knife-windows 0.8.2 → 0.8.3.rc.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +5 -13
- data/.gitignore +4 -4
- data/.travis.yml +6 -6
- data/CHANGELOG.md +47 -43
- data/DOC_CHANGES.md +23 -23
- data/Gemfile +11 -11
- data/LICENSE +201 -201
- data/README.md +161 -161
- data/RELEASE_NOTES.md +39 -62
- data/Rakefile +16 -16
- data/features/knife_help.feature +20 -20
- data/features/support/env.rb +5 -5
- data/knife-windows.gemspec +26 -26
- data/lib/chef/knife/bootstrap/windows-chef-client-msi.erb +222 -222
- data/lib/chef/knife/bootstrap_windows_base.rb +207 -206
- data/lib/chef/knife/bootstrap_windows_ssh.rb +93 -93
- data/lib/chef/knife/bootstrap_windows_winrm.rb +102 -102
- data/lib/chef/knife/core/windows_bootstrap_context.rb +249 -227
- data/lib/chef/knife/windows_helper.rb +34 -34
- data/lib/chef/knife/winrm.rb +315 -315
- data/lib/chef/knife/winrm_base.rb +99 -99
- data/lib/knife-windows/version.rb +6 -6
- data/spec/functional/bootstrap_download_spec.rb +122 -122
- data/spec/spec_helper.rb +61 -61
- data/spec/unit/knife/bootstrap_template_spec.rb +91 -91
- data/spec/unit/knife/bootstrap_windows_winrm_spec.rb +106 -106
- data/spec/unit/knife/core/windows_bootstrap_context_spec.rb +54 -0
- data/spec/unit/knife/winrm_spec.rb +219 -219
- metadata +10 -16
@@ -1,99 +1,99 @@
|
|
1
|
-
#
|
2
|
-
# Author:: Seth Chisamore (<schisamo@opscode.com>)
|
3
|
-
# Copyright:: Copyright (c) 2011 Opscode, Inc.
|
4
|
-
# License:: Apache License, Version 2.0
|
5
|
-
#
|
6
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
-
# you may not use this file except in compliance with the License.
|
8
|
-
# You may obtain a copy of the License at
|
9
|
-
#
|
10
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
-
#
|
12
|
-
# Unless required by applicable law or agreed to in writing, software
|
13
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
-
# See the License for the specific language governing permissions and
|
16
|
-
# limitations under the License.
|
17
|
-
#
|
18
|
-
|
19
|
-
require 'chef/knife'
|
20
|
-
require 'chef/encrypted_data_bag_item'
|
21
|
-
require 'kconv'
|
22
|
-
|
23
|
-
class Chef
|
24
|
-
class Knife
|
25
|
-
module WinrmBase
|
26
|
-
|
27
|
-
# :nodoc:
|
28
|
-
# Would prefer to do this in a rational way, but can't be done b/c of
|
29
|
-
# Mixlib::CLI's design :(
|
30
|
-
def self.included(includer)
|
31
|
-
includer.class_eval do
|
32
|
-
|
33
|
-
deps do
|
34
|
-
require 'readline'
|
35
|
-
require 'chef/json_compat'
|
36
|
-
end
|
37
|
-
|
38
|
-
option :winrm_user,
|
39
|
-
:short => "-x USERNAME",
|
40
|
-
:long => "--winrm-user USERNAME",
|
41
|
-
:description => "The WinRM username",
|
42
|
-
:default => "Administrator",
|
43
|
-
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_user] = key }
|
44
|
-
|
45
|
-
option :winrm_password,
|
46
|
-
:short => "-P PASSWORD",
|
47
|
-
:long => "--winrm-password PASSWORD",
|
48
|
-
:description => "The WinRM password",
|
49
|
-
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_password] = key }
|
50
|
-
|
51
|
-
option :winrm_port,
|
52
|
-
:short => "-p PORT",
|
53
|
-
:long => "--winrm-port PORT",
|
54
|
-
:description => "The WinRM port, by default this is 5985",
|
55
|
-
:default => "5985",
|
56
|
-
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_port] = key }
|
57
|
-
|
58
|
-
option :identity_file,
|
59
|
-
:short => "-i IDENTITY_FILE",
|
60
|
-
:long => "--identity-file IDENTITY_FILE",
|
61
|
-
:description => "The SSH identity file used for authentication"
|
62
|
-
|
63
|
-
option :winrm_transport,
|
64
|
-
:short => "-t TRANSPORT",
|
65
|
-
:long => "--winrm-transport TRANSPORT",
|
66
|
-
:description => "The WinRM transport type. valid choices are [ssl, plaintext]",
|
67
|
-
:default => 'plaintext',
|
68
|
-
:proc => Proc.new { |transport| Chef::Config[:knife][:winrm_transport] = transport }
|
69
|
-
|
70
|
-
option :kerberos_keytab_file,
|
71
|
-
:short => "-i KEYTAB_FILE",
|
72
|
-
:long => "--keytab-file KEYTAB_FILE",
|
73
|
-
:description => "The Kerberos keytab file used for authentication",
|
74
|
-
:proc => Proc.new { |keytab| Chef::Config[:knife][:kerberos_keytab_file] = keytab }
|
75
|
-
|
76
|
-
option :kerberos_realm,
|
77
|
-
:short => "-R KERBEROS_REALM",
|
78
|
-
:long => "--kerberos-realm KERBEROS_REALM",
|
79
|
-
:description => "The Kerberos realm used for authentication",
|
80
|
-
:proc => Proc.new { |realm| Chef::Config[:knife][:kerberos_realm] = realm }
|
81
|
-
|
82
|
-
option :kerberos_service,
|
83
|
-
:short => "-S KERBEROS_SERVICE",
|
84
|
-
:long => "--kerberos-service KERBEROS_SERVICE",
|
85
|
-
:description => "The Kerberos service used for authentication",
|
86
|
-
:proc => Proc.new { |service| Chef::Config[:knife][:kerberos_service] = service }
|
87
|
-
|
88
|
-
option :ca_trust_file,
|
89
|
-
:short => "-f CA_TRUST_FILE",
|
90
|
-
:long => "--ca-trust-file CA_TRUST_FILE",
|
91
|
-
:description => "The Certificate Authority (CA) trust file used for SSL transport",
|
92
|
-
:proc => Proc.new { |trust| Chef::Config[:knife][:ca_trust_file] = trust }
|
93
|
-
|
94
|
-
end
|
95
|
-
end
|
96
|
-
|
97
|
-
end
|
98
|
-
end
|
99
|
-
end
|
1
|
+
#
|
2
|
+
# Author:: Seth Chisamore (<schisamo@opscode.com>)
|
3
|
+
# Copyright:: Copyright (c) 2011 Opscode, Inc.
|
4
|
+
# License:: Apache License, Version 2.0
|
5
|
+
#
|
6
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
+
# you may not use this file except in compliance with the License.
|
8
|
+
# You may obtain a copy of the License at
|
9
|
+
#
|
10
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
+
#
|
12
|
+
# Unless required by applicable law or agreed to in writing, software
|
13
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
15
|
+
# See the License for the specific language governing permissions and
|
16
|
+
# limitations under the License.
|
17
|
+
#
|
18
|
+
|
19
|
+
require 'chef/knife'
|
20
|
+
require 'chef/encrypted_data_bag_item'
|
21
|
+
require 'kconv'
|
22
|
+
|
23
|
+
class Chef
|
24
|
+
class Knife
|
25
|
+
module WinrmBase
|
26
|
+
|
27
|
+
# :nodoc:
|
28
|
+
# Would prefer to do this in a rational way, but can't be done b/c of
|
29
|
+
# Mixlib::CLI's design :(
|
30
|
+
def self.included(includer)
|
31
|
+
includer.class_eval do
|
32
|
+
|
33
|
+
deps do
|
34
|
+
require 'readline'
|
35
|
+
require 'chef/json_compat'
|
36
|
+
end
|
37
|
+
|
38
|
+
option :winrm_user,
|
39
|
+
:short => "-x USERNAME",
|
40
|
+
:long => "--winrm-user USERNAME",
|
41
|
+
:description => "The WinRM username",
|
42
|
+
:default => "Administrator",
|
43
|
+
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_user] = key }
|
44
|
+
|
45
|
+
option :winrm_password,
|
46
|
+
:short => "-P PASSWORD",
|
47
|
+
:long => "--winrm-password PASSWORD",
|
48
|
+
:description => "The WinRM password",
|
49
|
+
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_password] = key }
|
50
|
+
|
51
|
+
option :winrm_port,
|
52
|
+
:short => "-p PORT",
|
53
|
+
:long => "--winrm-port PORT",
|
54
|
+
:description => "The WinRM port, by default this is 5985",
|
55
|
+
:default => "5985",
|
56
|
+
:proc => Proc.new { |key| Chef::Config[:knife][:winrm_port] = key }
|
57
|
+
|
58
|
+
option :identity_file,
|
59
|
+
:short => "-i IDENTITY_FILE",
|
60
|
+
:long => "--identity-file IDENTITY_FILE",
|
61
|
+
:description => "The SSH identity file used for authentication"
|
62
|
+
|
63
|
+
option :winrm_transport,
|
64
|
+
:short => "-t TRANSPORT",
|
65
|
+
:long => "--winrm-transport TRANSPORT",
|
66
|
+
:description => "The WinRM transport type. valid choices are [ssl, plaintext]",
|
67
|
+
:default => 'plaintext',
|
68
|
+
:proc => Proc.new { |transport| Chef::Config[:knife][:winrm_transport] = transport }
|
69
|
+
|
70
|
+
option :kerberos_keytab_file,
|
71
|
+
:short => "-i KEYTAB_FILE",
|
72
|
+
:long => "--keytab-file KEYTAB_FILE",
|
73
|
+
:description => "The Kerberos keytab file used for authentication",
|
74
|
+
:proc => Proc.new { |keytab| Chef::Config[:knife][:kerberos_keytab_file] = keytab }
|
75
|
+
|
76
|
+
option :kerberos_realm,
|
77
|
+
:short => "-R KERBEROS_REALM",
|
78
|
+
:long => "--kerberos-realm KERBEROS_REALM",
|
79
|
+
:description => "The Kerberos realm used for authentication",
|
80
|
+
:proc => Proc.new { |realm| Chef::Config[:knife][:kerberos_realm] = realm }
|
81
|
+
|
82
|
+
option :kerberos_service,
|
83
|
+
:short => "-S KERBEROS_SERVICE",
|
84
|
+
:long => "--kerberos-service KERBEROS_SERVICE",
|
85
|
+
:description => "The Kerberos service used for authentication",
|
86
|
+
:proc => Proc.new { |service| Chef::Config[:knife][:kerberos_service] = service }
|
87
|
+
|
88
|
+
option :ca_trust_file,
|
89
|
+
:short => "-f CA_TRUST_FILE",
|
90
|
+
:long => "--ca-trust-file CA_TRUST_FILE",
|
91
|
+
:description => "The Certificate Authority (CA) trust file used for SSL transport",
|
92
|
+
:proc => Proc.new { |trust| Chef::Config[:knife][:ca_trust_file] = trust }
|
93
|
+
|
94
|
+
end
|
95
|
+
end
|
96
|
+
|
97
|
+
end
|
98
|
+
end
|
99
|
+
end
|
@@ -1,6 +1,6 @@
|
|
1
|
-
module Knife
|
2
|
-
module Windows
|
3
|
-
VERSION = "0.8.
|
4
|
-
MAJOR, MINOR, TINY = VERSION.split('.')
|
5
|
-
end
|
6
|
-
end
|
1
|
+
module Knife
|
2
|
+
module Windows
|
3
|
+
VERSION = "0.8.3.rc.0"
|
4
|
+
MAJOR, MINOR, TINY = VERSION.split('.')
|
5
|
+
end
|
6
|
+
end
|
@@ -1,122 +1,122 @@
|
|
1
|
-
#
|
2
|
-
# Author:: Adam Edwards (<adamed@opscode.com>)
|
3
|
-
# Copyright:: Copyright (c) 2012 Opscode, Inc.
|
4
|
-
# License:: Apache License, Version 2.0
|
5
|
-
#
|
6
|
-
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
-
# you may not use this file except in compliance with the License.
|
8
|
-
# You may obtain a copy of the License at
|
9
|
-
#
|
10
|
-
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
-
#
|
12
|
-
# Unless required by applicable law or agreed to in writing, software
|
13
|
-
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
-
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
15
|
-
# implied.
|
16
|
-
# See the License for the specific language governing permissions and
|
17
|
-
# limitations under the License.
|
18
|
-
#
|
19
|
-
|
20
|
-
require 'spec_helper'
|
21
|
-
require 'tmpdir'
|
22
|
-
|
23
|
-
# These test cases exercise the Knife::Windows knife plugin's ability
|
24
|
-
# to download a bootstrap msi as part of the bootstrap process on
|
25
|
-
# Windows nodes. The test modifies the Windows batch file generated
|
26
|
-
# from an erb template in the plugin source in order to enable execution
|
27
|
-
# of only the download functionality contained in the bootstrap template.
|
28
|
-
# The test relies on knowledge of the fields of the template itself and
|
29
|
-
# also on knowledge of the contents and structure of the Windows batch
|
30
|
-
# file generated by the template.
|
31
|
-
#
|
32
|
-
# Note that if the bootstrap template changes substantially, the tests
|
33
|
-
# should fail and will require re-implementation. If such changes
|
34
|
-
# occur, the bootstrap code should be refactored to explicitly expose
|
35
|
-
# the download funcitonality separately from other tasks to make the
|
36
|
-
# test more robust.
|
37
|
-
describe 'Knife::Windows::Core msi download functionality for knife Windows winrm bootstrap template' do
|
38
|
-
|
39
|
-
before(:all) do
|
40
|
-
# Since we're always running 32-bit Ruby, fix the
|
41
|
-
# PROCESSOR_ARCHITECTURE environment variable.
|
42
|
-
|
43
|
-
if ENV["PROCESSOR_ARCHITEW6432"]
|
44
|
-
ENV["PROCESSOR_ARCHITECTURE"] = ENV["PROCESSOR_ARCHITEW6432"]
|
45
|
-
end
|
46
|
-
|
47
|
-
# All file artifacts from this test will be written into this directory
|
48
|
-
@temp_directory = Dir.mktmpdir("bootstrap_test")
|
49
|
-
|
50
|
-
# Location to which the download script will be modified to write
|
51
|
-
# the downloaded msi
|
52
|
-
@local_file_download_destination = "#{@temp_directory}/chef-client-latest.msi"
|
53
|
-
|
54
|
-
source_code_directory = File.dirname(__FILE__)
|
55
|
-
@template_file_path ="#{source_code_directory}/../../lib/chef/knife/bootstrap/windows-chef-client-msi.erb"
|
56
|
-
end
|
57
|
-
|
58
|
-
after(:all) do
|
59
|
-
# Clear the temp directory upon exit
|
60
|
-
if Dir.exists?(@temp_directory)
|
61
|
-
FileUtils::remove_dir(@temp_directory)
|
62
|
-
end
|
63
|
-
end
|
64
|
-
|
65
|
-
describe "running on any version of the Windows OS", :windows_only do
|
66
|
-
|
67
|
-
|
68
|
-
|
69
|
-
|
70
|
-
#
|
71
|
-
#
|
72
|
-
|
73
|
-
allow(
|
74
|
-
allow(
|
75
|
-
allow(
|
76
|
-
allow(
|
77
|
-
allow(
|
78
|
-
|
79
|
-
|
80
|
-
|
81
|
-
allow(
|
82
|
-
|
83
|
-
|
84
|
-
|
85
|
-
allow(
|
86
|
-
allow(Chef::Knife::Winrm).to receive(:new).and_return(
|
87
|
-
|
88
|
-
allow(Chef::Knife::Core::WindowsBootstrapContext).to receive(:new).and_return(
|
89
|
-
end
|
90
|
-
|
91
|
-
it "downloads the chef-client MSI during winrm bootstrap" do
|
92
|
-
|
93
|
-
clean_test_case
|
94
|
-
|
95
|
-
winrm_bootstrapper = Chef::Knife::BootstrapWindowsWinrm.new([ "127.0.0.1" ])
|
96
|
-
allow(winrm_bootstrapper).to receive(:wait_for_remote_response)
|
97
|
-
winrm_bootstrapper.config[:template_file] = @template_file_path
|
98
|
-
|
99
|
-
# Execute the commands locally that would normally be executed via WinRM
|
100
|
-
allow(winrm_bootstrapper).to receive(:run_command) do |command|
|
101
|
-
system(command)
|
102
|
-
end
|
103
|
-
|
104
|
-
winrm_bootstrapper.run
|
105
|
-
|
106
|
-
# Download should succeed
|
107
|
-
expect(download_succeeded?).to be true
|
108
|
-
end
|
109
|
-
end
|
110
|
-
|
111
|
-
def download_succeeded?
|
112
|
-
File.exists?(@local_file_download_destination) && ! File.zero?(@local_file_download_destination)
|
113
|
-
end
|
114
|
-
|
115
|
-
# Remove file artifacts generated by individual test cases
|
116
|
-
def clean_test_case
|
117
|
-
if File.exists?(@local_file_download_destination)
|
118
|
-
File.delete(@local_file_download_destination)
|
119
|
-
end
|
120
|
-
end
|
121
|
-
|
122
|
-
end
|
1
|
+
#
|
2
|
+
# Author:: Adam Edwards (<adamed@opscode.com>)
|
3
|
+
# Copyright:: Copyright (c) 2012 Opscode, Inc.
|
4
|
+
# License:: Apache License, Version 2.0
|
5
|
+
#
|
6
|
+
# Licensed under the Apache License, Version 2.0 (the "License");
|
7
|
+
# you may not use this file except in compliance with the License.
|
8
|
+
# You may obtain a copy of the License at
|
9
|
+
#
|
10
|
+
# http://www.apache.org/licenses/LICENSE-2.0
|
11
|
+
#
|
12
|
+
# Unless required by applicable law or agreed to in writing, software
|
13
|
+
# distributed under the License is distributed on an "AS IS" BASIS,
|
14
|
+
# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or
|
15
|
+
# implied.
|
16
|
+
# See the License for the specific language governing permissions and
|
17
|
+
# limitations under the License.
|
18
|
+
#
|
19
|
+
|
20
|
+
require 'spec_helper'
|
21
|
+
require 'tmpdir'
|
22
|
+
|
23
|
+
# These test cases exercise the Knife::Windows knife plugin's ability
|
24
|
+
# to download a bootstrap msi as part of the bootstrap process on
|
25
|
+
# Windows nodes. The test modifies the Windows batch file generated
|
26
|
+
# from an erb template in the plugin source in order to enable execution
|
27
|
+
# of only the download functionality contained in the bootstrap template.
|
28
|
+
# The test relies on knowledge of the fields of the template itself and
|
29
|
+
# also on knowledge of the contents and structure of the Windows batch
|
30
|
+
# file generated by the template.
|
31
|
+
#
|
32
|
+
# Note that if the bootstrap template changes substantially, the tests
|
33
|
+
# should fail and will require re-implementation. If such changes
|
34
|
+
# occur, the bootstrap code should be refactored to explicitly expose
|
35
|
+
# the download funcitonality separately from other tasks to make the
|
36
|
+
# test more robust.
|
37
|
+
describe 'Knife::Windows::Core msi download functionality for knife Windows winrm bootstrap template' do
|
38
|
+
|
39
|
+
before(:all) do
|
40
|
+
# Since we're always running 32-bit Ruby, fix the
|
41
|
+
# PROCESSOR_ARCHITECTURE environment variable.
|
42
|
+
|
43
|
+
if ENV["PROCESSOR_ARCHITEW6432"]
|
44
|
+
ENV["PROCESSOR_ARCHITECTURE"] = ENV["PROCESSOR_ARCHITEW6432"]
|
45
|
+
end
|
46
|
+
|
47
|
+
# All file artifacts from this test will be written into this directory
|
48
|
+
@temp_directory = Dir.mktmpdir("bootstrap_test")
|
49
|
+
|
50
|
+
# Location to which the download script will be modified to write
|
51
|
+
# the downloaded msi
|
52
|
+
@local_file_download_destination = "#{@temp_directory}/chef-client-latest.msi"
|
53
|
+
|
54
|
+
source_code_directory = File.dirname(__FILE__)
|
55
|
+
@template_file_path ="#{source_code_directory}/../../lib/chef/knife/bootstrap/windows-chef-client-msi.erb"
|
56
|
+
end
|
57
|
+
|
58
|
+
after(:all) do
|
59
|
+
# Clear the temp directory upon exit
|
60
|
+
if Dir.exists?(@temp_directory)
|
61
|
+
FileUtils::remove_dir(@temp_directory)
|
62
|
+
end
|
63
|
+
end
|
64
|
+
|
65
|
+
describe "running on any version of the Windows OS", :windows_only do
|
66
|
+
let(:mock_bootstrap_context) { Chef::Knife::Core::WindowsBootstrapContext.new({ }, nil, { :knife => {} }) }
|
67
|
+
let(:mock_winrm) { Chef::Knife::Winrm.new }
|
68
|
+
|
69
|
+
before do
|
70
|
+
# Stub the bootstrap context and prevent config related sections
|
71
|
+
# from being populated, i.e. chef installation and first chef
|
72
|
+
# run sections
|
73
|
+
allow(mock_bootstrap_context).to receive(:validation_key).and_return("echo.validation_key")
|
74
|
+
allow(mock_bootstrap_context).to receive(:encrypted_data_bag_secret).and_return("echo.encrypted_data_bag_secret")
|
75
|
+
allow(mock_bootstrap_context).to receive(:config_content).and_return("echo.config_content")
|
76
|
+
allow(mock_bootstrap_context).to receive(:start_chef).and_return("echo.echo start_chef_command")
|
77
|
+
allow(mock_bootstrap_context).to receive(:run_list).and_return("echo.run_list")
|
78
|
+
allow(mock_bootstrap_context).to receive(:install_chef).and_return("echo.echo install_chef_command")
|
79
|
+
|
80
|
+
# Change the directories where bootstrap files will be created
|
81
|
+
allow(mock_bootstrap_context).to receive(:bootstrap_directory).and_return(@temp_directory.gsub(::File::SEPARATOR, ::File::ALT_SEPARATOR))
|
82
|
+
allow(mock_bootstrap_context).to receive(:local_download_path).and_return(@local_file_download_destination.gsub(::File::SEPARATOR, ::File::ALT_SEPARATOR))
|
83
|
+
|
84
|
+
# Prevent password prompt during bootstrap process
|
85
|
+
allow(mock_winrm).to receive(:get_password).and_return(nil)
|
86
|
+
allow(Chef::Knife::Winrm).to receive(:new).and_return(mock_winrm)
|
87
|
+
|
88
|
+
allow(Chef::Knife::Core::WindowsBootstrapContext).to receive(:new).and_return(mock_bootstrap_context)
|
89
|
+
end
|
90
|
+
|
91
|
+
it "downloads the chef-client MSI during winrm bootstrap" do
|
92
|
+
|
93
|
+
clean_test_case
|
94
|
+
|
95
|
+
winrm_bootstrapper = Chef::Knife::BootstrapWindowsWinrm.new([ "127.0.0.1" ])
|
96
|
+
allow(winrm_bootstrapper).to receive(:wait_for_remote_response)
|
97
|
+
winrm_bootstrapper.config[:template_file] = @template_file_path
|
98
|
+
|
99
|
+
# Execute the commands locally that would normally be executed via WinRM
|
100
|
+
allow(winrm_bootstrapper).to receive(:run_command) do |command|
|
101
|
+
system(command)
|
102
|
+
end
|
103
|
+
|
104
|
+
winrm_bootstrapper.run
|
105
|
+
|
106
|
+
# Download should succeed
|
107
|
+
expect(download_succeeded?).to be true
|
108
|
+
end
|
109
|
+
end
|
110
|
+
|
111
|
+
def download_succeeded?
|
112
|
+
File.exists?(@local_file_download_destination) && ! File.zero?(@local_file_download_destination)
|
113
|
+
end
|
114
|
+
|
115
|
+
# Remove file artifacts generated by individual test cases
|
116
|
+
def clean_test_case
|
117
|
+
if File.exists?(@local_file_download_destination)
|
118
|
+
File.delete(@local_file_download_destination)
|
119
|
+
end
|
120
|
+
end
|
121
|
+
|
122
|
+
end
|