chef 16.7.61-universal-mingw32 → 16.8.9-universal-mingw32
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/Gemfile +1 -2
- data/README.md +1 -1
- data/chef.gemspec +2 -1
- data/distro/ruby_bin_folder/AMD64/Chef.PowerShell.Wrapper.dll +0 -0
- data/distro/ruby_bin_folder/AMD64/Chef.PowerShell.dll +0 -0
- data/distro/ruby_bin_folder/AMD64/shared/Microsoft.NETCore.App/5.0.0/Chef.PowerShell.Wrapper.Core.dll +0 -0
- data/distro/ruby_bin_folder/AMD64/shared/Microsoft.NETCore.App/5.0.0/Chef.Powershell.Core.dll +0 -0
- data/distro/ruby_bin_folder/AMD64/shared/Microsoft.NETCore.App/5.0.0/Chef.Powershell.Core.pdb +0 -0
- data/distro/ruby_bin_folder/x86/Chef.PowerShell.dll +0 -0
- data/distro/ruby_bin_folder/x86/Chef.Powershell.Wrapper.dll +0 -0
- data/distro/ruby_bin_folder/x86/shared/Microsoft.NETCore.App/5.0.0/Chef.PowerShell.Wrapper.Core.dll +0 -0
- data/distro/ruby_bin_folder/x86/shared/Microsoft.NETCore.App/5.0.0/Chef.Powershell.Core.dll +0 -0
- data/distro/ruby_bin_folder/x86/shared/Microsoft.NETCore.App/5.0.0/Chef.Powershell.Core.pdb +0 -0
- data/lib/chef/application/base.rb +1 -1
- data/lib/chef/client.rb +3 -0
- data/lib/chef/compliance/default_attributes.rb +89 -0
- data/lib/chef/compliance/fetcher/automate.rb +69 -0
- data/lib/chef/compliance/fetcher/chef_server.rb +134 -0
- data/lib/chef/compliance/reporter/automate.rb +202 -0
- data/lib/chef/compliance/reporter/chef_server_automate.rb +92 -0
- data/lib/chef/compliance/reporter/compliance_enforcer.rb +20 -0
- data/lib/chef/compliance/reporter/json_file.rb +19 -0
- data/lib/chef/compliance/runner.rb +250 -0
- data/lib/chef/cookbook_manifest.rb +1 -0
- data/lib/chef/encrypted_data_bag_item/assertions.rb +1 -1
- data/lib/chef/exceptions.rb +4 -0
- data/lib/chef/http/ssl_policies.rb +6 -0
- data/lib/chef/knife/bootstrap/train_connector.rb +1 -1
- data/lib/chef/knife/core/ui.rb +4 -1
- data/lib/chef/knife/ssh.rb +1 -1
- data/lib/chef/mixin/powershell_exec.rb +3 -1
- data/lib/chef/platform/query_helpers.rb +4 -4
- data/lib/chef/powershell.rb +2 -0
- data/lib/chef/provider/dsc_resource.rb +12 -24
- data/lib/chef/provider/dsc_script.rb +16 -20
- data/lib/chef/provider/git.rb +5 -5
- data/lib/chef/resource/chef_client_config.rb +1 -1
- data/lib/chef/resource/dsc_script.rb +8 -1
- data/lib/chef/resource/hostname.rb +3 -3
- data/lib/chef/resource/template.rb +2 -2
- data/lib/chef/resource/windows_certificate.rb +7 -1
- data/lib/chef/resource_collection/resource_set.rb +1 -1
- data/lib/chef/util/dsc/configuration_generator.rb +52 -11
- data/lib/chef/util/dsc/lcm_output_parser.rb +3 -4
- data/lib/chef/util/dsc/local_configuration_manager.rb +17 -14
- data/lib/chef/util/dsc/resource_store.rb +5 -11
- data/lib/chef/version.rb +1 -1
- data/lib/chef/win32/api/file.rb +4 -0
- data/spec/functional/resource/dsc_script_spec.rb +3 -6
- data/spec/integration/client/client_spec.rb +2 -1
- data/spec/integration/compliance/compliance_spec.rb +81 -0
- data/spec/integration/recipes/recipe_dsl_spec.rb +1 -0
- data/spec/spec_helper.rb +1 -1
- data/spec/unit/client_spec.rb +1 -0
- data/spec/unit/compliance/fetcher/automate_spec.rb +134 -0
- data/spec/unit/compliance/fetcher/chef_server_spec.rb +93 -0
- data/spec/unit/compliance/reporter/automate_spec.rb +427 -0
- data/spec/unit/compliance/reporter/chef_server_automate_spec.rb +177 -0
- data/spec/unit/compliance/reporter/compliance_enforcer_spec.rb +48 -0
- data/spec/unit/compliance/runner_spec.rb +113 -0
- data/spec/unit/http/ssl_policies_spec.rb +11 -0
- data/spec/unit/knife/core/node_editor_spec.rb +1 -1
- data/spec/unit/mixin/powershell_exec_spec.rb +1 -1
- data/spec/unit/platform/query_helpers_spec.rb +11 -12
- data/spec/unit/provider/dsc_resource_spec.rb +10 -27
- data/spec/unit/provider/dsc_script_spec.rb +1 -1
- data/spec/unit/provider/mount/windows_spec.rb +1 -0
- data/spec/unit/provider/systemd_unit_spec.rb +1 -1
- data/spec/unit/resource/windows_certificate_spec.rb +12 -0
- data/spec/unit/util/dsc/configuration_generator_spec.rb +79 -0
- data/spec/unit/util/dsc/local_configuration_manager_spec.rb +27 -35
- metadata +37 -12
- data/lib/chef/util/powershell/cmdlet.rb +0 -169
- data/lib/chef/util/powershell/cmdlet_result.rb +0 -61
- data/spec/functional/util/powershell/cmdlet_spec.rb +0 -111
- data/spec/unit/util/powershell/cmdlet_spec.rb +0 -106
@@ -0,0 +1,48 @@
|
|
1
|
+
require "spec_helper"
|
2
|
+
|
3
|
+
describe Chef::Compliance::Reporter::AuditEnforcer do
|
4
|
+
let(:reporter) { Chef::Compliance::Reporter::AuditEnforcer.new }
|
5
|
+
|
6
|
+
it "does not raise error for a successful InSpec report" do
|
7
|
+
report = {
|
8
|
+
"profiles": [
|
9
|
+
{
|
10
|
+
"controls": [
|
11
|
+
{ "id": "c1", "results": [{ "status": "passed" }] },
|
12
|
+
{ "id": "c2", "results": [{ "status": "passed" }] },
|
13
|
+
],
|
14
|
+
},
|
15
|
+
],
|
16
|
+
}
|
17
|
+
|
18
|
+
expect(reporter.send_report(report)).to eq(true)
|
19
|
+
end
|
20
|
+
|
21
|
+
it "does not raise error for an InSpec report with no controls" do
|
22
|
+
report = { "profiles": [{ "name": "empty" }] }
|
23
|
+
|
24
|
+
expect(reporter.send_report(report)).to eq(true)
|
25
|
+
end
|
26
|
+
|
27
|
+
it "does not raise error for an InSpec report with controls but no results" do
|
28
|
+
report = { "profiles": [{ "controls": [{ "id": "empty" }] }] }
|
29
|
+
expect(reporter.send_report(report)).to eq(true)
|
30
|
+
end
|
31
|
+
|
32
|
+
it "raises an error for a failed InSpec report" do
|
33
|
+
report = {
|
34
|
+
"profiles": [
|
35
|
+
{
|
36
|
+
"controls": [
|
37
|
+
{ "id": "c1", "results": [{ "status": "passed" }] },
|
38
|
+
{ "id": "c2", "results": [{ "status": "failed" }] },
|
39
|
+
],
|
40
|
+
},
|
41
|
+
],
|
42
|
+
}
|
43
|
+
|
44
|
+
expect {
|
45
|
+
reporter.send_report(report)
|
46
|
+
}.to raise_error(Chef::Compliance::Reporter::AuditEnforcer::ControlFailure, "Audit c2 has failed. Aborting chef-client run.")
|
47
|
+
end
|
48
|
+
end
|
@@ -0,0 +1,113 @@
|
|
1
|
+
require "spec_helper"
|
2
|
+
|
3
|
+
describe Chef::Compliance::Runner do
|
4
|
+
let(:logger) { double(:logger).as_null_object }
|
5
|
+
let(:node) { Chef::Node.new(logger: logger) }
|
6
|
+
|
7
|
+
let(:runner) do
|
8
|
+
described_class.new.tap do |r|
|
9
|
+
r.node = node
|
10
|
+
r.run_id = "my_run_id"
|
11
|
+
r.recipes = []
|
12
|
+
end
|
13
|
+
end
|
14
|
+
|
15
|
+
describe "#enabled?" do
|
16
|
+
it "is true if the node attributes have audit profiles and the audit cookbook is not present" do
|
17
|
+
node.normal["audit"]["profiles"]["ssh"] = { 'compliance': "base/ssh" }
|
18
|
+
runner.recipes = %w{ fancy_cookbook::fanciness tacobell::nachos }
|
19
|
+
|
20
|
+
expect(runner).to be_enabled
|
21
|
+
end
|
22
|
+
|
23
|
+
it "is false if the node attributes have audit profiles and the audit cookbook is present" do
|
24
|
+
node.normal["audit"]["profiles"]["ssh"] = { 'compliance': "base/ssh" }
|
25
|
+
runner.recipes = %w{ audit::default fancy_cookbook::fanciness tacobell::nachos }
|
26
|
+
|
27
|
+
expect(runner).not_to be_enabled
|
28
|
+
end
|
29
|
+
|
30
|
+
it "is false if the node attributes do not have audit profiles and the audit cookbook is not present" do
|
31
|
+
node.normal["audit"]["profiles"] = {}
|
32
|
+
runner.recipes = %w{ fancy_cookbook::fanciness tacobell::nachos }
|
33
|
+
|
34
|
+
expect(runner).not_to be_enabled
|
35
|
+
end
|
36
|
+
|
37
|
+
it "is false if the node attributes do not have audit profiles and the audit cookbook is present" do
|
38
|
+
node.normal["audit"]["profiles"] = {}
|
39
|
+
runner.recipes = %w{ audit::default fancy_cookbook::fanciness tacobell::nachos }
|
40
|
+
|
41
|
+
expect(runner).not_to be_enabled
|
42
|
+
end
|
43
|
+
|
44
|
+
it "is false if the node attributes do not have audit attributes and the audit cookbook is not present" do
|
45
|
+
runner.recipes = %w{ fancy_cookbook::fanciness tacobell::nachos }
|
46
|
+
expect(runner).not_to be_enabled
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
describe "#inspec_profiles" do
|
51
|
+
it "returns an empty list with no profiles defined" do
|
52
|
+
expect(runner.inspec_profiles).to eq([])
|
53
|
+
end
|
54
|
+
|
55
|
+
it "converts from the attribute format to the format Inspec expects" do
|
56
|
+
node.normal["audit"]["profiles"]["linux-baseline"] = {
|
57
|
+
'compliance': "user/linux-baseline",
|
58
|
+
'version': "2.1.0",
|
59
|
+
}
|
60
|
+
|
61
|
+
node.normal["audit"]["profiles"]["ssh"] = {
|
62
|
+
'supermarket': "hardening/ssh-hardening",
|
63
|
+
}
|
64
|
+
|
65
|
+
expected = [
|
66
|
+
{
|
67
|
+
compliance: "user/linux-baseline",
|
68
|
+
name: "linux-baseline",
|
69
|
+
version: "2.1.0",
|
70
|
+
},
|
71
|
+
{
|
72
|
+
name: "ssh",
|
73
|
+
supermarket: "hardening/ssh-hardening",
|
74
|
+
},
|
75
|
+
]
|
76
|
+
|
77
|
+
expect(runner.inspec_profiles).to eq(expected)
|
78
|
+
end
|
79
|
+
|
80
|
+
it "raises an error when the profiles are in the old audit-cookbook format" do
|
81
|
+
node.normal["audit"]["profiles"] = [
|
82
|
+
{
|
83
|
+
name: "Windows 2019 Baseline",
|
84
|
+
compliance: "admin/windows-2019-baseline",
|
85
|
+
},
|
86
|
+
]
|
87
|
+
|
88
|
+
expect { runner.inspec_profiles }.to raise_error(/profiles specified in an unrecognized format, expected a hash of hashes./)
|
89
|
+
end
|
90
|
+
end
|
91
|
+
|
92
|
+
describe "#warn_for_deprecated_config_values!" do
|
93
|
+
it "logs a warning when deprecated config values are present" do
|
94
|
+
node.normal["audit"]["owner"] = "my_org"
|
95
|
+
node.normal["audit"]["inspec_version"] = "90210"
|
96
|
+
|
97
|
+
expect(logger).to receive(:warn).with(/config values 'inspec_version', 'owner' are not supported/)
|
98
|
+
|
99
|
+
runner.warn_for_deprecated_config_values!
|
100
|
+
end
|
101
|
+
|
102
|
+
it "does not log a warning with no deprecated config values" do
|
103
|
+
node.normal["audit"]["profiles"]["linux-baseline"] = {
|
104
|
+
'compliance': "user/linux-baseline",
|
105
|
+
'version': "2.1.0",
|
106
|
+
}
|
107
|
+
|
108
|
+
expect(logger).not_to receive(:warn)
|
109
|
+
|
110
|
+
runner.warn_for_deprecated_config_values!
|
111
|
+
end
|
112
|
+
end
|
113
|
+
end
|
@@ -26,6 +26,7 @@ describe "HTTP SSL Policy" do
|
|
26
26
|
Chef::Config[:ssl_client_key] = nil
|
27
27
|
Chef::Config[:ssl_ca_path] = nil
|
28
28
|
Chef::Config[:ssl_ca_file] = nil
|
29
|
+
ENV["SSL_CERT_FILE"] = nil
|
29
30
|
end
|
30
31
|
|
31
32
|
let(:unconfigured_http_client) { Net::HTTP.new("example.com", 443) }
|
@@ -71,6 +72,16 @@ describe "HTTP SSL Policy" do
|
|
71
72
|
Chef::Config[:ssl_ca_file] = CHEF_SPEC_DATA + "/ssl/5e707473.0"
|
72
73
|
expect(http_client.ca_file).to eq(CHEF_SPEC_DATA + "/ssl/5e707473.0")
|
73
74
|
end
|
75
|
+
|
76
|
+
it "should set the custom CA file if SSL_CERT_FILE environment variable is set" do
|
77
|
+
ENV["SSL_CERT_FILE"] = CHEF_SPEC_DATA + "/trusted_certs/intermediate.pem"
|
78
|
+
expect(http_client.ca_file).to eq(CHEF_SPEC_DATA + "/trusted_certs/intermediate.pem")
|
79
|
+
end
|
80
|
+
|
81
|
+
it "raises a ConfigurationError if SSL_CERT_FILE environment variable is set to a file that does not exist" do
|
82
|
+
ENV["SSL_CERT_FILE"] = "/dev/null/nothing_here"
|
83
|
+
expect { http_client }.to raise_error(Chef::Exceptions::ConfigurationError)
|
84
|
+
end
|
74
85
|
end
|
75
86
|
|
76
87
|
describe "when configured with :ssl_verify_mode set to :verify peer" do
|
@@ -74,7 +74,7 @@ describe Chef::Knife::NodeEditor do
|
|
74
74
|
|
75
75
|
expect(ui).to have_received(:warn)
|
76
76
|
.with "Changing the name of a node results in a new node being " +
|
77
|
-
|
77
|
+
"created, test_node will not be modified or removed."
|
78
78
|
|
79
79
|
expect(ui).to have_received(:confirm)
|
80
80
|
.with("Proceed with creation of new node")
|
@@ -66,7 +66,7 @@ describe Chef::Mixin::PowershellExec, :windows_only do
|
|
66
66
|
execution = object.powershell_exec("this-should-error")
|
67
67
|
expect(execution.errors).to be_a_kind_of(Array)
|
68
68
|
expect(execution.errors[0]).to be_a_kind_of(String)
|
69
|
-
expect(execution.errors[0]).to include("
|
69
|
+
expect(execution.errors[0]).to include("The term 'this-should-error' is not recognized")
|
70
70
|
end
|
71
71
|
|
72
72
|
it "raises an error if the interpreter is invalid" do
|
@@ -41,24 +41,23 @@ end
|
|
41
41
|
|
42
42
|
describe "Chef::Platform#dsc_refresh_mode_disabled?" do
|
43
43
|
let(:node) { instance_double("Chef::Node") }
|
44
|
-
let(:
|
45
|
-
let(:cmdlet_result) { instance_double("Chef::Util::Powershell::CmdletResult") }
|
44
|
+
let(:powershell) { instance_double("Chef::PowerShell") }
|
46
45
|
|
47
46
|
it "returns true when RefreshMode is Disabled" do
|
48
|
-
expect(Chef::
|
49
|
-
.with(
|
50
|
-
.and_return(
|
51
|
-
expect(
|
52
|
-
expect(
|
47
|
+
expect(Chef::PowerShell).to receive(:new)
|
48
|
+
.with("Get-DscLocalConfigurationManager")
|
49
|
+
.and_return(powershell)
|
50
|
+
expect(powershell).to receive(:error!)
|
51
|
+
expect(powershell).to receive(:result).and_return({ "RefreshMode" => "Disabled" })
|
53
52
|
expect(Chef::Platform.dsc_refresh_mode_disabled?(node)).to be true
|
54
53
|
end
|
55
54
|
|
56
55
|
it "returns false when RefreshMode is not Disabled" do
|
57
|
-
expect(Chef::
|
58
|
-
.with(
|
59
|
-
.and_return(
|
60
|
-
expect(
|
61
|
-
expect(
|
56
|
+
expect(Chef::PowerShell).to receive(:new)
|
57
|
+
.with("Get-DscLocalConfigurationManager")
|
58
|
+
.and_return(powershell)
|
59
|
+
expect(powershell).to receive(:error!)
|
60
|
+
expect(powershell).to receive(:result).and_return({ "RefreshMode" => "LaLaLa" })
|
62
61
|
expect(Chef::Platform.dsc_refresh_mode_disabled?(node)).to be false
|
63
62
|
end
|
64
63
|
end
|
@@ -85,14 +85,13 @@ describe Chef::Provider::DscResource do
|
|
85
85
|
node.automatic[:languages][:powershell][:version] = "5.0.10018.0"
|
86
86
|
node
|
87
87
|
end
|
88
|
-
let(:resource_result) { double("
|
89
|
-
let(:invoke_dsc_resource) { double("cmdlet", run!: resource_result) }
|
88
|
+
let(:resource_result) { double("PowerShell", result: { "InDesiredState" => true }, verbose: ["description"]) }
|
90
89
|
let(:store) { double("ResourceStore", find: resource_records) }
|
91
90
|
let(:resource_records) { [] }
|
92
91
|
|
93
92
|
before do
|
94
93
|
allow(Chef::Util::DSC::ResourceStore).to receive(:instance).and_return(store)
|
95
|
-
allow(
|
94
|
+
allow(provider).to receive(:powershell_exec!).and_return(resource_result)
|
96
95
|
allow(provider).to receive(:dsc_refresh_mode_disabled?).and_return(true)
|
97
96
|
end
|
98
97
|
|
@@ -112,9 +111,8 @@ describe Chef::Provider::DscResource do
|
|
112
111
|
it "flags the resource as reboot required when required" do
|
113
112
|
expect(provider).to receive(:test_resource).and_return(false)
|
114
113
|
expect(provider).to receive(:invoke_resource)
|
115
|
-
.and_return(double(
|
114
|
+
.and_return(double(result: { "RebootRequired" => true }))
|
116
115
|
expect(provider).to receive(:add_dsc_verbose_log)
|
117
|
-
expect(provider).to receive(:return_dsc_resource_result).and_return(true)
|
118
116
|
expect(provider).to receive(:create_reboot_resource)
|
119
117
|
provider.run_action(:run)
|
120
118
|
end
|
@@ -122,9 +120,8 @@ describe Chef::Provider::DscResource do
|
|
122
120
|
it "does not flag the resource as reboot required when not required" do
|
123
121
|
expect(provider).to receive(:test_resource).and_return(false)
|
124
122
|
expect(provider).to receive(:invoke_resource)
|
125
|
-
.and_return(double(stdout: "",
|
123
|
+
.and_return(double(stdout: "", result: {}))
|
126
124
|
expect(provider).to receive(:add_dsc_verbose_log)
|
127
|
-
expect(provider).to receive(:return_dsc_resource_result).and_return(false)
|
128
125
|
expect(provider).to_not receive(:create_reboot_resource)
|
129
126
|
provider.run_action(:run)
|
130
127
|
end
|
@@ -142,9 +139,7 @@ describe Chef::Provider::DscResource do
|
|
142
139
|
let(:resource_records) { [{}] }
|
143
140
|
|
144
141
|
it "returns the default dsc resource module" do
|
145
|
-
expect(
|
146
|
-
expect(cmdlet).to match(/Module PSDesiredStateConfiguration /)
|
147
|
-
end.and_return(invoke_dsc_resource)
|
142
|
+
expect(provider).to receive(:powershell_exec!).with(/Module PSDesiredStateConfiguration /).and_return(resource_result)
|
148
143
|
provider.run_action(:run)
|
149
144
|
end
|
150
145
|
end
|
@@ -153,9 +148,7 @@ describe Chef::Provider::DscResource do
|
|
153
148
|
let(:resource_records) { [{ "Module" => { "Name" => "ModuleName" } }] }
|
154
149
|
|
155
150
|
it "returns the default dsc resource module" do
|
156
|
-
expect(
|
157
|
-
expect(cmdlet).to match(/Module ModuleName /)
|
158
|
-
end.and_return(invoke_dsc_resource)
|
151
|
+
expect(provider).to receive(:powershell_exec!).with(/Module ModuleName /).and_return(resource_result)
|
159
152
|
provider.run_action(:run)
|
160
153
|
end
|
161
154
|
end
|
@@ -286,8 +279,6 @@ describe Chef::Provider::DscResource do
|
|
286
279
|
end
|
287
280
|
|
288
281
|
describe "invoke_resource" do
|
289
|
-
let(:cmdlet) { double(run!: nil) }
|
290
|
-
|
291
282
|
before(:each) do
|
292
283
|
allow(provider).to receive(:translate_type).and_return("my_properties")
|
293
284
|
provider.instance_variable_set(:@new_resource, double(
|
@@ -301,12 +292,8 @@ describe Chef::Provider::DscResource do
|
|
301
292
|
end
|
302
293
|
|
303
294
|
it "invokes Invoke-DscResource command with module name" do
|
304
|
-
expect(
|
305
|
-
|
306
|
-
"Invoke-DscResource -Method my_method -Name my_resource -Property my_properties -Module my_module -Verbose",
|
307
|
-
"my_output_format"
|
308
|
-
).and_return(cmdlet)
|
309
|
-
provider.send(:invoke_resource, "my_method", "my_output_format")
|
295
|
+
expect(provider).to receive(:powershell_exec!).with("Invoke-DscResource -Method my_method -Name my_resource -Property my_properties -Module my_module -Verbose").and_return(nil)
|
296
|
+
provider.send(:invoke_resource, "my_method")
|
310
297
|
end
|
311
298
|
end
|
312
299
|
|
@@ -318,12 +305,8 @@ describe Chef::Provider::DscResource do
|
|
318
305
|
end
|
319
306
|
|
320
307
|
it "invokes Invoke-DscResource command with module info object" do
|
321
|
-
expect(
|
322
|
-
|
323
|
-
"Invoke-DscResource -Method my_method -Name my_resource -Property my_properties -Module @{ModuleName='my_module';ModuleVersion='my_module_version'} -Verbose",
|
324
|
-
"my_output_format"
|
325
|
-
).and_return(cmdlet)
|
326
|
-
provider.send(:invoke_resource, "my_method", "my_output_format")
|
308
|
+
expect(provider).to receive(:powershell_exec!).with("Invoke-DscResource -Method my_method -Name my_resource -Property my_properties -Module @{ModuleName='my_module';ModuleVersion='my_module_version'} -Verbose").and_return(nil)
|
309
|
+
provider.send(:invoke_resource, "my_method")
|
327
310
|
end
|
328
311
|
end
|
329
312
|
end
|
@@ -99,7 +99,7 @@ describe Chef::Provider::DscScript do
|
|
99
99
|
it "should noop if neither code or command are provided" do
|
100
100
|
allow(provider).to receive(:load_current_resource)
|
101
101
|
generator = double("Chef::Util::DSC::ConfigurationGenerator")
|
102
|
-
expect(generator).to receive(:configuration_document_from_script_code).with("", anything, anything
|
102
|
+
expect(generator).to receive(:configuration_document_from_script_code).with("", anything, anything)
|
103
103
|
allow(Chef::Util::DSC::ConfigurationGenerator).to receive(:new).and_return(generator)
|
104
104
|
provider.send(:generate_configuration_document, "tmp", nil)
|
105
105
|
end
|
@@ -80,4 +80,16 @@ describe Chef::Resource::WindowsCertificate do
|
|
80
80
|
resource.store_name "MY"
|
81
81
|
expect { resource.action :create }.not_to raise_error
|
82
82
|
end
|
83
|
+
|
84
|
+
it "the exportable property defaults to false" do
|
85
|
+
expect(resource.exportable).to be false
|
86
|
+
end
|
87
|
+
|
88
|
+
it "doesn't raise error if exportable option is passed" do
|
89
|
+
resource.pfx_password "chef$123"
|
90
|
+
resource.source "C:\\certs\\test-cert.pfx"
|
91
|
+
resource.store_name "MY"
|
92
|
+
resource.exportable true
|
93
|
+
expect { resource.action :create }.not_to raise_error
|
94
|
+
end
|
83
95
|
end
|
@@ -25,6 +25,85 @@ describe Chef::Util::DSC::ConfigurationGenerator do
|
|
25
25
|
Chef::Util::DSC::ConfigurationGenerator.new(node, "tmp")
|
26
26
|
end
|
27
27
|
|
28
|
+
describe "#validate_switch_name!" do
|
29
|
+
it "should not raise an error if a name contains all upper case letters" do
|
30
|
+
conf_man.send(:validate_switch_name!, "HELLO")
|
31
|
+
end
|
32
|
+
|
33
|
+
it "should not raise an error if the name contains all lower case letters" do
|
34
|
+
conf_man.send(:validate_switch_name!, "hello")
|
35
|
+
end
|
36
|
+
|
37
|
+
it "should not raise an error if no special characters are used except _" do
|
38
|
+
conf_man.send(:validate_switch_name!, "hello_world")
|
39
|
+
end
|
40
|
+
|
41
|
+
%w{! @ # $ % ^ & * & * ( ) - = + \{ \} . ? < > \\ /}.each do |sym|
|
42
|
+
it "raises an ArgumentError if configuration name contains #{sym}" do
|
43
|
+
expect do
|
44
|
+
conf_man.send(:validate_switch_name!, "Hello#{sym}")
|
45
|
+
end.to raise_error(ArgumentError)
|
46
|
+
end
|
47
|
+
end
|
48
|
+
end
|
49
|
+
|
50
|
+
describe "#escape_parameter_value" do
|
51
|
+
# Is this list really complete?
|
52
|
+
%w{` " # '}.each do |c|
|
53
|
+
it "escapes #{c}" do
|
54
|
+
expect(conf_man.send(:escape_parameter_value, "stuff #{c}")).to eql("stuff `#{c}")
|
55
|
+
end
|
56
|
+
end
|
57
|
+
|
58
|
+
it "does not do anything to a string without special characters" do
|
59
|
+
expect(conf_man.send(:escape_parameter_value, "stuff")).to eql("stuff")
|
60
|
+
end
|
61
|
+
end
|
62
|
+
|
63
|
+
describe "#escape_string_parameter_value" do
|
64
|
+
it "surrounds a string with ''" do
|
65
|
+
expect(conf_man.send(:escape_string_parameter_value, "stuff")).to eql("'stuff'")
|
66
|
+
end
|
67
|
+
end
|
68
|
+
|
69
|
+
describe "#command_switches_string" do
|
70
|
+
it "raises an ArgumentError if the key is not a symbol" do
|
71
|
+
expect do
|
72
|
+
conf_man.send(:command_switches_string, { "foo" => "bar" })
|
73
|
+
end.to raise_error(ArgumentError)
|
74
|
+
end
|
75
|
+
|
76
|
+
it "does not allow invalid switch names" do
|
77
|
+
expect do
|
78
|
+
conf_man.send(:command_switches_string, { foo!: "bar" })
|
79
|
+
end.to raise_error(ArgumentError)
|
80
|
+
end
|
81
|
+
|
82
|
+
it "ignores switches with a false value" do
|
83
|
+
expect(conf_man.send(:command_switches_string, { foo: false })).to eql("")
|
84
|
+
end
|
85
|
+
|
86
|
+
it "should correctly handle a value type of string" do
|
87
|
+
expect(conf_man.send(:command_switches_string, { foo: "bar" })).to eql("-foo 'bar'")
|
88
|
+
end
|
89
|
+
|
90
|
+
it "should correctly handle a value type of string even when it is 0 length" do
|
91
|
+
expect(conf_man.send(:command_switches_string, { foo: "" })).to eql("-foo ''")
|
92
|
+
end
|
93
|
+
|
94
|
+
it "should not quote integers" do
|
95
|
+
expect(conf_man.send(:command_switches_string, { foo: 1 })).to eql("-foo 1")
|
96
|
+
end
|
97
|
+
|
98
|
+
it "should not quote floats" do
|
99
|
+
expect(conf_man.send(:command_switches_string, { foo: 1.0 })).to eql("-foo 1.0")
|
100
|
+
end
|
101
|
+
|
102
|
+
it "has just the switch when the value is true" do
|
103
|
+
expect(conf_man.send(:command_switches_string, { foo: true })).to eql("-foo")
|
104
|
+
end
|
105
|
+
end
|
106
|
+
|
28
107
|
describe "#validate_configuration_name!" do
|
29
108
|
it "should not raise an error if a name contains all upper case letters" do
|
30
109
|
conf_man.send(:validate_configuration_name!, "HELLO")
|