knife-windows 3.0.6 → 3.0.10
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/lib/chef/knife/bootstrap_windows_base.rb +87 -86
- data/lib/chef/knife/bootstrap_windows_ssh.rb +43 -43
- data/lib/chef/knife/bootstrap_windows_winrm.rb +16 -17
- data/lib/chef/knife/knife_windows_base.rb +0 -1
- data/lib/chef/knife/windows_cert_generate.rb +31 -31
- data/lib/chef/knife/windows_cert_install.rb +6 -6
- data/lib/chef/knife/windows_helper.rb +8 -8
- data/lib/chef/knife/windows_listener_create.rb +24 -24
- data/lib/chef/knife/winrm.rb +17 -17
- data/lib/chef/knife/winrm_base.rb +64 -62
- data/lib/chef/knife/winrm_knife_base.rb +41 -41
- data/lib/chef/knife/winrm_session.rb +7 -7
- data/lib/chef/knife/winrm_shared_options.rb +17 -17
- data/lib/chef/knife/wsman_endpoint.rb +1 -1
- data/lib/chef/knife/wsman_test.rb +10 -10
- data/lib/knife-windows/version.rb +2 -2
- data/spec/dummy_winrm_connection.rb +0 -1
- data/spec/spec_helper.rb +5 -80
- data/spec/unit/knife/windows_cert_generate_spec.rb +6 -6
- data/spec/unit/knife/windows_cert_install_spec.rb +2 -2
- data/spec/unit/knife/windows_listener_create_spec.rb +2 -2
- data/spec/unit/knife/winrm_session_spec.rb +6 -7
- data/spec/unit/knife/winrm_spec.rb +91 -87
- data/spec/unit/knife/wsman_test_spec.rb +43 -43
- metadata +2 -2
@@ -16,11 +16,11 @@
|
|
16
16
|
# limitations under the License.
|
17
17
|
#
|
18
18
|
|
19
|
-
require
|
19
|
+
require "spec_helper"
|
20
20
|
|
21
21
|
describe Chef::Knife::WsmanTest do
|
22
22
|
let(:http_client_mock) { HTTPClient.new }
|
23
|
-
let(:ssl_policy) { double(
|
23
|
+
let(:ssl_policy) { double("DefaultSSLPolicy", set_custom_certs: nil) }
|
24
24
|
|
25
25
|
before(:all) do
|
26
26
|
Chef::Config.reset
|
@@ -32,31 +32,31 @@ describe Chef::Knife::WsmanTest do
|
|
32
32
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
33
33
|
allow(HTTPClient).to receive(:new).and_return(http_client_mock)
|
34
34
|
subject.config[:verbosity] = 0
|
35
|
-
allow(subject.ui).to receive(:ask).and_return(
|
35
|
+
allow(subject.ui).to receive(:ask).and_return("prompted_password")
|
36
36
|
allow(Chef::HTTP::DefaultSSLPolicy).to receive(:new)
|
37
37
|
.with(http_client_mock.ssl_config)
|
38
38
|
.and_return(ssl_policy)
|
39
39
|
end
|
40
40
|
|
41
|
-
subject { Chef::Knife::WsmanTest.new([
|
41
|
+
subject { Chef::Knife::WsmanTest.new(["-m", "localhost"]) }
|
42
42
|
|
43
|
-
it
|
43
|
+
it "sets the ssl policy" do
|
44
44
|
expect(ssl_policy).to receive(:set_custom_certs).twice
|
45
45
|
subject.run
|
46
46
|
end
|
47
47
|
|
48
|
-
context
|
49
|
-
context
|
50
|
-
context
|
51
|
-
it
|
48
|
+
context "when testing the WSMAN endpoint" do
|
49
|
+
context "and the service responds" do
|
50
|
+
context "successfully" do
|
51
|
+
it "writes a message about a successful connection" do
|
52
52
|
expect(subject.ui).to receive(:msg)
|
53
53
|
subject.run
|
54
54
|
end
|
55
55
|
end
|
56
56
|
|
57
|
-
context
|
58
|
-
it
|
59
|
-
response_body =
|
57
|
+
context "with an invalid body" do
|
58
|
+
it "warns for a failed connection and exit with a status of 1" do
|
59
|
+
response_body = "I am invalid"
|
60
60
|
http_response_mock = HTTP::Message.new_response(response_body)
|
61
61
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
62
62
|
expect(subject.ui).to receive(:warn)
|
@@ -66,9 +66,9 @@ describe Chef::Knife::WsmanTest do
|
|
66
66
|
end
|
67
67
|
end
|
68
68
|
|
69
|
-
context
|
70
|
-
it
|
71
|
-
http_response_mock = HTTP::Message.new_response(
|
69
|
+
context "with a non-200 code" do
|
70
|
+
it "warns for a failed connection and exits with a status of 1" do
|
71
|
+
http_response_mock = HTTP::Message.new_response("<resp></resp>")
|
72
72
|
http_response_mock.status = 404
|
73
73
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
74
74
|
expect(subject.ui).to receive(:warn)
|
@@ -79,25 +79,25 @@ describe Chef::Knife::WsmanTest do
|
|
79
79
|
end
|
80
80
|
end
|
81
81
|
|
82
|
-
context
|
83
|
-
error_message =
|
82
|
+
context "and the service does not respond" do
|
83
|
+
error_message = "A connection attempt failed because the connected party did not properly respond after a period of time."
|
84
84
|
|
85
85
|
before(:each) do
|
86
86
|
allow(http_client_mock).to receive(:post).and_raise(Exception.new(error_message))
|
87
87
|
end
|
88
88
|
|
89
|
-
it
|
89
|
+
it "exits with a status code of 1" do
|
90
90
|
expect(subject).to receive(:exit).with(1)
|
91
91
|
subject.run
|
92
92
|
end
|
93
93
|
|
94
|
-
it
|
94
|
+
it "writes a warning message for each node it fails to connect to" do
|
95
95
|
expect(subject.ui).to receive(:warn)
|
96
96
|
expect(subject).to receive(:exit).with(1)
|
97
97
|
subject.run
|
98
98
|
end
|
99
99
|
|
100
|
-
it
|
100
|
+
it "writes an error message if it fails to connect to any nodes" do
|
101
101
|
expect(subject.ui).to receive(:error)
|
102
102
|
expect(subject).to receive(:exit).with(1)
|
103
103
|
subject.run
|
@@ -105,27 +105,27 @@ describe Chef::Knife::WsmanTest do
|
|
105
105
|
end
|
106
106
|
end
|
107
107
|
|
108
|
-
context
|
108
|
+
context "when not validating ssl cert" do
|
109
109
|
before(:each) do
|
110
110
|
expect(subject.ui).to receive(:msg)
|
111
111
|
subject.config[:winrm_ssl_verify_mode] = :verify_none
|
112
112
|
subject.config[:winrm_transport] = :ssl
|
113
113
|
end
|
114
114
|
|
115
|
-
it
|
115
|
+
it "sets verify_mode to verify_none" do
|
116
116
|
subject.run
|
117
117
|
expect(http_client_mock.ssl_config.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
|
118
118
|
end
|
119
119
|
end
|
120
120
|
|
121
|
-
context
|
121
|
+
context "when testing the WSMAN endpoint with verbose output" do
|
122
122
|
before(:each) do
|
123
123
|
subject.config[:verbosity] = 1
|
124
124
|
end
|
125
125
|
|
126
|
-
context
|
127
|
-
it
|
128
|
-
error_message =
|
126
|
+
context "and the service does not respond" do
|
127
|
+
it "returns an object with an error message" do
|
128
|
+
error_message = "A connection attempt failed because the connected party did not properly respond after a period of time."
|
129
129
|
allow(http_client_mock).to receive(:post).and_raise(Exception.new(error_message))
|
130
130
|
expect(subject).to receive(:exit).with(1)
|
131
131
|
expect(subject).to receive(:output) do |output|
|
@@ -135,9 +135,9 @@ describe Chef::Knife::WsmanTest do
|
|
135
135
|
end
|
136
136
|
end
|
137
137
|
|
138
|
-
context
|
139
|
-
it
|
140
|
-
response_body =
|
138
|
+
context "with an invalid body" do
|
139
|
+
it "includes invalid body in error message" do
|
140
|
+
response_body = "I am invalid"
|
141
141
|
http_response_mock = HTTP::Message.new_response(response_body)
|
142
142
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
143
143
|
expect(subject).to receive(:exit).with(1)
|
@@ -148,59 +148,59 @@ describe Chef::Knife::WsmanTest do
|
|
148
148
|
end
|
149
149
|
end
|
150
150
|
|
151
|
-
context
|
151
|
+
context "and the target node is Windows Server 2008 R2" do
|
152
152
|
before(:each) do
|
153
153
|
ws2008r2_response_body = '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"><s:Header/><s:Body><wsmid:IdentifyResponse xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Microsoft Corporation</wsmid:ProductVendor><wsmid:ProductVersion>OS: 0.0.0 SP: 0.0 Stack: 2.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>'
|
154
154
|
http_response_mock = HTTP::Message.new_response(ws2008r2_response_body)
|
155
155
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
156
156
|
end
|
157
157
|
|
158
|
-
it
|
158
|
+
it "identifies the stack of the product version as 2.0 " do
|
159
159
|
expect(subject).to receive(:output) do |output|
|
160
|
-
expect(output.product_version).to
|
160
|
+
expect(output.product_version).to eq "OS: 0.0.0 SP: 0.0 Stack: 2.0"
|
161
161
|
end
|
162
162
|
subject.run
|
163
163
|
end
|
164
164
|
|
165
|
-
it
|
165
|
+
it "identifies the protocol version as the current DMTF standard" do
|
166
166
|
expect(subject).to receive(:output) do |output|
|
167
|
-
expect(output.protocol_version).to
|
167
|
+
expect(output.protocol_version).to eq "http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"
|
168
168
|
end
|
169
169
|
subject.run
|
170
170
|
end
|
171
171
|
|
172
|
-
it
|
172
|
+
it "identifies the vendor as the Microsoft Corporation" do
|
173
173
|
expect(subject).to receive(:output) do |output|
|
174
|
-
expect(output.product_vendor).to eq
|
174
|
+
expect(output.product_vendor).to eq "Microsoft Corporation"
|
175
175
|
end
|
176
176
|
subject.run
|
177
177
|
end
|
178
178
|
end
|
179
179
|
|
180
|
-
context
|
180
|
+
context "and the target node is Windows Server 2012 R2" do
|
181
181
|
before(:each) do
|
182
182
|
ws2012_response_body = '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"><s:Header/><s:Body><wsmid:IdentifyResponse xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Microsoft Corporation</wsmid:ProductVendor><wsmid:ProductVersion>OS: 0.0.0 SP: 0.0 Stack: 3.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>'
|
183
183
|
http_response_mock = HTTP::Message.new_response(ws2012_response_body)
|
184
184
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
185
185
|
end
|
186
186
|
|
187
|
-
it
|
187
|
+
it "identifies the stack of the product version as 3.0 " do
|
188
188
|
expect(subject).to receive(:output) do |output|
|
189
|
-
expect(output.product_version).to
|
189
|
+
expect(output.product_version).to eq "OS: 0.0.0 SP: 0.0 Stack: 3.0"
|
190
190
|
end
|
191
191
|
subject.run
|
192
192
|
end
|
193
193
|
|
194
|
-
it
|
194
|
+
it "identifies the protocol version as the current DMTF standard" do
|
195
195
|
expect(subject).to receive(:output) do |output|
|
196
|
-
expect(output.protocol_version).to
|
196
|
+
expect(output.protocol_version).to eq "http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"
|
197
197
|
end
|
198
198
|
subject.run
|
199
199
|
end
|
200
200
|
|
201
|
-
it
|
201
|
+
it "identifies the vendor as the Microsoft Corporation" do
|
202
202
|
expect(subject).to receive(:output) do |output|
|
203
|
-
expect(output.product_vendor).to eq
|
203
|
+
expect(output.product_vendor).to eq "Microsoft Corporation"
|
204
204
|
end
|
205
205
|
subject.run
|
206
206
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: knife-windows
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.0.
|
4
|
+
version: 3.0.10
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Seth Chisamore
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2020-01-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: chef
|