knife-windows 3.0.6 → 3.0.10
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/lib/chef/knife/bootstrap_windows_base.rb +87 -86
- data/lib/chef/knife/bootstrap_windows_ssh.rb +43 -43
- data/lib/chef/knife/bootstrap_windows_winrm.rb +16 -17
- data/lib/chef/knife/knife_windows_base.rb +0 -1
- data/lib/chef/knife/windows_cert_generate.rb +31 -31
- data/lib/chef/knife/windows_cert_install.rb +6 -6
- data/lib/chef/knife/windows_helper.rb +8 -8
- data/lib/chef/knife/windows_listener_create.rb +24 -24
- data/lib/chef/knife/winrm.rb +17 -17
- data/lib/chef/knife/winrm_base.rb +64 -62
- data/lib/chef/knife/winrm_knife_base.rb +41 -41
- data/lib/chef/knife/winrm_session.rb +7 -7
- data/lib/chef/knife/winrm_shared_options.rb +17 -17
- data/lib/chef/knife/wsman_endpoint.rb +1 -1
- data/lib/chef/knife/wsman_test.rb +10 -10
- data/lib/knife-windows/version.rb +2 -2
- data/spec/dummy_winrm_connection.rb +0 -1
- data/spec/spec_helper.rb +5 -80
- data/spec/unit/knife/windows_cert_generate_spec.rb +6 -6
- data/spec/unit/knife/windows_cert_install_spec.rb +2 -2
- data/spec/unit/knife/windows_listener_create_spec.rb +2 -2
- data/spec/unit/knife/winrm_session_spec.rb +6 -7
- data/spec/unit/knife/winrm_spec.rb +91 -87
- data/spec/unit/knife/wsman_test_spec.rb +43 -43
- metadata +2 -2
@@ -16,11 +16,11 @@
|
|
16
16
|
# limitations under the License.
|
17
17
|
#
|
18
18
|
|
19
|
-
require
|
19
|
+
require "spec_helper"
|
20
20
|
|
21
21
|
describe Chef::Knife::WsmanTest do
|
22
22
|
let(:http_client_mock) { HTTPClient.new }
|
23
|
-
let(:ssl_policy) { double(
|
23
|
+
let(:ssl_policy) { double("DefaultSSLPolicy", set_custom_certs: nil) }
|
24
24
|
|
25
25
|
before(:all) do
|
26
26
|
Chef::Config.reset
|
@@ -32,31 +32,31 @@ describe Chef::Knife::WsmanTest do
|
|
32
32
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
33
33
|
allow(HTTPClient).to receive(:new).and_return(http_client_mock)
|
34
34
|
subject.config[:verbosity] = 0
|
35
|
-
allow(subject.ui).to receive(:ask).and_return(
|
35
|
+
allow(subject.ui).to receive(:ask).and_return("prompted_password")
|
36
36
|
allow(Chef::HTTP::DefaultSSLPolicy).to receive(:new)
|
37
37
|
.with(http_client_mock.ssl_config)
|
38
38
|
.and_return(ssl_policy)
|
39
39
|
end
|
40
40
|
|
41
|
-
subject { Chef::Knife::WsmanTest.new([
|
41
|
+
subject { Chef::Knife::WsmanTest.new(["-m", "localhost"]) }
|
42
42
|
|
43
|
-
it
|
43
|
+
it "sets the ssl policy" do
|
44
44
|
expect(ssl_policy).to receive(:set_custom_certs).twice
|
45
45
|
subject.run
|
46
46
|
end
|
47
47
|
|
48
|
-
context
|
49
|
-
context
|
50
|
-
context
|
51
|
-
it
|
48
|
+
context "when testing the WSMAN endpoint" do
|
49
|
+
context "and the service responds" do
|
50
|
+
context "successfully" do
|
51
|
+
it "writes a message about a successful connection" do
|
52
52
|
expect(subject.ui).to receive(:msg)
|
53
53
|
subject.run
|
54
54
|
end
|
55
55
|
end
|
56
56
|
|
57
|
-
context
|
58
|
-
it
|
59
|
-
response_body =
|
57
|
+
context "with an invalid body" do
|
58
|
+
it "warns for a failed connection and exit with a status of 1" do
|
59
|
+
response_body = "I am invalid"
|
60
60
|
http_response_mock = HTTP::Message.new_response(response_body)
|
61
61
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
62
62
|
expect(subject.ui).to receive(:warn)
|
@@ -66,9 +66,9 @@ describe Chef::Knife::WsmanTest do
|
|
66
66
|
end
|
67
67
|
end
|
68
68
|
|
69
|
-
context
|
70
|
-
it
|
71
|
-
http_response_mock = HTTP::Message.new_response(
|
69
|
+
context "with a non-200 code" do
|
70
|
+
it "warns for a failed connection and exits with a status of 1" do
|
71
|
+
http_response_mock = HTTP::Message.new_response("<resp></resp>")
|
72
72
|
http_response_mock.status = 404
|
73
73
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
74
74
|
expect(subject.ui).to receive(:warn)
|
@@ -79,25 +79,25 @@ describe Chef::Knife::WsmanTest do
|
|
79
79
|
end
|
80
80
|
end
|
81
81
|
|
82
|
-
context
|
83
|
-
error_message =
|
82
|
+
context "and the service does not respond" do
|
83
|
+
error_message = "A connection attempt failed because the connected party did not properly respond after a period of time."
|
84
84
|
|
85
85
|
before(:each) do
|
86
86
|
allow(http_client_mock).to receive(:post).and_raise(Exception.new(error_message))
|
87
87
|
end
|
88
88
|
|
89
|
-
it
|
89
|
+
it "exits with a status code of 1" do
|
90
90
|
expect(subject).to receive(:exit).with(1)
|
91
91
|
subject.run
|
92
92
|
end
|
93
93
|
|
94
|
-
it
|
94
|
+
it "writes a warning message for each node it fails to connect to" do
|
95
95
|
expect(subject.ui).to receive(:warn)
|
96
96
|
expect(subject).to receive(:exit).with(1)
|
97
97
|
subject.run
|
98
98
|
end
|
99
99
|
|
100
|
-
it
|
100
|
+
it "writes an error message if it fails to connect to any nodes" do
|
101
101
|
expect(subject.ui).to receive(:error)
|
102
102
|
expect(subject).to receive(:exit).with(1)
|
103
103
|
subject.run
|
@@ -105,27 +105,27 @@ describe Chef::Knife::WsmanTest do
|
|
105
105
|
end
|
106
106
|
end
|
107
107
|
|
108
|
-
context
|
108
|
+
context "when not validating ssl cert" do
|
109
109
|
before(:each) do
|
110
110
|
expect(subject.ui).to receive(:msg)
|
111
111
|
subject.config[:winrm_ssl_verify_mode] = :verify_none
|
112
112
|
subject.config[:winrm_transport] = :ssl
|
113
113
|
end
|
114
114
|
|
115
|
-
it
|
115
|
+
it "sets verify_mode to verify_none" do
|
116
116
|
subject.run
|
117
117
|
expect(http_client_mock.ssl_config.verify_mode).to eq(OpenSSL::SSL::VERIFY_NONE)
|
118
118
|
end
|
119
119
|
end
|
120
120
|
|
121
|
-
context
|
121
|
+
context "when testing the WSMAN endpoint with verbose output" do
|
122
122
|
before(:each) do
|
123
123
|
subject.config[:verbosity] = 1
|
124
124
|
end
|
125
125
|
|
126
|
-
context
|
127
|
-
it
|
128
|
-
error_message =
|
126
|
+
context "and the service does not respond" do
|
127
|
+
it "returns an object with an error message" do
|
128
|
+
error_message = "A connection attempt failed because the connected party did not properly respond after a period of time."
|
129
129
|
allow(http_client_mock).to receive(:post).and_raise(Exception.new(error_message))
|
130
130
|
expect(subject).to receive(:exit).with(1)
|
131
131
|
expect(subject).to receive(:output) do |output|
|
@@ -135,9 +135,9 @@ describe Chef::Knife::WsmanTest do
|
|
135
135
|
end
|
136
136
|
end
|
137
137
|
|
138
|
-
context
|
139
|
-
it
|
140
|
-
response_body =
|
138
|
+
context "with an invalid body" do
|
139
|
+
it "includes invalid body in error message" do
|
140
|
+
response_body = "I am invalid"
|
141
141
|
http_response_mock = HTTP::Message.new_response(response_body)
|
142
142
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
143
143
|
expect(subject).to receive(:exit).with(1)
|
@@ -148,59 +148,59 @@ describe Chef::Knife::WsmanTest do
|
|
148
148
|
end
|
149
149
|
end
|
150
150
|
|
151
|
-
context
|
151
|
+
context "and the target node is Windows Server 2008 R2" do
|
152
152
|
before(:each) do
|
153
153
|
ws2008r2_response_body = '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"><s:Header/><s:Body><wsmid:IdentifyResponse xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Microsoft Corporation</wsmid:ProductVendor><wsmid:ProductVersion>OS: 0.0.0 SP: 0.0 Stack: 2.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>'
|
154
154
|
http_response_mock = HTTP::Message.new_response(ws2008r2_response_body)
|
155
155
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
156
156
|
end
|
157
157
|
|
158
|
-
it
|
158
|
+
it "identifies the stack of the product version as 2.0 " do
|
159
159
|
expect(subject).to receive(:output) do |output|
|
160
|
-
expect(output.product_version).to
|
160
|
+
expect(output.product_version).to eq "OS: 0.0.0 SP: 0.0 Stack: 2.0"
|
161
161
|
end
|
162
162
|
subject.run
|
163
163
|
end
|
164
164
|
|
165
|
-
it
|
165
|
+
it "identifies the protocol version as the current DMTF standard" do
|
166
166
|
expect(subject).to receive(:output) do |output|
|
167
|
-
expect(output.protocol_version).to
|
167
|
+
expect(output.protocol_version).to eq "http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"
|
168
168
|
end
|
169
169
|
subject.run
|
170
170
|
end
|
171
171
|
|
172
|
-
it
|
172
|
+
it "identifies the vendor as the Microsoft Corporation" do
|
173
173
|
expect(subject).to receive(:output) do |output|
|
174
|
-
expect(output.product_vendor).to eq
|
174
|
+
expect(output.product_vendor).to eq "Microsoft Corporation"
|
175
175
|
end
|
176
176
|
subject.run
|
177
177
|
end
|
178
178
|
end
|
179
179
|
|
180
|
-
context
|
180
|
+
context "and the target node is Windows Server 2012 R2" do
|
181
181
|
before(:each) do
|
182
182
|
ws2012_response_body = '<s:Envelope xmlns:s="http://www.w3.org/2003/05/soap-envelope"><s:Header/><s:Body><wsmid:IdentifyResponse xmlns:wsmid="http://schemas.dmtf.org/wbem/wsman/identity/1/wsmanidentity.xsd"><wsmid:ProtocolVersion>http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd</wsmid:ProtocolVersion><wsmid:ProductVendor>Microsoft Corporation</wsmid:ProductVendor><wsmid:ProductVersion>OS: 0.0.0 SP: 0.0 Stack: 3.0</wsmid:ProductVersion></wsmid:IdentifyResponse></s:Body></s:Envelope>'
|
183
183
|
http_response_mock = HTTP::Message.new_response(ws2012_response_body)
|
184
184
|
allow(http_client_mock).to receive(:post).and_return(http_response_mock)
|
185
185
|
end
|
186
186
|
|
187
|
-
it
|
187
|
+
it "identifies the stack of the product version as 3.0 " do
|
188
188
|
expect(subject).to receive(:output) do |output|
|
189
|
-
expect(output.product_version).to
|
189
|
+
expect(output.product_version).to eq "OS: 0.0.0 SP: 0.0 Stack: 3.0"
|
190
190
|
end
|
191
191
|
subject.run
|
192
192
|
end
|
193
193
|
|
194
|
-
it
|
194
|
+
it "identifies the protocol version as the current DMTF standard" do
|
195
195
|
expect(subject).to receive(:output) do |output|
|
196
|
-
expect(output.protocol_version).to
|
196
|
+
expect(output.protocol_version).to eq "http://schemas.dmtf.org/wbem/wsman/1/wsman.xsd"
|
197
197
|
end
|
198
198
|
subject.run
|
199
199
|
end
|
200
200
|
|
201
|
-
it
|
201
|
+
it "identifies the vendor as the Microsoft Corporation" do
|
202
202
|
expect(subject).to receive(:output) do |output|
|
203
|
-
expect(output.product_vendor).to eq
|
203
|
+
expect(output.product_vendor).to eq "Microsoft Corporation"
|
204
204
|
end
|
205
205
|
subject.run
|
206
206
|
end
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: knife-windows
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 3.0.
|
4
|
+
version: 3.0.10
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Seth Chisamore
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date:
|
11
|
+
date: 2020-01-30 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: chef
|