metasploit_data_models 0.24.4 → 0.24.5
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/.rspec +3 -3
- data/.travis.yml +3 -6
- data/CONTRIBUTING.md +52 -10
- data/Gemfile +8 -1
- data/Rakefile +0 -23
- data/app/models/mdm/api_key.rb +1 -41
- data/app/models/mdm/client.rb +1 -41
- data/app/models/mdm/cred.rb +19 -107
- data/app/models/mdm/event.rb +1 -48
- data/app/models/mdm/exploit_attempt.rb +16 -65
- data/app/models/mdm/exploited_host.rb +1 -28
- data/app/models/mdm/host_detail.rb +1 -45
- data/app/models/mdm/host_tag.rb +8 -6
- data/app/models/mdm/listener.rb +1 -53
- data/app/models/mdm/macro.rb +0 -42
- data/app/models/mdm/mod_ref.rb +0 -21
- data/app/models/mdm/module/action.rb +0 -15
- data/app/models/mdm/module/arch.rb +0 -10
- data/app/models/mdm/module/author.rb +0 -16
- data/app/models/mdm/module/mixin.rb +0 -13
- data/app/models/mdm/module/platform.rb +0 -11
- data/app/models/mdm/module/target.rb +0 -18
- data/app/models/mdm/nexpose_console.rb +4 -82
- data/app/models/mdm/profile.rb +0 -36
- data/app/models/mdm/route.rb +5 -17
- data/app/models/mdm/session_event.rb +1 -33
- data/app/models/mdm/tag.rb +10 -49
- data/app/models/mdm/task.rb +45 -94
- data/app/models/mdm/task_cred.rb +0 -29
- data/app/models/mdm/task_host.rb +0 -25
- data/app/models/mdm/task_service.rb +0 -25
- data/app/models/mdm/task_session.rb +0 -25
- data/app/models/mdm/user.rb +6 -188
- data/app/models/mdm/vuln_attempt.rb +12 -37
- data/app/models/mdm/vuln_detail.rb +5 -139
- data/app/models/mdm/vuln_ref.rb +1 -4
- data/app/models/mdm/web_form.rb +1 -35
- data/app/models/mdm/web_page.rb +1 -70
- data/app/models/mdm/web_site.rb +1 -51
- data/app/models/mdm/wmap_request.rb +0 -85
- data/app/models/mdm/wmap_target.rb +0 -40
- data/app/models/mdm/workspace.rb +14 -152
- data/app/models/metasploit_data_models/automatic_exploitation.rb +16 -0
- data/app/models/metasploit_data_models/automatic_exploitation/match.rb +24 -19
- data/app/models/metasploit_data_models/automatic_exploitation/match_result.rb +5 -33
- data/app/models/metasploit_data_models/automatic_exploitation/match_set.rb +4 -22
- data/app/models/metasploit_data_models/automatic_exploitation/run.rb +3 -13
- data/app/models/metasploit_data_models/ip_address/v4/segmented.rb +1 -1
- data/app/models/metasploit_data_models/module_run.rb +1 -1
- data/app/models/metasploit_data_models/search/visitor/where.rb +1 -1
- data/app/validators/ip_format_validator.rb +0 -4
- data/app/validators/parameters_validator.rb +0 -12
- data/app/validators/password_is_strong_validator.rb +1 -10
- data/lib/mdm/host/operating_system_normalization.rb +10 -7
- data/lib/metasploit_data_models.rb +0 -4
- data/lib/metasploit_data_models/engine.rb +0 -2
- data/lib/metasploit_data_models/serialized_prefs.rb +0 -6
- data/lib/metasploit_data_models/version.rb +10 -24
- data/lib/tasks/yard.rake +33 -0
- data/metasploit_data_models.gemspec +2 -9
- data/spec/app/models/mdm/api_key_spec.rb +3 -1
- data/spec/app/models/mdm/client_spec.rb +11 -9
- data/spec/app/models/mdm/cred_spec.rb +54 -42
- data/spec/app/models/mdm/event_spec.rb +23 -21
- data/spec/app/models/mdm/exploit_attempt_spec.rb +21 -19
- data/spec/app/models/mdm/exploited_host_spec.rb +13 -11
- data/spec/app/models/mdm/host_detail_spec.rb +17 -15
- data/spec/app/models/mdm/host_spec.rb +260 -261
- data/spec/app/models/mdm/host_tag_spec.rb +8 -6
- data/spec/app/models/mdm/listener_spec.rb +32 -30
- data/spec/app/models/mdm/loot_spec.rb +23 -21
- data/spec/app/models/mdm/macro_spec.rb +3 -1
- data/spec/app/models/mdm/mod_ref_spec.rb +3 -1
- data/spec/app/models/mdm/module/action_spec.rb +12 -10
- data/spec/app/models/mdm/module/arch_spec.rb +12 -10
- data/spec/app/models/mdm/module/author_spec.rb +17 -22
- data/spec/app/models/mdm/module/detail_spec.rb +75 -184
- data/spec/app/models/mdm/module/mixin_spec.rb +12 -10
- data/spec/app/models/mdm/module/platform_spec.rb +12 -10
- data/spec/app/models/mdm/module/ref_spec.rb +12 -10
- data/spec/app/models/mdm/module/target_spec.rb +15 -13
- data/spec/app/models/mdm/nexpose_console_spec.rb +37 -35
- data/spec/app/models/mdm/note_spec.rb +25 -23
- data/spec/app/models/mdm/profile_spec.rb +3 -1
- data/spec/app/models/mdm/ref_spec.rb +12 -10
- data/spec/app/models/mdm/route_spec.rb +8 -6
- data/spec/app/models/mdm/service_spec.rb +40 -38
- data/spec/app/models/mdm/session_event_spec.rb +12 -10
- data/spec/app/models/mdm/session_spec.rb +15 -13
- data/spec/app/models/mdm/tag_spec.rb +29 -29
- data/spec/app/models/mdm/task_cred_spec.rb +11 -9
- data/spec/app/models/mdm/task_host_spec.rb +11 -9
- data/spec/app/models/mdm/task_service_spec.rb +11 -9
- data/spec/app/models/mdm/task_session_spec.rb +9 -7
- data/spec/app/models/mdm/task_spec.rb +29 -27
- data/spec/app/models/mdm/user_spec.rb +19 -17
- data/spec/app/models/mdm/vuln_attempt_spec.rb +16 -14
- data/spec/app/models/mdm/vuln_detail_spec.rb +28 -26
- data/spec/app/models/mdm/vuln_ref_spec.rb +10 -8
- data/spec/app/models/mdm/vuln_spec.rb +26 -24
- data/spec/app/models/mdm/web_form_spec.rb +13 -11
- data/spec/app/models/mdm/web_page_spec.rb +21 -19
- data/spec/app/models/mdm/web_site_spec.rb +23 -21
- data/spec/app/models/mdm/web_vuln_spec.rb +65 -63
- data/spec/app/models/mdm/wmap_request_spec.rb +3 -1
- data/spec/app/models/mdm/wmap_target_spec.rb +3 -1
- data/spec/app/models/mdm/workspace_spec.rb +100 -97
- data/spec/app/models/metasploit_data_models/automatic_exploitation/match_result_spec.rb +5 -3
- data/spec/app/models/metasploit_data_models/automatic_exploitation/match_set_spec.rb +15 -13
- data/spec/app/models/metasploit_data_models/automatic_exploitation/match_spec.rb +3 -1
- data/spec/app/models/metasploit_data_models/automatic_exploitation/run_spec.rb +3 -1
- data/spec/app/models/metasploit_data_models/ip_address/v4/cidr_spec.rb +12 -10
- data/spec/app/models/metasploit_data_models/ip_address/v4/nmap_spec.rb +6 -4
- data/spec/app/models/metasploit_data_models/ip_address/v4/range_spec.rb +23 -21
- data/spec/app/models/metasploit_data_models/ip_address/v4/segment/nmap/list_spec.rb +11 -9
- data/spec/app/models/metasploit_data_models/ip_address/v4/segment/nmap/range_spec.rb +23 -21
- data/spec/app/models/metasploit_data_models/ip_address/v4/segment/segmented_spec.rb +6 -4
- data/spec/app/models/metasploit_data_models/ip_address/v4/segment/single_spec.rb +15 -22
- data/spec/app/models/metasploit_data_models/ip_address/v4/single_spec.rb +6 -4
- data/spec/app/models/metasploit_data_models/module_run_spec.rb +3 -1
- data/spec/app/models/metasploit_data_models/search/operation/ip_address_spec.rb +20 -18
- data/spec/app/models/metasploit_data_models/search/operation/port/number_spec.rb +8 -6
- data/spec/app/models/metasploit_data_models/search/operation/port/range_spec.rb +10 -8
- data/spec/app/models/metasploit_data_models/search/operation/range_spec.rb +10 -8
- data/spec/app/models/metasploit_data_models/search/operator/ip_address_spec.rb +4 -2
- data/spec/app/models/metasploit_data_models/search/operator/multitext_spec.rb +10 -8
- data/spec/app/models/metasploit_data_models/search/operator/port/list_spec.rb +8 -6
- data/spec/app/models/metasploit_data_models/search/visitor/attribute_spec.rb +11 -9
- data/spec/app/models/metasploit_data_models/search/visitor/includes_spec.rb +7 -5
- data/spec/app/models/metasploit_data_models/search/visitor/joins_spec.rb +19 -17
- data/spec/app/models/metasploit_data_models/search/visitor/method_spec.rb +7 -5
- data/spec/app/models/metasploit_data_models/search/visitor/relation_spec.rb +23 -61
- data/spec/app/models/metasploit_data_models/search/visitor/where_spec.rb +10 -8
- data/spec/app/validators/parameters_validator_spec.rb +29 -29
- data/spec/app/validators/password_is_strong_validator_spec.rb +46 -54
- data/spec/dummy/db/structure.sql +3403 -0
- data/spec/factories/mdm/module/details.rb +1 -1
- data/spec/lib/base64_serializer_spec.rb +19 -19
- data/spec/lib/metasploit_data_models/ip_address/cidr_spec.rb +12 -18
- data/spec/lib/metasploit_data_models/ip_address/range_spec.rb +6 -4
- data/spec/lib/metasploit_data_models/match/child_spec.rb +4 -2
- data/spec/lib/metasploit_data_models/match/parent_spec.rb +6 -4
- data/spec/lib/metasploit_data_models/version_spec.rb +141 -3
- data/spec/spec_helper.rb +12 -86
- data/spec/support/shared/examples/mdm/module/detail/does_not_support_stance_with_mtype.rb +2 -2
- data/spec/support/shared/examples/mdm/module/detail/supports_stance_with_mtype.rb +4 -4
- data/spec/support/shared/examples/metasploit_data_models/search/operation/ipaddress/match.rb +2 -2
- data/spec/support/shared/examples/metasploit_data_models/search/visitor/includes/visit/with_children.rb +5 -5
- data/spec/support/shared/examples/metasploit_data_models/search/visitor/includes/visit/with_metasploit_model_search_operation_base.rb +5 -5
- data/spec/support/shared/examples/metasploit_data_models/search/visitor/where/visit/with_equality.rb +3 -3
- data/spec/support/shared/examples/metasploit_data_models/search/visitor/where/visit/with_metasploit_model_search_group_base.rb +6 -7
- metadata +9 -67
- data/CHANGELOG.md +0 -6
- data/RELEASING.md +0 -88
- data/UPGRADING.md +0 -1
- data/lib/metasploit_data_models/automatic_exploitation.rb +0 -25
- data/spec/lib/metasploit_data_models_spec.rb +0 -4
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
require "spec_helper"
|
|
2
2
|
|
|
3
|
-
|
|
3
|
+
describe MetasploitDataModels::Base64Serializer do
|
|
4
4
|
let(:base64_marshaled) do
|
|
5
5
|
marshaled = Marshal.dump(unserialized)
|
|
6
6
|
|
|
@@ -30,7 +30,7 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
30
30
|
|
|
31
31
|
context 'CONSTANTS' do
|
|
32
32
|
it 'should define DEFAULT' do
|
|
33
|
-
|
|
33
|
+
described_class::DEFAULT.should == default
|
|
34
34
|
end
|
|
35
35
|
|
|
36
36
|
context 'LOADERS' do
|
|
@@ -38,36 +38,36 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
38
38
|
first = described_class::LOADERS[0]
|
|
39
39
|
deserialized = first.call(base64_marshaled)
|
|
40
40
|
|
|
41
|
-
|
|
41
|
+
deserialized.should == unserialized
|
|
42
42
|
end
|
|
43
43
|
|
|
44
44
|
it 'should fallback to the old YAML format second' do
|
|
45
45
|
second = described_class::LOADERS[1]
|
|
46
46
|
deserialized = second.call(yaml)
|
|
47
47
|
|
|
48
|
-
|
|
48
|
+
deserialized.should == unserialized
|
|
49
49
|
end
|
|
50
50
|
|
|
51
51
|
it 'should finally give up and just return the value' do
|
|
52
52
|
last = described_class::LOADERS.last
|
|
53
53
|
deserialized = last.call(unserialized)
|
|
54
54
|
|
|
55
|
-
|
|
55
|
+
deserialized.should == unserialized
|
|
56
56
|
end
|
|
57
57
|
end
|
|
58
58
|
end
|
|
59
59
|
|
|
60
60
|
context '#default' do
|
|
61
61
|
it 'should default to {}' do
|
|
62
|
-
|
|
62
|
+
base64_serializer.default.should == {}
|
|
63
63
|
end
|
|
64
64
|
|
|
65
65
|
it 'should return a duplicate' do
|
|
66
66
|
duplicate = base64_serializer.default
|
|
67
|
-
value =
|
|
67
|
+
value = mock('Value')
|
|
68
68
|
duplicate[:key] = value
|
|
69
69
|
|
|
70
|
-
|
|
70
|
+
duplicate.should_not == base64_serializer.default
|
|
71
71
|
end
|
|
72
72
|
end
|
|
73
73
|
|
|
@@ -75,7 +75,7 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
75
75
|
it 'should output Base64 encoded marshaled data' do
|
|
76
76
|
dumped = base64_serializer.dump(unserialized)
|
|
77
77
|
|
|
78
|
-
|
|
78
|
+
dumped.should == base64_marshaled
|
|
79
79
|
end
|
|
80
80
|
end
|
|
81
81
|
|
|
@@ -105,21 +105,21 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
105
105
|
end
|
|
106
106
|
|
|
107
107
|
it 'should have :default in attributes' do
|
|
108
|
-
|
|
108
|
+
attributes.should have_key(:default)
|
|
109
109
|
end
|
|
110
110
|
|
|
111
111
|
it 'should set default to :default value' do
|
|
112
|
-
|
|
112
|
+
base64_serializer.default.should == attributes[:default]
|
|
113
113
|
end
|
|
114
114
|
end
|
|
115
115
|
|
|
116
116
|
context 'without :default' do
|
|
117
117
|
it 'should not have :default in attributes' do
|
|
118
|
-
|
|
118
|
+
attributes.should_not have_key(:default)
|
|
119
119
|
end
|
|
120
120
|
|
|
121
121
|
it 'should default #default to DEFAULT' do
|
|
122
|
-
|
|
122
|
+
base64_serializer.default.should == default
|
|
123
123
|
end
|
|
124
124
|
end
|
|
125
125
|
end
|
|
@@ -131,11 +131,11 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
131
131
|
end
|
|
132
132
|
|
|
133
133
|
it 'should return #default' do
|
|
134
|
-
default =
|
|
135
|
-
|
|
134
|
+
default = mock('Default')
|
|
135
|
+
base64_serializer.stub(:default => default)
|
|
136
136
|
deserialized = base64_serializer.load(serialized)
|
|
137
137
|
|
|
138
|
-
|
|
138
|
+
deserialized.should == default
|
|
139
139
|
end
|
|
140
140
|
end
|
|
141
141
|
|
|
@@ -143,7 +143,7 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
143
143
|
it 'should return unserialized' do
|
|
144
144
|
deserialized = base64_serializer.load(base64_marshaled)
|
|
145
145
|
|
|
146
|
-
|
|
146
|
+
deserialized.should == unserialized
|
|
147
147
|
end
|
|
148
148
|
|
|
149
149
|
end
|
|
@@ -152,7 +152,7 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
152
152
|
it 'should return unserialized' do
|
|
153
153
|
deserialized = base64_serializer.load(yaml)
|
|
154
154
|
|
|
155
|
-
|
|
155
|
+
deserialized.should == unserialized
|
|
156
156
|
end
|
|
157
157
|
end
|
|
158
158
|
|
|
@@ -165,7 +165,7 @@ RSpec.describe MetasploitDataModels::Base64Serializer do
|
|
|
165
165
|
it 'should return raw value' do
|
|
166
166
|
deserialized = base64_serializer.load(raw_value)
|
|
167
167
|
|
|
168
|
-
|
|
168
|
+
deserialized.should == raw_value
|
|
169
169
|
end
|
|
170
170
|
end
|
|
171
171
|
end
|
|
@@ -1,4 +1,6 @@
|
|
|
1
|
-
|
|
1
|
+
require 'spec_helper'
|
|
2
|
+
|
|
3
|
+
describe MetasploitDataModels::IPAddress::CIDR do
|
|
2
4
|
subject(:including_class_instance) {
|
|
3
5
|
including_class.new(
|
|
4
6
|
value: formatted_value
|
|
@@ -78,7 +80,7 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
78
80
|
described_class::SEPARATOR
|
|
79
81
|
}
|
|
80
82
|
|
|
81
|
-
it {
|
|
83
|
+
it { should == '/' }
|
|
82
84
|
end
|
|
83
85
|
end
|
|
84
86
|
|
|
@@ -108,7 +110,7 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
108
110
|
true
|
|
109
111
|
}
|
|
110
112
|
|
|
111
|
-
it {
|
|
113
|
+
it { should_not include(invalid_error) }
|
|
112
114
|
end
|
|
113
115
|
|
|
114
116
|
context 'without valid' do
|
|
@@ -116,7 +118,7 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
116
118
|
false
|
|
117
119
|
}
|
|
118
120
|
|
|
119
|
-
it {
|
|
121
|
+
it { should include(invalid_error) }
|
|
120
122
|
end
|
|
121
123
|
end
|
|
122
124
|
|
|
@@ -129,7 +131,7 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
129
131
|
I18n.translate!('errors.messages.blank')
|
|
130
132
|
}
|
|
131
133
|
|
|
132
|
-
it {
|
|
134
|
+
it { should include(blank_error) }
|
|
133
135
|
end
|
|
134
136
|
end
|
|
135
137
|
|
|
@@ -164,7 +166,7 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
164
166
|
end
|
|
165
167
|
}
|
|
166
168
|
|
|
167
|
-
it {
|
|
169
|
+
it { should be_nil }
|
|
168
170
|
end
|
|
169
171
|
end
|
|
170
172
|
|
|
@@ -206,8 +208,8 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
206
208
|
regexp.names
|
|
207
209
|
}
|
|
208
210
|
|
|
209
|
-
it {
|
|
210
|
-
it {
|
|
211
|
+
it { should include 'address' }
|
|
212
|
+
it { should include 'prefix_length' }
|
|
211
213
|
end
|
|
212
214
|
end
|
|
213
215
|
|
|
@@ -220,17 +222,9 @@ RSpec.describe MetasploitDataModels::IPAddress::CIDR do
|
|
|
220
222
|
Class.new(Metasploit::Model::Base) {
|
|
221
223
|
attr_accessor :value
|
|
222
224
|
}.tap { |address_class|
|
|
223
|
-
outer_segment_class = self.segment_class
|
|
224
|
-
|
|
225
|
-
address_class.define_singleton_method(:segment_class) do
|
|
226
|
-
outer_segment_class
|
|
227
|
-
end
|
|
228
225
|
|
|
229
|
-
|
|
230
|
-
|
|
231
|
-
address_class.define_singleton_method(:segment_count) do
|
|
232
|
-
outer_segment_count
|
|
233
|
-
end
|
|
226
|
+
allow(address_class).to receive(:segment_class).and_return(segment_class)
|
|
227
|
+
allow(address_class).to receive(:segment_count).and_return(segment_count)
|
|
234
228
|
}
|
|
235
229
|
}
|
|
236
230
|
|
|
@@ -1,4 +1,6 @@
|
|
|
1
|
-
|
|
1
|
+
require 'spec_helper'
|
|
2
|
+
|
|
3
|
+
describe MetasploitDataModels::IPAddress::Range do
|
|
2
4
|
subject(:range) {
|
|
3
5
|
range_class.new
|
|
4
6
|
}
|
|
@@ -33,7 +35,7 @@ RSpec.describe MetasploitDataModels::IPAddress::Range do
|
|
|
33
35
|
'invalid_value'
|
|
34
36
|
}
|
|
35
37
|
|
|
36
|
-
it {
|
|
38
|
+
it { should be_nil }
|
|
37
39
|
end
|
|
38
40
|
end
|
|
39
41
|
|
|
@@ -42,7 +44,7 @@ RSpec.describe MetasploitDataModels::IPAddress::Range do
|
|
|
42
44
|
nil
|
|
43
45
|
}
|
|
44
46
|
|
|
45
|
-
it {
|
|
47
|
+
it { should be_nil }
|
|
46
48
|
end
|
|
47
49
|
end
|
|
48
50
|
end
|
|
@@ -65,7 +67,7 @@ RSpec.describe MetasploitDataModels::IPAddress::Range do
|
|
|
65
67
|
described_class::SEPARATOR
|
|
66
68
|
}
|
|
67
69
|
|
|
68
|
-
it {
|
|
70
|
+
it { should == '-' }
|
|
69
71
|
end
|
|
70
72
|
end
|
|
71
73
|
|
|
@@ -1,4 +1,6 @@
|
|
|
1
|
-
|
|
1
|
+
require 'spec_helper'
|
|
2
|
+
|
|
3
|
+
describe MetasploitDataModels::Match::Child do
|
|
2
4
|
let(:extending_class) {
|
|
3
5
|
# capture as local for Class.new block scope
|
|
4
6
|
described_class = self.described_class
|
|
@@ -52,7 +54,7 @@ RSpec.describe MetasploitDataModels::Match::Child do
|
|
|
52
54
|
'1,2-3'
|
|
53
55
|
end
|
|
54
56
|
|
|
55
|
-
it {
|
|
57
|
+
it { should be_nil }
|
|
56
58
|
end
|
|
57
59
|
end
|
|
58
60
|
end
|
|
@@ -1,4 +1,6 @@
|
|
|
1
|
-
|
|
1
|
+
require 'spec_helper'
|
|
2
|
+
|
|
3
|
+
describe MetasploitDataModels::Match::Parent do
|
|
2
4
|
let(:including_class) {
|
|
3
5
|
described_class = self.described_class
|
|
4
6
|
|
|
@@ -17,7 +19,7 @@ RSpec.describe MetasploitDataModels::Match::Parent do
|
|
|
17
19
|
}
|
|
18
20
|
|
|
19
21
|
context 'default' do
|
|
20
|
-
it {
|
|
22
|
+
it { should == [] }
|
|
21
23
|
end
|
|
22
24
|
end
|
|
23
25
|
|
|
@@ -84,7 +86,7 @@ RSpec.describe MetasploitDataModels::Match::Parent do
|
|
|
84
86
|
match_child
|
|
85
87
|
end
|
|
86
88
|
|
|
87
|
-
it {
|
|
89
|
+
it { should be_nil }
|
|
88
90
|
end
|
|
89
91
|
end
|
|
90
92
|
|
|
@@ -94,7 +96,7 @@ RSpec.describe MetasploitDataModels::Match::Parent do
|
|
|
94
96
|
}
|
|
95
97
|
|
|
96
98
|
context 'default' do
|
|
97
|
-
it {
|
|
99
|
+
it { should == [] }
|
|
98
100
|
end
|
|
99
101
|
|
|
100
102
|
context 'with class names' do
|
|
@@ -1,3 +1,141 @@
|
|
|
1
|
-
|
|
2
|
-
|
|
3
|
-
|
|
1
|
+
require 'spec_helper'
|
|
2
|
+
|
|
3
|
+
describe MetasploitDataModels::Version do
|
|
4
|
+
context 'CONSTANTS' do
|
|
5
|
+
context 'MAJOR' do
|
|
6
|
+
subject(:major) do
|
|
7
|
+
described_class::MAJOR
|
|
8
|
+
end
|
|
9
|
+
|
|
10
|
+
it 'is 0 because the API is not locked yet' do
|
|
11
|
+
expect(major).to eq(0)
|
|
12
|
+
end
|
|
13
|
+
end
|
|
14
|
+
|
|
15
|
+
context 'MINOR' do
|
|
16
|
+
subject(:minor) do
|
|
17
|
+
described_class::MINOR
|
|
18
|
+
end
|
|
19
|
+
|
|
20
|
+
it { should be_a Integer }
|
|
21
|
+
end
|
|
22
|
+
|
|
23
|
+
context 'PATCH' do
|
|
24
|
+
subject(:patch) do
|
|
25
|
+
described_class::PATCH
|
|
26
|
+
end
|
|
27
|
+
|
|
28
|
+
it { should be_a Integer }
|
|
29
|
+
end
|
|
30
|
+
|
|
31
|
+
pull_request = ENV['TRAVIS_PULL_REQUEST']
|
|
32
|
+
|
|
33
|
+
# a pull request cannot check PRERELEASE because it will be tested in the target branch, but the source itself
|
|
34
|
+
# is from the source branch and so has the source branch PRERELEASE.
|
|
35
|
+
#
|
|
36
|
+
# PRERELEASE can only be set appropriately for a merge by merging to the target branch and then updating PRERELEASE
|
|
37
|
+
# on the target branch before committing and/or pushing to github and travis-ci.
|
|
38
|
+
if pull_request.nil? || pull_request == 'false'
|
|
39
|
+
context 'PREPRELEASE' do
|
|
40
|
+
subject(:prerelease) do
|
|
41
|
+
described_class::PRERELEASE
|
|
42
|
+
end
|
|
43
|
+
|
|
44
|
+
branch = ENV['TRAVIS_BRANCH']
|
|
45
|
+
|
|
46
|
+
if branch.blank?
|
|
47
|
+
branch = `git rev-parse --abbrev-ref HEAD`.strip
|
|
48
|
+
end
|
|
49
|
+
|
|
50
|
+
if branch == 'master'
|
|
51
|
+
it 'does not have a PRERELEASE' do
|
|
52
|
+
expect(defined? described_class::PRERELEASE).to be_nil
|
|
53
|
+
end
|
|
54
|
+
else
|
|
55
|
+
branch_regex = /\A(?<type>bug|chore|feature|staging)(\/(?<story>[^\/]+))?\/(?<prerelease>[^\/]+)\z/
|
|
56
|
+
match = branch.match(branch_regex)
|
|
57
|
+
|
|
58
|
+
if match
|
|
59
|
+
it 'matches the branch relative name' do
|
|
60
|
+
expect(prerelease).to eq(match[:prerelease])
|
|
61
|
+
end
|
|
62
|
+
else
|
|
63
|
+
tag_regex = /\Av(?<major>\d+).(?<minor>\d+).(?<patch>\d+)(\.pre\.(?<prerelease>.*))?\z/
|
|
64
|
+
# travis-ci sets TRAVIS_BRANCH to the tag name for tag builds
|
|
65
|
+
match = branch.match(tag_regex)
|
|
66
|
+
|
|
67
|
+
if match
|
|
68
|
+
tag_prerelease = match[:prerelease]
|
|
69
|
+
|
|
70
|
+
if tag_prerelease
|
|
71
|
+
it 'matches the tag prerelease converted from a gem version to a VERSION' do
|
|
72
|
+
expect(prerelease).to eq(tag_prerelease.gsub('.pre.', '-'))
|
|
73
|
+
end
|
|
74
|
+
else
|
|
75
|
+
it 'does not have a PRERELEASE' do
|
|
76
|
+
expect(defined? described_class::PRERELEASE).to be_nil
|
|
77
|
+
end
|
|
78
|
+
end
|
|
79
|
+
else
|
|
80
|
+
it 'has a abbreviated reference that can be parsed for prerelease' do
|
|
81
|
+
fail "Do not know how to parse #{branch.inspect} for PRERELEASE"
|
|
82
|
+
end
|
|
83
|
+
end
|
|
84
|
+
end
|
|
85
|
+
end
|
|
86
|
+
end
|
|
87
|
+
end
|
|
88
|
+
end
|
|
89
|
+
|
|
90
|
+
context 'full' do
|
|
91
|
+
subject(:full) do
|
|
92
|
+
described_class.full
|
|
93
|
+
end
|
|
94
|
+
|
|
95
|
+
#
|
|
96
|
+
# lets
|
|
97
|
+
#
|
|
98
|
+
|
|
99
|
+
let(:major) do
|
|
100
|
+
1
|
|
101
|
+
end
|
|
102
|
+
|
|
103
|
+
let(:minor) do
|
|
104
|
+
2
|
|
105
|
+
end
|
|
106
|
+
|
|
107
|
+
let(:patch) do
|
|
108
|
+
3
|
|
109
|
+
end
|
|
110
|
+
|
|
111
|
+
before(:each) do
|
|
112
|
+
stub_const("#{described_class}::MAJOR", major)
|
|
113
|
+
stub_const("#{described_class}::MINOR", minor)
|
|
114
|
+
stub_const("#{described_class}::PATCH", patch)
|
|
115
|
+
end
|
|
116
|
+
|
|
117
|
+
context 'with PRERELEASE' do
|
|
118
|
+
let(:prerelease) do
|
|
119
|
+
'prerelease'
|
|
120
|
+
end
|
|
121
|
+
|
|
122
|
+
before(:each) do
|
|
123
|
+
stub_const("#{described_class}::PRERELEASE", prerelease)
|
|
124
|
+
end
|
|
125
|
+
|
|
126
|
+
it 'is <major>.<minor>.<patch>-<prerelease>' do
|
|
127
|
+
expect(full).to eq("#{major}.#{minor}.#{patch}-#{prerelease}")
|
|
128
|
+
end
|
|
129
|
+
end
|
|
130
|
+
|
|
131
|
+
context 'without PRERELEASE' do
|
|
132
|
+
before(:each) do
|
|
133
|
+
hide_const("#{described_class}::PRERELEASE")
|
|
134
|
+
end
|
|
135
|
+
|
|
136
|
+
it 'is <major>.<minor>.<patch>' do
|
|
137
|
+
expect(full).to eq("#{major}.#{minor}.#{patch}")
|
|
138
|
+
end
|
|
139
|
+
end
|
|
140
|
+
end
|
|
141
|
+
end
|