serverspec 0.4.7 → 0.4.8
Sign up to get free protection for your applications and to get access to all the features.
- data/README.md +6 -13
- data/lib/serverspec/commands/base.rb +2 -2
- data/lib/serverspec/commands/linux.rb +1 -1
- data/lib/serverspec/commands/redhat.rb +2 -2
- data/lib/serverspec/version.rb +1 -1
- data/spec/darwin/commands_spec.rb +2 -2
- data/spec/debian/commands_spec.rb +4 -4
- data/spec/gentoo/commands_spec.rb +3 -3
- data/spec/redhat/commands_spec.rb +8 -8
- data/spec/solaris/commands_spec.rb +1 -1
- metadata +2 -2
data/README.md
CHANGED
@@ -35,16 +35,6 @@ Select number: 1
|
|
35
35
|
|
36
36
|
Input target host name: www.example.jp
|
37
37
|
|
38
|
-
Select OS type of target host:
|
39
|
-
|
40
|
-
1) Auto Detect
|
41
|
-
2) Red Hat
|
42
|
-
3) Debian
|
43
|
-
4) Gentoo
|
44
|
-
5) Solaris
|
45
|
-
|
46
|
-
Select number: 1
|
47
|
-
|
48
38
|
+ spec/
|
49
39
|
+ spec/www.example.jp/
|
50
40
|
+ spec/www.example.jp/httpd_spec.rb
|
@@ -57,17 +47,20 @@ spec/www.example.jp/httpd_spec.rb is a sample spec file and its content is like
|
|
57
47
|
```ruby
|
58
48
|
require 'spec_helper'
|
59
49
|
|
60
|
-
describe 'httpd' do
|
50
|
+
describe package('httpd)' do
|
61
51
|
it { should be_installed }
|
52
|
+
end
|
53
|
+
|
54
|
+
describe service('httpd') do
|
62
55
|
it { should be_enabled }
|
63
56
|
it { should be_running }
|
64
57
|
end
|
65
58
|
|
66
|
-
describe
|
59
|
+
describe port(80) do
|
67
60
|
it { should be_listening }
|
68
61
|
end
|
69
62
|
|
70
|
-
describe '/etc/httpd/conf/httpd.conf' do
|
63
|
+
describe file('/etc/httpd/conf/httpd.conf') do
|
71
64
|
it { should be_file }
|
72
65
|
it { should contain "ServerName www.example.jp" }
|
73
66
|
end
|
@@ -19,7 +19,7 @@ module Serverspec
|
|
19
19
|
end
|
20
20
|
|
21
21
|
def check_routing_table destination
|
22
|
-
"ip route | grep -E '^#{destination} |^default '"
|
22
|
+
"/sbin/ip route | grep -E '^#{destination} |^default '"
|
23
23
|
end
|
24
24
|
|
25
25
|
def check_reachable host, port, proto, timeout
|
@@ -66,7 +66,7 @@ module Serverspec
|
|
66
66
|
end
|
67
67
|
|
68
68
|
def check_running service
|
69
|
-
"service #{escape(service)} status"
|
69
|
+
"/sbin/service #{escape(service)} status"
|
70
70
|
end
|
71
71
|
|
72
72
|
def check_running_under_supervisor service
|
@@ -3,11 +3,11 @@ module Serverspec
|
|
3
3
|
class RedHat < Linux
|
4
4
|
def check_access_by_user file, user, access
|
5
5
|
# Redhat-specific
|
6
|
-
"runuser -s /bin/sh -c \"test -#{access} #{file}\" #{user}"
|
6
|
+
"/sbin/runuser -s /bin/sh -c \"test -#{access} #{file}\" #{user}"
|
7
7
|
end
|
8
8
|
|
9
9
|
def check_enabled service
|
10
|
-
"chkconfig --list #{escape(service)} | grep 3:on"
|
10
|
+
"/sbin/chkconfig --list #{escape(service)} | grep 3:on"
|
11
11
|
end
|
12
12
|
|
13
13
|
def check_installed package
|
data/lib/serverspec/version.rb
CHANGED
@@ -29,7 +29,7 @@ end
|
|
29
29
|
|
30
30
|
describe 'check_routing_table' do
|
31
31
|
subject { commands.check_routing_table('192.168.100.0/24') }
|
32
|
-
it { should eq "ip route | grep -E '^192.168.100.0/24 |^default '" }
|
32
|
+
it { should eq "/sbin/ip route | grep -E '^192.168.100.0/24 |^default '" }
|
33
33
|
end
|
34
34
|
|
35
35
|
describe 'check_resolvable' do
|
@@ -69,7 +69,7 @@ end
|
|
69
69
|
|
70
70
|
describe 'check_running' do
|
71
71
|
subject { commands.check_running('httpd') }
|
72
|
-
it { should eq 'service httpd status' }
|
72
|
+
it { should eq '/sbin/service httpd status' }
|
73
73
|
end
|
74
74
|
|
75
75
|
describe 'check_running_under_supervisor' do
|
@@ -19,7 +19,7 @@ end
|
|
19
19
|
|
20
20
|
describe 'check_routing_table' do
|
21
21
|
subject { commands.check_routing_table('192.168.100.0/24') }
|
22
|
-
it { should eq "ip route | grep -E '^192.168.100.0/24 |^default '" }
|
22
|
+
it { should eq "/sbin/ip route | grep -E '^192.168.100.0/24 |^default '" }
|
23
23
|
end
|
24
24
|
|
25
25
|
describe 'check_reachable' do
|
@@ -85,7 +85,7 @@ end
|
|
85
85
|
|
86
86
|
describe 'check_running' do
|
87
87
|
subject { commands.check_running('httpd') }
|
88
|
-
it { should eq 'service httpd status' }
|
88
|
+
it { should eq '/sbin/service httpd status' }
|
89
89
|
end
|
90
90
|
|
91
91
|
|
@@ -209,12 +209,12 @@ end
|
|
209
209
|
describe 'check_ipatbles' do
|
210
210
|
context 'check a rule without a table and a chain' do
|
211
211
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT') }
|
212
|
-
it { should eq "iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
212
|
+
it { should eq "/sbin/iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
213
213
|
end
|
214
214
|
|
215
215
|
context 'chack a rule with a table and a chain' do
|
216
216
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT', 'mangle', 'INPUT') }
|
217
|
-
it { should eq "iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
217
|
+
it { should eq "/sbin/iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
218
218
|
end
|
219
219
|
end
|
220
220
|
|
@@ -19,7 +19,7 @@ end
|
|
19
19
|
|
20
20
|
describe 'check_routing_table' do
|
21
21
|
subject { commands.check_routing_table('192.168.100.0/24') }
|
22
|
-
it { should eq "ip route | grep -E '^192.168.100.0/24 |^default '" }
|
22
|
+
it { should eq "/sbin/ip route | grep -E '^192.168.100.0/24 |^default '" }
|
23
23
|
end
|
24
24
|
|
25
25
|
describe 'check_reachable' do
|
@@ -207,12 +207,12 @@ end
|
|
207
207
|
describe 'check_ipatbles' do
|
208
208
|
context 'check a rule without a table and a chain' do
|
209
209
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT') }
|
210
|
-
it { should eq "iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
210
|
+
it { should eq "/sbin/iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
211
211
|
end
|
212
212
|
|
213
213
|
context 'chack a rule with a table and a chain' do
|
214
214
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT', 'mangle', 'INPUT') }
|
215
|
-
it { should eq "iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
215
|
+
it { should eq "/sbin/iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
216
216
|
end
|
217
217
|
end
|
218
218
|
|
@@ -4,7 +4,7 @@ include Serverspec::Helper::RedHat
|
|
4
4
|
|
5
5
|
describe 'check_enabled' do
|
6
6
|
subject { commands.check_enabled('httpd') }
|
7
|
-
it { should eq 'chkconfig --list httpd | grep 3:on' }
|
7
|
+
it { should eq '/sbin/chkconfig --list httpd | grep 3:on' }
|
8
8
|
end
|
9
9
|
|
10
10
|
describe 'check_file' do
|
@@ -19,7 +19,7 @@ end
|
|
19
19
|
|
20
20
|
describe 'check_routing_table' do
|
21
21
|
subject { commands.check_routing_table('192.168.100.0/24') }
|
22
|
-
it { should eq "ip route | grep -E '^192.168.100.0/24 |^default '" }
|
22
|
+
it { should eq "/sbin/ip route | grep -E '^192.168.100.0/24 |^default '" }
|
23
23
|
end
|
24
24
|
|
25
25
|
describe 'check_reachable' do
|
@@ -79,7 +79,7 @@ end
|
|
79
79
|
|
80
80
|
describe 'check_running' do
|
81
81
|
subject { commands.check_running('httpd') }
|
82
|
-
it { should eq 'service httpd status' }
|
82
|
+
it { should eq '/sbin/service httpd status' }
|
83
83
|
end
|
84
84
|
|
85
85
|
describe 'check_running_under_supervisor' do
|
@@ -207,12 +207,12 @@ end
|
|
207
207
|
describe 'check_ipatbles' do
|
208
208
|
context 'check a rule without a table and a chain' do
|
209
209
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT') }
|
210
|
-
it { should eq "iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
210
|
+
it { should eq "/sbin/iptables -S | grep -- -P\\ INPUT\\ ACCEPT" }
|
211
211
|
end
|
212
212
|
|
213
213
|
context 'chack a rule with a table and a chain' do
|
214
214
|
subject { commands.check_iptables_rule('-P INPUT ACCEPT', 'mangle', 'INPUT') }
|
215
|
-
it { should eq "iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
215
|
+
it { should eq "/sbin/iptables -t mangle -S INPUT | grep -- -P\\ INPUT\\ ACCEPT" }
|
216
216
|
end
|
217
217
|
end
|
218
218
|
|
@@ -241,16 +241,16 @@ end
|
|
241
241
|
describe 'check_access_by_user' do
|
242
242
|
context 'read access' do
|
243
243
|
subject {commands.check_access_by_user '/tmp/something', 'dummyuser1', 'r'}
|
244
|
-
it { should eq 'runuser -s /bin/sh -c "test -r /tmp/something" dummyuser1' }
|
244
|
+
it { should eq '/sbin/runuser -s /bin/sh -c "test -r /tmp/something" dummyuser1' }
|
245
245
|
end
|
246
246
|
|
247
247
|
context 'write access' do
|
248
248
|
subject {commands.check_access_by_user '/tmp/somethingw', 'dummyuser2', 'w'}
|
249
|
-
it { should eq 'runuser -s /bin/sh -c "test -w /tmp/somethingw" dummyuser2' }
|
249
|
+
it { should eq '/sbin/runuser -s /bin/sh -c "test -w /tmp/somethingw" dummyuser2' }
|
250
250
|
end
|
251
251
|
|
252
252
|
context 'execute access' do
|
253
253
|
subject {commands.check_access_by_user '/tmp/somethingx', 'dummyuser3', 'x'}
|
254
|
-
it { should eq 'runuser -s /bin/sh -c "test -x /tmp/somethingx" dummyuser3' }
|
254
|
+
it { should eq '/sbin/runuser -s /bin/sh -c "test -x /tmp/somethingx" dummyuser3' }
|
255
255
|
end
|
256
256
|
end
|
@@ -19,7 +19,7 @@ end
|
|
19
19
|
|
20
20
|
describe 'check_routing_table' do
|
21
21
|
subject { commands.check_routing_table('192.168.100.0/24') }
|
22
|
-
it { should eq "ip route | grep -E '^192.168.100.0/24 |^default '" }
|
22
|
+
it { should eq "/sbin/ip route | grep -E '^192.168.100.0/24 |^default '" }
|
23
23
|
end
|
24
24
|
|
25
25
|
describe 'check_reachable' do
|
metadata
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: serverspec
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 0.4.
|
4
|
+
version: 0.4.8
|
5
5
|
prerelease:
|
6
6
|
platform: ruby
|
7
7
|
authors:
|
@@ -9,7 +9,7 @@ authors:
|
|
9
9
|
autorequire:
|
10
10
|
bindir: bin
|
11
11
|
cert_chain: []
|
12
|
-
date: 2013-05-
|
12
|
+
date: 2013-05-20 00:00:00.000000000 Z
|
13
13
|
dependencies:
|
14
14
|
- !ruby/object:Gem::Dependency
|
15
15
|
name: net-ssh
|