summaryrefslogtreecommitdiff
path: root/spec/unit/knife/ssl_check_spec.rb
diff options
context:
space:
mode:
authordanielsdeleo <dan@opscode.com>2013-10-29 16:02:38 -0700
committerdanielsdeleo <dan@getchef.com>2014-03-19 22:32:30 -0700
commitcc2307a9b7774c1b8a70066c84961ecbfd05d5d5 (patch)
treeaeb4778ef163c00f04d071618d0c7c40941a5a9e /spec/unit/knife/ssl_check_spec.rb
parent09f22372674b88e6e3ee7bb9aff406862ae0f27c (diff)
downloadchef-cc2307a9b7774c1b8a70066c84961ecbfd05d5d5.tar.gz
Add SSL check and certificate fetching commands to knife
Fixes CHEF-4711
Diffstat (limited to 'spec/unit/knife/ssl_check_spec.rb')
-rw-r--r--spec/unit/knife/ssl_check_spec.rb187
1 files changed, 187 insertions, 0 deletions
diff --git a/spec/unit/knife/ssl_check_spec.rb b/spec/unit/knife/ssl_check_spec.rb
new file mode 100644
index 0000000000..32405a5977
--- /dev/null
+++ b/spec/unit/knife/ssl_check_spec.rb
@@ -0,0 +1,187 @@
+#
+# Author:: Daniel DeLeo (<dan@getchef.com>)
+# Copyright:: Copyright (c) 2014 Chef Software, Inc.
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require "spec_helper"
+require 'stringio'
+
+describe Chef::Knife::SslCheck do
+
+ let(:name_args) { [] }
+ let(:stdout_io) { StringIO.new }
+ let(:stderr_io) { StringIO.new }
+
+ def stderr
+ stderr_io.string
+ end
+
+ def stdout
+ stdout_io.string
+ end
+
+ subject(:ssl_check) do
+ s = Chef::Knife::SslCheck.new
+ s.ui.stub(:stdout).and_return(stdout_io)
+ s.ui.stub(:stderr).and_return(stderr_io)
+ s.name_args = name_args
+ s
+ end
+
+ before do
+ Chef::Config.chef_server_url = "https://example.com:8443/chef-server"
+ end
+
+ context "when no arguments are given" do
+ it "uses the chef_server_url as the host to check" do
+ expect(ssl_check.host).to eq("example.com")
+ expect(ssl_check.port).to eq(8443)
+ end
+ end
+
+ context "when a specific URI is given" do
+ let(:name_args) { %w{https://example.test:10443/foo} }
+
+ it "checks the SSL configuration against the given host" do
+ expect(ssl_check.host).to eq("example.test")
+ expect(ssl_check.port).to eq(10443)
+ end
+ end
+
+ context "when an invalid URI is given" do
+
+ let(:name_args) { %w{foo.test} }
+
+ it "prints an error and exits" do
+ expect { ssl_check.run }.to raise_error(SystemExit)
+ expected_stdout=<<-E
+USAGE: knife ssl check [URL] (options)
+E
+ expected_stderr=<<-E
+ERROR: Given URI: `foo.test' is invalid
+E
+ expect(stdout_io.string).to eq(expected_stdout)
+ expect(stderr_io.string).to eq(expected_stderr)
+ end
+
+ context "and its malformed enough to make URI.parse barf" do
+
+ let(:name_args) { %w{ftp://lkj\\blah:example.com/blah} }
+
+ it "prints an error and exits" do
+ expect { ssl_check.run }.to raise_error(SystemExit)
+ expected_stdout=<<-E
+USAGE: knife ssl check [URL] (options)
+E
+ expected_stderr=<<-E
+ERROR: Given URI: `#{name_args[0]}' is invalid
+E
+ expect(stdout_io.string).to eq(expected_stdout)
+ expect(stderr_io.string).to eq(expected_stderr)
+ end
+ end
+ end
+
+ describe "verifying the remote certificate" do
+ let(:name_args) { %w{https://foo.example.com:8443} }
+
+ let(:tcp_socket) { double(TCPSocket) }
+ let(:ssl_socket) { double(OpenSSL::SSL::SSLSocket) }
+
+ before do
+ TCPSocket.should_receive(:new).with("foo.example.com", 8443).and_return(tcp_socket)
+ OpenSSL::SSL::SSLSocket.should_receive(:new).with(tcp_socket, ssl_check.verify_peer_ssl_context).and_return(ssl_socket)
+ end
+
+ def run
+ ssl_check.run
+ rescue Exception
+ #puts "OUT: #{stdout_io.string}"
+ #puts "ERR: #{stderr_io.string}"
+ raise
+ end
+
+ context "when the remote host's certificate is valid" do
+
+ before do
+ ssl_socket.should_receive(:connect) # no error
+ ssl_socket.should_receive(:post_connection_check).with("foo.example.com") # no error
+ end
+
+ it "prints a success message" do
+ ssl_check.run
+ expect(stdout_io.string).to include("Successfully verified certificates from `foo.example.com'")
+ end
+ end
+
+ describe "and the certificate is not valid" do
+
+ let(:tcp_socket_for_debug) { double(TCPSocket) }
+ let(:ssl_socket_for_debug) { double(OpenSSL::SSL::SSLSocket) }
+
+ let(:self_signed_crt_path) { File.join(CHEF_SPEC_DATA, "trusted_certs", "example.crt") }
+ let(:self_signed_crt) { OpenSSL::X509::Certificate.new(File.read(self_signed_crt_path)) }
+
+ before do
+ trap(:INT, "DEFAULT")
+
+ TCPSocket.should_receive(:new).
+ with("foo.example.com", 8443).
+ and_return(tcp_socket_for_debug)
+ OpenSSL::SSL::SSLSocket.should_receive(:new).
+ with(tcp_socket_for_debug, ssl_check.noverify_peer_ssl_context).
+ and_return(ssl_socket_for_debug)
+ end
+
+ context "when the certificate's CN does not match the hostname" do
+ before do
+ ssl_socket.should_receive(:connect) # no error
+ ssl_socket.should_receive(:post_connection_check).
+ with("foo.example.com").
+ and_raise(OpenSSL::SSL::SSLError)
+ ssl_socket_for_debug.should_receive(:connect)
+ ssl_socket_for_debug.should_receive(:peer_cert).and_return(self_signed_crt)
+ end
+
+ it "shows the CN used by the certificate and prints an error" do
+ expect { run }.to raise_error(SystemExit)
+ expect(stderr).to include("The SSL cert is signed by a trusted authority but is not valid for the given hostname")
+ expect(stderr).to include("You are attempting to connect to: 'foo.example.com'")
+ expect(stderr).to include("The server's certificate belongs to 'example.local'")
+ end
+
+ end
+
+ context "when the cert is not signed by any trusted authority" do
+ before do
+ ssl_socket.should_receive(:connect).
+ and_raise(OpenSSL::SSL::SSLError)
+ ssl_socket_for_debug.should_receive(:connect)
+ ssl_socket_for_debug.should_receive(:peer_cert).and_return(self_signed_crt)
+ end
+
+ it "shows the CN used by the certificate and prints an error" do
+ expect { run }.to raise_error(SystemExit)
+ expect(stderr).to include("The SSL certificate of foo.example.com could not be verified")
+ end
+
+ end
+ end
+
+ end
+
+end
+