
|
287
|
+
@knife.config.delete(:ssh_password)
|
288
|
+
end
|
289
|
+
|
290
|
+
context "when setting ssh_password_ng from knife ssh" do
|
291
|
+
# in this case ssh_password_ng exists, but ssh_password does not
|
292
|
+
it "should prompt for a password when ssh_passsword_ng is nil" do
|
293
|
+
@knife.config[:ssh_password_ng] = nil
|
294
|
+
@knife.should_receive(:get_password).and_return("mysekretpassw0rd")
|
295
|
+
@knife.configure_password
|
296
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
297
|
+
end
|
298
|
+
|
299
|
+
it "should set ssh_password to false if ssh_password_ng is false" do
|
300
|
+
@knife.config[:ssh_password_ng] = false
|
301
|
+
@knife.should_not_receive(:get_password)
|
302
|
+
@knife.configure_password
|
303
|
+
@knife.config[:ssh_password].should be_false
|
304
|
+
end
|
305
|
+
|
306
|
+
it "should set ssh_password to ssh_password_ng if we set a password" do
|
307
|
+
@knife.config[:ssh_password_ng] = "mysekretpassw0rd"
|
308
|
+
@knife.should_not_receive(:get_password)
|
309
|
+
@knife.configure_password
|
310
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
311
|
+
end
|
312
|
+
end
|
313
|
+
|
314
|
+
context "when setting ssh_password from knife bootstrap / knife * server create" do
|
315
|
+
# in this case ssh_password exists, but ssh_password_ng does not
|
316
|
+
it "should set ssh_password to nil when ssh_password is nil" do
|
317
|
+
@knife.config[:ssh_password] = nil
|
318
|
+
@knife.should_not_receive(:get_password)
|
319
|
+
@knife.configure_password
|
320
|
+
@knife.config[:ssh_password].should be_nil
|
321
|
+
end
|
322
|
+
|
323
|
+
it "should set ssh_password to false when ssh_password is false" do
|
324
|
+
@knife.config[:ssh_password] = false
|
325
|
+
@knife.should_not_receive(:get_password)
|
326
|
+
@knife.configure_password
|
327
|
+
@knife.config[:ssh_password].should be_false
|
328
|
+
end
|
329
|
+
|
330
|
+
it "should set ssh_password to ssh_password if we set a password" do
|
331
|
+
@knife.config[:ssh_password] = "mysekretpassw0rd"
|
332
|
+
@knife.should_not_receive(:get_password)
|
333
|
+
@knife.configure_password
|
334
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
335
|
+
end
|
336
|
+
end
|
337
|
+
context "when setting ssh_password in the config variable" do
|
338
|
+
before(:each) do
|
339
|
+
Chef::Config[:knife][:ssh_password] = "my_knife_passw0rd"
|
340
|
+
end
|
341
|
+
context "when setting ssh_password_ng from knife ssh" do
|
342
|
+
# in this case ssh_password_ng exists, but ssh_password does not
|
343
|
+
it "should prompt for a password when ssh_passsword_ng is nil" do
|
344
|
+
@knife.config[:ssh_password_ng] = nil
|
345
|
+
@knife.should_receive(:get_password).and_return("mysekretpassw0rd")
|
346
|
+
@knife.configure_password
|
347
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
348
|
+
end
|
349
|
+
|
350
|
+
it "should set ssh_password to the configured knife.rb value if ssh_password_ng is false" do
|
351
|
+
@knife.config[:ssh_password_ng] = false
|
352
|
+
@knife.should_not_receive(:get_password)
|
353
|
+
@knife.configure_password
|
354
|
+
@knife.config[:ssh_password].should == "my_knife_passw0rd"
|
355
|
+
end
|
356
|
+
|
357
|
+
it "should set ssh_password to ssh_password_ng if we set a password" do
|
358
|
+
@knife.config[:ssh_password_ng] = "mysekretpassw0rd"
|
359
|
+
@knife.should_not_receive(:get_password)
|
360
|
+
@knife.configure_password
|
361
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
362
|
+
end
|
363
|
+
end
|
364
|
+
|
365
|
+
context "when setting ssh_password from knife bootstrap / knife * server create" do
|
366
|
+
# in this case ssh_password exists, but ssh_password_ng does not
|
367
|
+
it "should set ssh_password to the configured knife.rb value when ssh_password is nil" do
|
368
|
+
@knife.config[:ssh_password] = nil
|
369
|
+
@knife.should_not_receive(:get_password)
|
370
|
+
@knife.configure_password
|
371
|
+
@knife.config[:ssh_password].should == "my_knife_passw0rd"
|
372
|
+
end
|
373
|
+
|
374
|
+
it "should set ssh_password to the configured knife.rb value when ssh_password is false" do
|
375
|
+
@knife.config[:ssh_password] = false
|
376
|
+
@knife.should_not_receive(:get_password)
|
377
|
+
@knife.configure_password
|
378
|
+
@knife.config[:ssh_password].should == "my_knife_passw0rd"
|
379
|
+
end
|
380
|
+
|
381
|
+
it "should set ssh_password to ssh_password if we set a password" do
|
382
|
+
@knife.config[:ssh_password] = "mysekretpassw0rd"
|
383
|
+
@knife.should_not_receive(:get_password)
|
384
|
+
@knife.configure_password
|
385
|
+
@knife.config[:ssh_password].should == "mysekretpassw0rd"
|
386
|
+
end
|
387
|
+
end
|
388
|
+
end
|
389
|
+
end
|
283
390
|
end
|
@@ -38,6 +38,12 @@ describe Chef::Mixin::PathSanity do
|
|
38
38
|
Chef::Platform.stub!(:windows?).and_return(false)
|
39
39
|
end
|
40
40
|
|
41
|
+
it "adds all useful PATHs even if environment is an empty hash" do
|
42
|
+
env={}
|
43
|
+
@sanity.enforce_path_sanity(env)
|
44
|
+
env["PATH"].should == "#{@ruby_bindir}:#{@gem_bindir}:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin"
|
45
|
+
end
|
46
|
+
|
41
47
|
it "adds all useful PATHs that are not yet in PATH to PATH" do
|
42
48
|
env = {"PATH" => ""}
|
43
49
|
@sanity.enforce_path_sanity(env)
|
@@ -1,3 +1,4 @@
|
|
1
|
+
# encoding: UTF-8
|
1
2
|
#
|
2
3
|
# Author:: Mark Mzyk (<mmzyk@opscode.com>)
|
3
4
|
# Copyright:: Copyright (c) 2011 Opscode, Inc.
|
@@ -29,13 +30,13 @@ describe Chef::Mixin::Securable do
|
|
29
30
|
it "should accept a group name or id for group" do
|
30
31
|
lambda { @securable.group "root" }.should_not raise_error(ArgumentError)
|
31
32
|
lambda { @securable.group 123 }.should_not raise_error(ArgumentError)
|
32
|
-
lambda { @securable.group "
|
33
|
+
lambda { @securable.group "+bad:group" }.should raise_error(ArgumentError)
|
33
34
|
end
|
34
35
|
|
35
36
|
it "should accept a user name or id for owner" do
|
36
37
|
lambda { @securable.owner "root" }.should_not raise_error(ArgumentError)
|
37
38
|
lambda { @securable.owner 123 }.should_not raise_error(ArgumentError)
|
38
|
-
lambda { @securable.owner "
|
39
|
+
lambda { @securable.owner "+bad:owner" }.should raise_error(ArgumentError)
|
39
40
|
end
|
40
41
|
|
41
42
|
it "allows the owner to be specified as #user" do
|
@@ -53,8 +54,81 @@ describe Chef::Mixin::Securable do
|
|
53
54
|
end
|
54
55
|
end
|
55
56
|
|
56
|
-
it "should accept
|
57
|
+
it "should accept group/owner names with spaces and backslashes" do
|
57
58
|
lambda { @securable.group 'test\ group' }.should_not raise_error(ArgumentError)
|
59
|
+
lambda { @securable.owner 'test\ group' }.should_not raise_error(ArgumentError)
|
60
|
+
end
|
61
|
+
|
62
|
+
it "should accept group/owner names that are a single character or digit" do
|
63
|
+
lambda { @securable.group 'v' }.should_not raise_error(ArgumentError)
|
64
|
+
lambda { @securable.group '1' }.should_not raise_error(ArgumentError)
|
65
|
+
lambda { @securable.owner 'v' }.should_not raise_error(ArgumentError)
|
66
|
+
lambda { @securable.owner '1' }.should_not raise_error(ArgumentError)
|
67
|
+
end
|
68
|
+
|
69
|
+
it "should not accept group/owner names starting with '-', '+', or '~'" do
|
70
|
+
lambda { @securable.group '-test' }.should raise_error(ArgumentError)
|
71
|
+
lambda { @securable.group '+test' }.should raise_error(ArgumentError)
|
72
|
+
lambda { @securable.group '~test' }.should raise_error(ArgumentError)
|
73
|
+
lambda { @securable.group 'te-st' }.should_not raise_error(ArgumentError)
|
74
|
+
lambda { @securable.group 'te+st' }.should_not raise_error(ArgumentError)
|
75
|
+
lambda { @securable.group 'te~st' }.should_not raise_error(ArgumentError)
|
76
|
+
lambda { @securable.owner '-test' }.should raise_error(ArgumentError)
|
77
|
+
lambda { @securable.owner '+test' }.should raise_error(ArgumentError)
|
78
|
+
lambda { @securable.owner '~test' }.should raise_error(ArgumentError)
|
79
|
+
lambda { @securable.owner 'te-st' }.should_not raise_error(ArgumentError)
|
80
|
+
lambda { @securable.owner 'te+st' }.should_not raise_error(ArgumentError)
|
81
|
+
lambda { @securable.owner 'te~st' }.should_not raise_error(ArgumentError)
|
82
|
+
end
|
83
|
+
|
84
|
+
it "should not accept group/owner names containing ':', ',' or non-space whitespace" do
|
85
|
+
lambda { @securable.group ':test' }.should raise_error(ArgumentError)
|
86
|
+
lambda { @securable.group 'te:st' }.should raise_error(ArgumentError)
|
87
|
+
lambda { @securable.group ',test' }.should raise_error(ArgumentError)
|
88
|
+
lambda { @securable.group 'te,st' }.should raise_error(ArgumentError)
|
89
|
+
lambda { @securable.group "\ttest" }.should raise_error(ArgumentError)
|
90
|
+
lambda { @securable.group "te\tst" }.should raise_error(ArgumentError)
|
91
|
+
lambda { @securable.group "\rtest" }.should raise_error(ArgumentError)
|
92
|
+
lambda { @securable.group "te\rst" }.should raise_error(ArgumentError)
|
93
|
+
lambda { @securable.group "\ftest" }.should raise_error(ArgumentError)
|
94
|
+
lambda { @securable.group "te\fst" }.should raise_error(ArgumentError)
|
95
|
+
lambda { @securable.group "\0test" }.should raise_error(ArgumentError)
|
96
|
+
lambda { @securable.group "te\0st" }.should raise_error(ArgumentError)
|
97
|
+
lambda { @securable.owner ':test' }.should raise_error(ArgumentError)
|
98
|
+
lambda { @securable.owner 'te:st' }.should raise_error(ArgumentError)
|
99
|
+
lambda { @securable.owner ',test' }.should raise_error(ArgumentError)
|
100
|
+
lambda { @securable.owner 'te,st' }.should raise_error(ArgumentError)
|
101
|
+
lambda { @securable.owner "\ttest" }.should raise_error(ArgumentError)
|
102
|
+
lambda { @securable.owner "te\tst" }.should raise_error(ArgumentError)
|
103
|
+
lambda { @securable.owner "\rtest" }.should raise_error(ArgumentError)
|
104
|
+
lambda { @securable.owner "te\rst" }.should raise_error(ArgumentError)
|
105
|
+
lambda { @securable.owner "\ftest" }.should raise_error(ArgumentError)
|
106
|
+
lambda { @securable.owner "te\fst" }.should raise_error(ArgumentError)
|
107
|
+
lambda { @securable.owner "\0test" }.should raise_error(ArgumentError)
|
108
|
+
lambda { @securable.owner "te\0st" }.should raise_error(ArgumentError)
|
109
|
+
end
|
110
|
+
|
111
|
+
it "should accept Active Directory-style domain names pulled in via LDAP (on unix hosts)" do
|
112
|
+
lambda { @securable.owner "domain\@user" }.should_not raise_error(ArgumentError)
|
113
|
+
lambda { @securable.owner "domain\\user" }.should_not raise_error(ArgumentError)
|
114
|
+
lambda { @securable.group "domain\@group" }.should_not raise_error(ArgumentError)
|
115
|
+
lambda { @securable.group "domain\\group" }.should_not raise_error(ArgumentError)
|
116
|
+
lambda { @securable.group "domain\\group^name" }.should_not raise_error(ArgumentError)
|
117
|
+
end
|
118
|
+
|
119
|
+
it "should not accept group/owner names containing embedded carriage returns" do
|
120
|
+
pending "XXX: params_validate needs to be extended to support multi-line regex"
|
121
|
+
#lambda { @securable.group "\ntest" }.should raise_error(ArgumentError)
|
122
|
+
#lambda { @securable.group "te\nst" }.should raise_error(ArgumentError)
|
123
|
+
#lambda { @securable.owner "\ntest" }.should raise_error(ArgumentError)
|
124
|
+
#lambda { @securable.owner "te\nst" }.should raise_error(ArgumentError)
|
125
|
+
end
|
126
|
+
|
127
|
+
it "should accept group/owner names in UTF-8" do
|
128
|
+
lambda { @securable.group 'tëst' }.should_not raise_error(ArgumentError)
|
129
|
+
lambda { @securable.group 'ë' }.should_not raise_error(ArgumentError)
|
130
|
+
lambda { @securable.owner 'tëst' }.should_not raise_error(ArgumentError)
|
131
|
+
lambda { @securable.owner 'ë' }.should_not raise_error(ArgumentError)
|
58
132
|
end
|
59
133
|
|
60
134
|
it "should accept a unix file mode in string form as an octal number" do
|