diff options
| author | intrigeri <intrigeri@boum.org> | 2011-02-14 17:01:04 +0100 | 
|---|---|---|
| committer | intrigeri <intrigeri@boum.org> | 2011-02-14 17:01:04 +0100 | 
| commit | 7c046e3fdf9a4bc4558290205de57df39e86ac70 (patch) | |
| tree | 53fae1c972dee1d0c5bca09306bfa4d14492a173 /spec/unit/parser/functions | |
| parent | 51156042b1d15e4f0e6cc072e94a6e31ff902dbd (diff) | |
| parent | fa3d9e165404a5ed686d152002e5f7fd21b21e30 (diff) | |
| download | puppet-sshd-7c046e3fdf9a4bc4558290205de57df39e86ac70.tar.gz puppet-sshd-7c046e3fdf9a4bc4558290205de57df39e86ac70.tar.bz2  | |
Merge remote branch 'immerda/master'
Diffstat (limited to 'spec/unit/parser/functions')
| -rw-r--r-- | spec/unit/parser/functions/ssh_keygen.rb | 104 | 
1 files changed, 104 insertions, 0 deletions
diff --git a/spec/unit/parser/functions/ssh_keygen.rb b/spec/unit/parser/functions/ssh_keygen.rb new file mode 100644 index 0000000..f830065 --- /dev/null +++ b/spec/unit/parser/functions/ssh_keygen.rb @@ -0,0 +1,104 @@ +#! /usr/bin/env ruby + + +require File.dirname(__FILE__) + '/../../../spec_helper' + +require 'mocha' +require 'fileutils' + +describe "the ssh_keygen function" do + +  before :each do +    @scope = Puppet::Parser::Scope.new +  end + +  it "should exist" do +    Puppet::Parser::Functions.function("ssh_keygen").should == "function_ssh_keygen" +  end + +  it "should raise a ParseError if no argument is passed" do +    lambda { @scope.function_ssh_keygen }.should( raise_error(Puppet::ParseError)) +  end + +  it "should raise a ParseError if there is more than 1 arguments" do +    lambda { @scope.function_ssh_keygen("foo", "bar") }.should( raise_error(Puppet::ParseError)) +  end + +  it "should raise a ParseError if the argument is not fully qualified" do +    lambda { @scope.function_ssh_keygen("foo") }.should( raise_error(Puppet::ParseError)) +  end + +  it "should raise a ParseError if the private key path is a directory" do +    File.stubs(:directory?).with("/some_dir").returns(true) +    lambda { @scope.function_ssh_keygen("/some_dir") }.should( raise_error(Puppet::ParseError)) +  end + +  it "should raise a ParseError if the public key path is a directory" do +    File.stubs(:directory?).with("/some_dir.pub").returns(true) +    lambda { @scope.function_ssh_keygen("/some_dir") }.should( raise_error(Puppet::ParseError)) +  end + +  describe "when executing properly" do +    before do +      File.stubs(:directory?).with('/tmp/a/b/c').returns(false) +      File.stubs(:directory?).with('/tmp/a/b/c.pub').returns(false) +      File.stubs(:read).with('/tmp/a/b/c').returns('privatekey') +      File.stubs(:read).with('/tmp/a/b/c.pub').returns('publickey') +    end + +    it "should fail if the public but not the private key exists" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(true) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(false) +      lambda { @scope.function_ssh_keygen("/tmp/a/b/c") }.should( raise_error(Puppet::ParseError)) +    end + +    it "should fail if the private but not the public key exists" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(false) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(true) +      lambda { @scope.function_ssh_keygen("/tmp/a/b/c") }.should( raise_error(Puppet::ParseError)) +    end + + +    it "should return an array of size 2 with the right conent if the keyfiles exists" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(true) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(true) +      File.stubs(:directory?).with('/tmp/a/b').returns(true) +      Puppet::Util.expects(:execute).never +      result = @scope.function_ssh_keygen('/tmp/a/b/c') +      result.length.should == 2 +      result[0].should == 'privatekey' +      result[1].should == 'publickey' +    end + +    it "should create the directory path if it does not exist" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(false) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(false) +      File.stubs(:directory?).with("/tmp/a/b").returns(false) +      Puppet::Util.expects(:recmkdir).with("/tmp/a/b",0700) +      Puppet::Util.expects(:execute).returns("") +      result = @scope.function_ssh_keygen('/tmp/a/b/c') +      result.length.should == 2 +      result[0].should == 'privatekey' +      result[1].should == 'publickey' +    end + +    it "should generate the key if the keyfiles do not exist" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(false) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(false) +      File.stubs(:directory?).with("/tmp/a/b").returns(true) +      Puppet::Util.expects(:execute).with(['/usr/bin/ssh-keygen','-t', 'rsa', '-b', '4096', '-f', '/tmp/a/b/c', '-P', '', '-q']).returns("") +      result = @scope.function_ssh_keygen('/tmp/a/b/c') +      result.length.should == 2 +      result[0].should == 'privatekey' +      result[1].should == 'publickey' +    end + +    it "should fail if something goes wrong during generation" do +      File.stubs(:exists?).with("/tmp/a/b/c").returns(false) +      File.stubs(:exists?).with("/tmp/a/b/c.pub").returns(false) +      File.stubs(:directory?).with("/tmp/a/b").returns(true) +      Puppet::Util.expects(:execute).with(['/usr/bin/ssh-keygen','-t', 'rsa', '-b', '4096', '-f', '/tmp/a/b/c', '-P', '', '-q']).returns("something is wrong") +      lambda { @scope.function_ssh_keygen("/tmp/a/b/c") }.should( raise_error(Puppet::ParseError)) +    end +  end +end  | 
