chef 11.14.0.alpha.3-x86-mingw32 → 11.14.0.alpha.4-x86-mingw32

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (37) hide show
  1. checksums.yaml +4 -4
  2. data/CONTRIBUTING.md +140 -99
  3. data/lib/chef/application.rb +80 -2
  4. data/lib/chef/application/apply.rb +1 -0
  5. data/lib/chef/application/client.rb +5 -0
  6. data/lib/chef/application/knife.rb +4 -0
  7. data/lib/chef/application/windows_service.rb +1 -0
  8. data/lib/chef/chef_fs/parallelizer/parallel_enumerable.rb +6 -4
  9. data/lib/chef/config.rb +5 -3
  10. data/lib/chef/exceptions.rb +2 -0
  11. data/lib/chef/http/basic_client.rb +1 -0
  12. data/lib/chef/knife.rb +1 -0
  13. data/lib/chef/platform/provider_mapping.rb +7 -0
  14. data/lib/chef/provider/env/windows.rb +2 -0
  15. data/lib/chef/provider/group/usermod.rb +1 -1
  16. data/lib/chef/provider/mount/solaris.rb +233 -0
  17. data/lib/chef/provider/package/apt.rb +9 -0
  18. data/lib/chef/provider/package/windows.rb +3 -0
  19. data/lib/chef/providers.rb +1 -0
  20. data/lib/chef/resource/mount.rb +6 -1
  21. data/lib/chef/util/path_helper.rb +94 -0
  22. data/lib/chef/version.rb +1 -1
  23. data/spec/functional/application_spec.rb +58 -0
  24. data/spec/functional/resource/mount_spec.rb +14 -11
  25. data/spec/integration/client/client_spec.rb +11 -0
  26. data/spec/integration/knife/common_options_spec.rb +9 -0
  27. data/spec/unit/application_spec.rb +157 -0
  28. data/spec/unit/http/basic_client_spec.rb +42 -0
  29. data/spec/unit/provider/env/windows_spec.rb +67 -0
  30. data/spec/unit/provider/group/usermod_spec.rb +2 -1
  31. data/spec/unit/provider/mount/mount_spec.rb +3 -3
  32. data/spec/unit/provider/mount/solaris_spec.rb +646 -0
  33. data/spec/unit/provider/package/apt_spec.rb +5 -0
  34. data/spec/unit/provider/package/windows_spec.rb +6 -0
  35. data/spec/unit/resource_reporter_spec.rb +2 -2
  36. data/spec/unit/util/path_helper_spec.rb +136 -0
  37. metadata +23 -16
@@ -0,0 +1,42 @@
1
+ #
2
+ # Author:: Cameron Cope (<ccope@brightcove.com>)
3
+ # License:: Apache License, Version 2.0
4
+ #
5
+ # Licensed under the Apache License, Version 2.0 (the "License");
6
+ # you may not use this file except in compliance with the License.
7
+ # You may obtain a copy of the License at
8
+ #
9
+ # http://www.apache.org/licenses/LICENSE-2.0
10
+ #
11
+ # Unless required by applicable law or agreed to in writing, software
12
+ # distributed under the License is distributed on an "AS IS" BASIS,
13
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
14
+ # See the License for the specific language governing permissions and
15
+ # limitations under the License.
16
+ #
17
+
18
+ require 'spec_helper'
19
+ require 'chef/http/basic_client'
20
+
21
+ describe "HTTP Connection" do
22
+
23
+ let(:uri) { URI("https://example.com:4443") }
24
+ subject { Chef::HTTP::BasicClient.new(uri) }
25
+
26
+ describe ".new" do
27
+ it "creates an instance" do
28
+ subject
29
+ end
30
+ end
31
+
32
+ describe "#build_http_client" do
33
+ it "should build an http client" do
34
+ subject.build_http_client
35
+ end
36
+
37
+ it "should set an open timeout" do
38
+ subject.build_http_client.open_timeout.should_not be_nil
39
+ end
40
+ end
41
+ end
42
+
@@ -0,0 +1,67 @@
1
+ #
2
+ # Author:: Sander van Harmelen <svanharmelen@schubergphilis.com>
3
+ # Copyright:: Copyright (c) 2014 Chef Software, Inc.
4
+ # License:: Apache License, Version 2.0
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+
19
+ require 'spec_helper'
20
+
21
+ describe Chef::Provider::Env::Windows, :windows_only do
22
+ before do
23
+ @node = Chef::Node.new
24
+ @events = Chef::EventDispatch::Dispatcher.new
25
+ @run_context = Chef::RunContext.new(@node, {}, @events)
26
+ @new_resource = Chef::Resource::Env.new("CHEF_WINDOWS_ENV_TEST")
27
+ @new_resource.value("foo")
28
+ @provider = Chef::Provider::Env::Windows.new(@new_resource, @run_context)
29
+ @provider.stub(:env_obj).and_return(double('null object').as_null_object)
30
+ end
31
+
32
+ describe "action_create" do
33
+ before do
34
+ ENV.delete('CHEF_WINDOWS_ENV_TEST')
35
+ @provider.key_exists = false
36
+ end
37
+
38
+ it "should update the ruby ENV object when it creates the key" do
39
+ @provider.action_create
40
+ expect(ENV['CHEF_WINDOWS_ENV_TEST']).to eql('foo')
41
+ end
42
+ end
43
+
44
+ describe "action_modify" do
45
+ before do
46
+ ENV['CHEF_WINDOWS_ENV_TEST'] = 'foo'
47
+ end
48
+
49
+ it "should update the ruby ENV object when it updates the value" do
50
+ @provider.should_receive(:compare_value).and_return(true)
51
+ @new_resource.value("foobar")
52
+ @provider.action_modify
53
+ expect(ENV['CHEF_WINDOWS_ENV_TEST']).to eql('foobar')
54
+ end
55
+ end
56
+
57
+ describe "action_delete" do
58
+ before do
59
+ ENV['CHEF_WINDOWS_ENV_TEST'] = 'foo'
60
+ end
61
+
62
+ it "should update the ruby ENV object when it deletes the key" do
63
+ @provider.action_delete
64
+ expect(ENV['CHEF_WINDOWS_ENV_TEST']).to eql(nil)
65
+ end
66
+ end
67
+ end
@@ -51,7 +51,8 @@ describe Chef::Provider::Group::Usermod do
51
51
  "solaris" => "-a -G",
52
52
  "suse" => "-a -G",
53
53
  "opensuse" => "-a -G",
54
- "smartos" => "-G"
54
+ "smartos" => "-G",
55
+ "omnios" => "-G"
55
56
  }
56
57
 
57
58
  before do
@@ -53,7 +53,7 @@ describe Chef::Provider::Mount::Mount do
53
53
  @provider.current_resource.device.should == '/dev/sdz1'
54
54
  end
55
55
 
56
- it "should accecpt device_type :uuid" do
56
+ it "should accecpt device_type :uuid", :not_supported_on_solaris do
57
57
  @new_resource.device_type :uuid
58
58
  @new_resource.device "d21afe51-a0fe-4dc6-9152-ac733763ae0a"
59
59
  @stdout_findfs = double("STDOUT", :first => "/dev/sdz1")
@@ -92,7 +92,7 @@ describe Chef::Provider::Mount::Mount do
92
92
  @provider.load_current_resource
93
93
  end
94
94
 
95
- it "should raise an error if the mount device (uuid) does not exist" do
95
+ it "should raise an error if the mount device (uuid) does not exist", :not_supported_on_solaris do
96
96
  @new_resource.device_type :uuid
97
97
  @new_resource.device "d21afe51-a0fe-4dc6-9152-ac733763ae0a"
98
98
  status_findfs = double("Status", :exitstatus => 1)
@@ -304,7 +304,7 @@ describe Chef::Provider::Mount::Mount do
304
304
  @provider.mount_fs()
305
305
  end
306
306
 
307
- it "should mount the filesystem specified by uuid" do
307
+ it "should mount the filesystem specified by uuid", :not_supported_on_solaris do
308
308
  @new_resource.device "d21afe51-a0fe-4dc6-9152-ac733763ae0a"
309
309
  @new_resource.device_type :uuid
310
310
  @stdout_findfs = double("STDOUT", :first => "/dev/sdz1")
@@ -0,0 +1,646 @@
1
+ #
2
+ # Author:: Lamont Granquist (<lamont@getchef.com>)
3
+ # Copyright:: Copyright (c) 2008-2014 Chef Software, Inc.
4
+ # License:: Apache License, Version 2.0
5
+ #
6
+ # Licensed under the Apache License, Version 2.0 (the "License");
7
+ # you may not use this file except in compliance with the License.
8
+ # You may obtain a copy of the License at
9
+ #
10
+ # http://www.apache.org/licenses/LICENSE-2.0
11
+ #
12
+ # Unless required by applicable law or agreed to in writing, software
13
+ # distributed under the License is distributed on an "AS IS" BASIS,
14
+ # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
15
+ # See the License for the specific language governing permissions and
16
+ # limitations under the License.
17
+ #
18
+
19
+ require 'spec_helper'
20
+ require 'ostruct'
21
+
22
+ describe Chef::Provider::Mount::Solaris do
23
+ let(:node) { Chef::Node.new }
24
+
25
+ let(:events) { Chef::EventDispatch::Dispatcher.new }
26
+
27
+ let(:run_context) { Chef::RunContext.new(node, {}, events) }
28
+
29
+ let(:device_type) { :device }
30
+
31
+ let(:fstype) { "ufs" }
32
+
33
+ let(:device) { "/dev/dsk/c0t2d0s7" }
34
+
35
+ let(:mountpoint) { "/mnt/foo" }
36
+
37
+ let(:options) { nil }
38
+
39
+ let(:new_resource) {
40
+ new_resource = Chef::Resource::Mount.new(mountpoint)
41
+ new_resource.device device
42
+ new_resource.device_type device_type
43
+ new_resource.fstype fstype
44
+ new_resource.options options
45
+
46
+ new_resource.supports :remount => false
47
+ new_resource
48
+ }
49
+
50
+ let(:provider) {
51
+ Chef::Provider::Mount::Solaris.new(new_resource, run_context)
52
+ }
53
+
54
+ let(:vfstab_file_contents) {
55
+ <<-EOF.gsub /^\s*/, ''
56
+ #device device mount FS fsck mount mount
57
+ #to mount to fsck point type pass at boot options
58
+ #
59
+ fd - /dev/fd fd - no -
60
+ /proc - /proc proc - no -
61
+ # swap
62
+ /dev/dsk/c0t0d0s1 - - swap - no -
63
+ # root
64
+ /dev/dsk/c0t0d0s0 /dev/rdsk/c0t0d0s0 / ufs 1 no -
65
+ # tmpfs
66
+ swap - /tmp tmpfs - yes -
67
+ # nfs
68
+ cartman:/share2 - /cartman nfs - yes rw,soft
69
+ # ufs
70
+ /dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
71
+ EOF
72
+ }
73
+
74
+ let(:vfstab_file) {
75
+ t = Tempfile.new("rspec-vfstab")
76
+ t.write(vfstab_file_contents)
77
+ t.close
78
+ t
79
+ }
80
+
81
+ let(:mount_output) {
82
+ <<-EOF.gsub /^\s*/, ''
83
+ /dev/dsk/c0t0d0s0 on / type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200000 on Tue Jul 31 22:34:46 2012
84
+ /dev/dsk/c0t2d0s7 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
85
+ EOF
86
+ }
87
+
88
+ before do
89
+ stub_const("Chef::Provider::Mount::Solaris::VFSTAB", vfstab_file.path )
90
+ provider.stub(:shell_out!).with("mount -v").and_return(OpenStruct.new(:stdout => mount_output))
91
+ File.stub(:symlink?).with(device).and_return(false)
92
+ File.stub(:exist?).and_call_original # Tempfile.open on ruby 1.8.7 calls File.exist?
93
+ File.stub(:exist?).with(device).and_return(true)
94
+ File.stub(:exist?).with(mountpoint).and_return(true)
95
+ expect(File).to_not receive(:exists?)
96
+ end
97
+
98
+ describe "#define_resource_requirements" do
99
+ before do
100
+ # we're not testing the actual actions so stub them all out
101
+ [:mount_fs, :umount_fs, :remount_fs, :enable_fs, :disable_fs].each {|m| provider.stub(m) }
102
+ end
103
+
104
+ it "run_action(:mount) should raise an error if the device does not exist" do
105
+ File.stub(:exist?).with(device).and_return(false)
106
+ expect { provider.run_action(:mount) }.to raise_error(Chef::Exceptions::Mount)
107
+ end
108
+
109
+ it "run_action(:remount) should raise an error if the device does not exist" do
110
+ File.stub(:exist?).with(device).and_return(false)
111
+ expect { provider.run_action(:remount) }.to raise_error(Chef::Exceptions::Mount)
112
+ end
113
+
114
+ it "run_action(:mount) should raise an error if the mountpoint does not exist" do
115
+ File.stub(:exist?).with(mountpoint).and_return false
116
+ expect { provider.run_action(:mount) }.to raise_error(Chef::Exceptions::Mount)
117
+ end
118
+
119
+ it "run_action(:remount) should raise an error if the mountpoint does not exist" do
120
+ File.stub(:exist?).with(mountpoint).and_return false
121
+ expect { provider.run_action(:remount) }.to raise_error(Chef::Exceptions::Mount)
122
+ end
123
+
124
+ %w{tmpfs nfs ctfs proc mntfs objfs sharefs fd smbfs}.each do |ft|
125
+ context "when the device has a fstype of #{ft}" do
126
+ let(:fstype) { ft }
127
+ let(:device) { "something_that_is_not_a_file" }
128
+
129
+ before do
130
+ expect(File).to_not receive(:exist?).with(device)
131
+ end
132
+
133
+ it "run_action(:mount) should not raise an error" do
134
+ expect { provider.run_action(:mount) }.to_not raise_error
135
+ end
136
+
137
+ it "run_action(:remount) should not raise an error" do
138
+ expect { provider.run_action(:remount) }.to_not raise_error
139
+ end
140
+ end
141
+ end
142
+
143
+ end
144
+
145
+ describe "#load_current_resource" do
146
+ context "when loading a normal UFS filesystem" do
147
+
148
+ before do
149
+ provider.load_current_resource
150
+ end
151
+
152
+ it "should create a current_resource of type Chef::Resource::Mount" do
153
+ expect(provider.current_resource).to be_a(Chef::Resource::Mount)
154
+ end
155
+
156
+ it "should set the name on the current_resource" do
157
+ provider.current_resource.name.should == mountpoint
158
+ end
159
+
160
+ it "should set the mount_point on the current_resource" do
161
+ provider.current_resource.mount_point.should == mountpoint
162
+ end
163
+
164
+ it "should set the device on the current_resource" do
165
+ provider.current_resource.device.should == device
166
+ end
167
+
168
+ it "should set the device_type on the current_resource" do
169
+ provider.current_resource.device_type.should == device_type
170
+ end
171
+
172
+ it "should set the mounted status on the current_resource" do
173
+ expect(provider.current_resource.mounted).to be_true
174
+ end
175
+
176
+ it "should set the enabled status on the current_resource" do
177
+ expect(provider.current_resource.enabled).to be_true
178
+ end
179
+
180
+ it "should set the fstype field on the current_resource" do
181
+ expect(provider.current_resource.fstype).to eql("ufs")
182
+ end
183
+
184
+ it "should set the options field on the current_resource" do
185
+ expect(provider.current_resource.options).to eql(["-", "noauto"])
186
+ end
187
+
188
+ it "should set the pass field on the current_resource" do
189
+ expect(provider.current_resource.pass).to eql(2)
190
+ end
191
+
192
+ it "should not throw an exception when the device does not exist - CHEF-1565" do
193
+ File.stub(:exist?).with(device).and_return(false)
194
+ expect { provider.load_current_resource }.to_not raise_error
195
+ end
196
+
197
+ it "should not throw an exception when the mount point does not exist" do
198
+ File.stub(:exist?).with(mountpoint).and_return false
199
+ expect { provider.load_current_resource }.to_not raise_error
200
+ end
201
+ end
202
+
203
+ context "when the device is an smbfs mount" do
204
+ let(:mount_output) {
205
+ <<-EOF.gsub /^\s*/, ''
206
+ //solarsystem/tmp on /mnt type smbfs read/write/setuid/devices/dev=5080000 on Tue Mar 29 11:40:18 2011
207
+ EOF
208
+ }
209
+ let(:vfstab_file_contents) {
210
+ <<-EOF.gsub /^\s*/, ''
211
+ //WORKGROUP;username:password@host/share - /mountpoint smbfs - no fileperms=0777,dirperms=0777
212
+ EOF
213
+ }
214
+
215
+ it "should work at some point in the future" do
216
+ pending "SMBFS mounts on solaris look like they will need some future code work and more investigation"
217
+ end
218
+ end
219
+
220
+ context "when the device is an NFS mount" do
221
+ let(:mount_output) {
222
+ <<-EOF.gsub /^\s*/, ''
223
+ cartman:/share2 on /cartman type nfs rsize=32768,wsize=32768,NFSv4,dev=4000004 on Tue Mar 29 11:40:18 2011
224
+ EOF
225
+ }
226
+
227
+ let(:vfstab_file_contents) {
228
+ <<-EOF.gsub /^\s*/, ''
229
+ cartman:/share2 - /cartman nfs - yes rw,soft
230
+ EOF
231
+ }
232
+
233
+ let(:fstype) { "nfs" }
234
+
235
+ let(:device) { "cartman:/share2" }
236
+
237
+ let(:mountpoint) { "/cartman" }
238
+
239
+ before do
240
+ provider.load_current_resource
241
+ end
242
+
243
+ it "should set the name on the current_resource" do
244
+ provider.current_resource.name.should == mountpoint
245
+ end
246
+
247
+ it "should set the mount_point on the current_resource" do
248
+ provider.current_resource.mount_point.should == mountpoint
249
+ end
250
+
251
+ it "should set the device on the current_resource" do
252
+ provider.current_resource.device.should == device
253
+ end
254
+
255
+ it "should set the device_type on the current_resource" do
256
+ provider.current_resource.device_type.should == device_type
257
+ end
258
+
259
+ it "should set the mounted status on the current_resource" do
260
+ expect(provider.current_resource.mounted).to be_true
261
+ end
262
+
263
+ it "should set the enabled status on the current_resource" do
264
+ expect(provider.current_resource.enabled).to be_true
265
+ end
266
+
267
+ it "should set the fstype field on the current_resource" do
268
+ expect(provider.current_resource.fstype).to eql("nfs")
269
+ end
270
+
271
+ it "should set the options field on the current_resource" do
272
+ expect(provider.current_resource.options).to eql(["rw", "soft", "noauto"])
273
+ end
274
+
275
+ it "should set the pass field on the current_resource" do
276
+ # is this correct or should it be nil?
277
+ expect(provider.current_resource.pass).to eql(0)
278
+ end
279
+
280
+ end
281
+
282
+ context "when the device is symlink" do
283
+
284
+ let(:target) { "/dev/mapper/target" }
285
+
286
+ let(:mount_output) {
287
+ <<-EOF.gsub /^\s*/, ''
288
+ #{target} on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
289
+ EOF
290
+ }
291
+
292
+ let(:vfstab_file_contents) {
293
+ <<-EOF.gsub /^\s*/, ''
294
+ #{target} /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
295
+ EOF
296
+ }
297
+
298
+ before do
299
+ File.should_receive(:symlink?).with(device).at_least(:once).and_return(true)
300
+ File.should_receive(:readlink).with(device).at_least(:once).and_return(target)
301
+
302
+ provider.load_current_resource()
303
+ end
304
+
305
+ it "should set mounted true if the symlink target of the device is found in the mounts list" do
306
+ expect(provider.current_resource.mounted).to be_true
307
+ end
308
+
309
+ it "should set enabled true if the symlink target of the device is found in the vfstab" do
310
+ expect(provider.current_resource.enabled).to be_true
311
+ end
312
+
313
+ it "should have the correct mount options" do
314
+ expect(provider.current_resource.options).to eql(["-", "noauto"])
315
+ end
316
+ end
317
+
318
+ context "when the device is a relative symlink" do
319
+ let(:target) { "foo" }
320
+
321
+ let(:absolute_target) { File.expand_path(target, File.dirname(device)) }
322
+
323
+ let(:mount_output) {
324
+ <<-EOF.gsub /^\s*/, ''
325
+ #{absolute_target} on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
326
+ EOF
327
+ }
328
+
329
+ let(:vfstab_file_contents) {
330
+ <<-EOF.gsub /^\s*/, ''
331
+ #{absolute_target} /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
332
+ EOF
333
+ }
334
+
335
+ before do
336
+ File.should_receive(:symlink?).with(device).at_least(:once).and_return(true)
337
+ File.should_receive(:readlink).with(device).at_least(:once).and_return(target)
338
+
339
+ provider.load_current_resource()
340
+ end
341
+
342
+ it "should set mounted true if the symlink target of the device is found in the mounts list" do
343
+ expect(provider.current_resource.mounted).to be_true
344
+ end
345
+
346
+ it "should set enabled true if the symlink target of the device is found in the vfstab" do
347
+ expect(provider.current_resource.enabled).to be_true
348
+ end
349
+
350
+ it "should have the correct mount options" do
351
+ expect(provider.current_resource.options).to eql(["-", "noauto"])
352
+ end
353
+ end
354
+
355
+ context "when the matching mount point is last in the mounts list" do
356
+ let(:mount_output) {
357
+ <<-EOF.gsub /^\s*/, ''
358
+ /dev/dsk/c0t0d0s0 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200000 on Tue Jul 31 22:34:46 2012
359
+ /dev/dsk/c0t2d0s7 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
360
+ EOF
361
+ }
362
+ it "should set mounted true" do
363
+ provider.load_current_resource()
364
+ provider.current_resource.mounted.should be_true
365
+ end
366
+ end
367
+
368
+ context "when the matching mount point is not last in the mounts list" do
369
+ let(:mount_output) {
370
+ <<-EOF.gsub /^\s*/, ''
371
+ /dev/dsk/c0t2d0s7 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
372
+ /dev/dsk/c0t0d0s0 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200000 on Tue Jul 31 22:34:46 2012
373
+ EOF
374
+ }
375
+ it "should set mounted false" do
376
+ provider.load_current_resource()
377
+ provider.current_resource.mounted.should be_false
378
+ end
379
+ end
380
+
381
+ context "when the matching mount point is not in the mounts list (mountpoint wrong)" do
382
+ let(:mount_output) {
383
+ <<-EOF.gsub /^\s*/, ''
384
+ /dev/dsk/c0t2d0s7 on /mnt/foob type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
385
+ EOF
386
+ }
387
+ it "should set mounted false" do
388
+ provider.load_current_resource()
389
+ provider.current_resource.mounted.should be_false
390
+ end
391
+ end
392
+
393
+ context "when the matching mount point is not in the mounts list (raw device wrong)" do
394
+ let(:mount_output) {
395
+ <<-EOF.gsub /^\s*/, ''
396
+ /dev/dsk/c0t2d0s72 on /mnt/foo type ufs read/write/setuid/intr/largefiles/xattr/onerror=panic/dev=2200007 on Tue Jul 31 22:34:46 2012
397
+ EOF
398
+ }
399
+ it "should set mounted false" do
400
+ provider.load_current_resource()
401
+ provider.current_resource.mounted.should be_false
402
+ end
403
+ end
404
+
405
+ context "when the mount point is last in fstab" do
406
+ let(:vfstab_file_contents) {
407
+ <<-EOF.gsub /^\s*/, ''
408
+ /dev/dsk/c0t2d0s72 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
409
+ /dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
410
+ EOF
411
+ }
412
+
413
+ it "should set enabled to true" do
414
+ provider.load_current_resource
415
+ provider.current_resource.enabled.should be_true
416
+ end
417
+ end
418
+
419
+ context "when the mount point is not last in fstab and is a substring of another mount" do
420
+ let(:vfstab_file_contents) {
421
+ <<-EOF.gsub /^\s*/, ''
422
+ /dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
423
+ /dev/dsk/c0t2d0s72 /dev/rdsk/c0t2d0s7 /mnt/foo/bar ufs 2 yes -
424
+ EOF
425
+ }
426
+
427
+ it "should set enabled to true" do
428
+ provider.load_current_resource
429
+ provider.current_resource.enabled.should be_true
430
+ end
431
+ end
432
+
433
+ context "when the mount point is not last in fstab" do
434
+ let(:vfstab_file_contents) {
435
+ <<-EOF.gsub /^\s*/, ''
436
+ /dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
437
+ /dev/dsk/c0t2d0s72 /dev/rdsk/c0t2d0s72 /mnt/foo ufs 2 yes -
438
+ EOF
439
+ }
440
+
441
+ it "should set enabled to false" do
442
+ provider.load_current_resource
443
+ provider.current_resource.enabled.should be_false
444
+ end
445
+ end
446
+
447
+ context "when the mount point is not in fstab, but the mountpoint is a substring of one that is" do
448
+ let(:vfstab_file_contents) {
449
+ <<-EOF.gsub /^\s*/, ''
450
+ /dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foob ufs 2 yes -
451
+ EOF
452
+ }
453
+
454
+ it "should set enabled to false" do
455
+ provider.load_current_resource
456
+ provider.current_resource.enabled.should be_false
457
+ end
458
+ end
459
+
460
+ context "when the mount point is not in fstab, but the device is a substring of one that is" do
461
+ let(:vfstab_file_contents) {
462
+ <<-EOF.gsub /^\s*/, ''
463
+ /dev/dsk/c0t2d0s72 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
464
+ EOF
465
+ }
466
+
467
+ it "should set enabled to false" do
468
+ provider.load_current_resource
469
+ provider.current_resource.enabled.should be_false
470
+ end
471
+ end
472
+
473
+ context "when the mountpoint line is commented out" do
474
+ let(:vfstab_file_contents) {
475
+ <<-EOF.gsub /^\s*/, ''
476
+ #/dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -
477
+ EOF
478
+ }
479
+
480
+ it "should set enabled to false" do
481
+ provider.load_current_resource
482
+ provider.current_resource.enabled.should be_false
483
+ end
484
+ end
485
+ end
486
+
487
+ context "after the mount's state has been discovered" do
488
+ describe "mount_fs" do
489
+ it "should mount the filesystem" do
490
+ provider.should_receive(:shell_out!).with("mount -F #{fstype} -o defaults #{device} #{mountpoint}")
491
+ provider.mount_fs()
492
+ end
493
+
494
+ it "should mount the filesystem with options if options were passed" do
495
+ options = "logging,noatime,largefiles,nosuid,rw,quota"
496
+ new_resource.options(options.split(/,/))
497
+ provider.should_receive(:shell_out!).with("mount -F #{fstype} -o #{options} #{device} #{mountpoint}")
498
+ provider.mount_fs()
499
+ end
500
+
501
+ it "should delete the 'noauto' magic option" do
502
+ options = "rw,noauto"
503
+ new_resource.options(%w{rw noauto})
504
+ provider.should_receive(:shell_out!).with("mount -F #{fstype} -o rw #{device} #{mountpoint}")
505
+ provider.mount_fs()
506
+ end
507
+ end
508
+
509
+ describe "umount_fs" do
510
+ it "should umount the filesystem if it is mounted" do
511
+ provider.should_receive(:shell_out!).with("umount #{mountpoint}")
512
+ provider.umount_fs()
513
+ end
514
+ end
515
+
516
+ describe "remount_fs" do
517
+ it "should use mount -o remount" do
518
+ provider.should_receive(:shell_out!).with("mount -o remount #{new_resource.mount_point}")
519
+ provider.remount_fs
520
+ end
521
+ end
522
+
523
+ describe "when enabling the fs" do
524
+ context "in the typical case" do
525
+ let(:other_mount) { "/dev/dsk/c0t2d0s0 /dev/rdsk/c0t2d0s0 / ufs 2 yes -" }
526
+
527
+ let(:this_mount) { "/dev/dsk/c0t2d0s7\t-\t/mnt/foo\tufs\t2\tyes\tdefaults\n" }
528
+
529
+ let(:vfstab_file_contents) { [other_mount].join("\n") }
530
+
531
+ before do
532
+ provider.stub(:etc_tempfile).and_yield(Tempfile.open("vfstab"))
533
+ provider.load_current_resource
534
+ provider.enable_fs
535
+ end
536
+
537
+ it "should leave the other mountpoint alone" do
538
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(other_mount)}/)
539
+ end
540
+
541
+ it "should enable the mountpoint we care about" do
542
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(this_mount)}/)
543
+ end
544
+ end
545
+
546
+ context "when the mount has options=noauto" do
547
+ let(:other_mount) { "/dev/dsk/c0t2d0s0 /dev/rdsk/c0t2d0s0 / ufs 2 yes -" }
548
+
549
+ let(:this_mount) { "/dev/dsk/c0t2d0s7\t-\t/mnt/foo\tufs\t2\tno\t-\n" }
550
+
551
+ let(:options) { [ "noauto" ] }
552
+
553
+ let(:vfstab_file_contents) { [other_mount].join("\n") }
554
+
555
+ before do
556
+ provider.stub(:etc_tempfile).and_yield(Tempfile.open("vfstab"))
557
+ provider.load_current_resource
558
+ provider.enable_fs
559
+ end
560
+
561
+ it "should leave the other mountpoint alone" do
562
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(other_mount)}/)
563
+ end
564
+
565
+ it "should enable the mountpoint we care about" do
566
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(this_mount)}/)
567
+ end
568
+ end
569
+ end
570
+
571
+ describe "when disabling the fs" do
572
+ context "in the typical case" do
573
+ let(:other_mount) { "/dev/dsk/c0t2d0s0 /dev/rdsk/c0t2d0s0 / ufs 2 yes -" }
574
+
575
+ let(:this_mount) { "/dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -" }
576
+
577
+ let(:vfstab_file_contents) { [other_mount, this_mount].join("\n") }
578
+
579
+ before do
580
+ provider.stub(:etc_tempfile).and_yield(Tempfile.open("vfstab"))
581
+ provider.disable_fs
582
+ end
583
+
584
+ it "should leave the other mountpoint alone" do
585
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(other_mount)}/)
586
+ end
587
+
588
+ it "should disable the mountpoint we care about" do
589
+ IO.read(vfstab_file.path).should_not match(/^#{Regexp.escape(this_mount)}/)
590
+ end
591
+ end
592
+
593
+ context "when there is a commented out line" do
594
+ let(:other_mount) { "/dev/dsk/c0t2d0s0 /dev/rdsk/c0t2d0s0 / ufs 2 yes -" }
595
+
596
+ let(:this_mount) { "/dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -" }
597
+
598
+ let(:comment) { "#/dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -" }
599
+
600
+ let(:vfstab_file_contents) { [other_mount, this_mount, comment].join("\n") }
601
+
602
+ before do
603
+ provider.stub(:etc_tempfile).and_yield(Tempfile.open("vfstab"))
604
+ provider.disable_fs
605
+ end
606
+
607
+ it "should leave the other mountpoint alone" do
608
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(other_mount)}/)
609
+ end
610
+
611
+ it "should disable the mountpoint we care about" do
612
+ IO.read(vfstab_file.path).should_not match(/^#{Regexp.escape(this_mount)}/)
613
+ end
614
+
615
+ it "should keep the comment" do
616
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(comment)}/)
617
+ end
618
+ end
619
+
620
+ context "when there is a duplicated line" do
621
+ let(:other_mount) { "/dev/dsk/c0t2d0s0 /dev/rdsk/c0t2d0s0 / ufs 2 yes -" }
622
+
623
+ let(:this_mount) { "/dev/dsk/c0t2d0s7 /dev/rdsk/c0t2d0s7 /mnt/foo ufs 2 yes -" }
624
+
625
+ let(:vfstab_file_contents) { [this_mount, other_mount, this_mount].join("\n") }
626
+
627
+ before do
628
+ provider.stub(:etc_tempfile).and_yield(Tempfile.open("vfstab"))
629
+ provider.disable_fs
630
+ end
631
+
632
+ it "should leave the other mountpoint alone" do
633
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(other_mount)}/)
634
+ end
635
+
636
+ it "should still match the duplicated mountpoint" do
637
+ IO.read(vfstab_file.path).should match(/^#{Regexp.escape(this_mount)}/)
638
+ end
639
+
640
+ it "should have removed the last line" do
641
+ IO.read(vfstab_file.path).should eql( "#{this_mount}\n#{other_mount}\n" )
642
+ end
643
+ end
644
+ end
645
+ end
646
+ end