summaryrefslogtreecommitdiff
path: root/spec/unit/secret_fetcher_spec.rb
diff options
context:
space:
mode:
authorMarc A. Paradise <marc.paradise@gmail.com>2021-07-22 16:32:14 -0400
committerMarc A. Paradise <marc.paradise@gmail.com>2021-07-26 17:26:37 -0400
commit8c1c3f4767368e629268b89bf5b71a827bd12b5d (patch)
tree7c0ef4ef3d64e306882a72f57091660ae3addc02 /spec/unit/secret_fetcher_spec.rb
parent80111b12e3ec63147be8108b9b2167c4ff7ecd9b (diff)
downloadchef-8c1c3f4767368e629268b89bf5b71a827bd12b5d.tar.gz
Provide run context to secret fetchers
This will allow them to use node attributes for configuration, such as ohai data for determining region. Signed-off-by: Marc A. Paradise <marc.paradise@gmail.com>
Diffstat (limited to 'spec/unit/secret_fetcher_spec.rb')
-rw-r--r--spec/unit/secret_fetcher_spec.rb18
1 files changed, 9 insertions, 9 deletions
diff --git a/spec/unit/secret_fetcher_spec.rb b/spec/unit/secret_fetcher_spec.rb
index 545176f65a..f6fe2a90b5 100644
--- a/spec/unit/secret_fetcher_spec.rb
+++ b/spec/unit/secret_fetcher_spec.rb
@@ -28,7 +28,7 @@ class SecretFetcherImpl < Chef::SecretFetcher::Base
end
describe Chef::SecretFetcher do
- let(:fetcher_impl) { SecretFetcherImpl.new({}) }
+ let(:fetcher_impl) { SecretFetcherImpl.new({}, nil) }
before do
allow(Chef::SecretFetcher::Example).to receive(:new).and_return fetcher_impl
@@ -36,38 +36,38 @@ describe Chef::SecretFetcher do
context ".for_service" do
it "resolves the example fetcher without error" do
- Chef::SecretFetcher.for_service(:example, {})
+ Chef::SecretFetcher.for_service(:example, {}, nil)
end
it "resolves the Azure Key Vault fetcher without error" do
- Chef::SecretFetcher.for_service(:azure_key_vault, vault: "invalid")
+ Chef::SecretFetcher.for_service(:azure_key_vault, { vault: "invalid" }, nil)
end
it "resolves the AWS fetcher without error" do
- Chef::SecretFetcher.for_service(:aws_secrets_manager, region: "invalid")
+ Chef::SecretFetcher.for_service(:aws_secrets_manager, { region: "invalid" }, nil)
end
it "raises Chef::Exceptions::Secret::MissingFetcher when service is blank" do
- expect { Chef::SecretFetcher.for_service(nil, {}) }.to raise_error(Chef::Exceptions::Secret::MissingFetcher)
+ expect { Chef::SecretFetcher.for_service(nil, {}, nil) }.to raise_error(Chef::Exceptions::Secret::MissingFetcher)
end
it "raises Chef::Exceptions::Secret::MissingFetcher when service is nil" do
- expect { Chef::SecretFetcher.for_service("", {}) }.to raise_error(Chef::Exceptions::Secret::MissingFetcher)
+ expect { Chef::SecretFetcher.for_service("", {}, nil) }.to raise_error(Chef::Exceptions::Secret::MissingFetcher)
end
it "raises Chef::Exceptions::Secret::InvalidFetcher for an unknown fetcher" do
- expect { Chef::SecretFetcher.for_service(:bad_example, {}) }.to raise_error(Chef::Exceptions::Secret::InvalidFetcherService)
+ expect { Chef::SecretFetcher.for_service(:bad_example, {}, nil) }.to raise_error(Chef::Exceptions::Secret::InvalidFetcherService)
end
it "ensures fetcher configuration is valid by invoking validate!" do
expect(fetcher_impl).to receive(:validate!)
- Chef::SecretFetcher.for_service(:example, {})
+ Chef::SecretFetcher.for_service(:example, {}, nil)
end
end
context "#fetch" do
let(:fetcher) {
- Chef::SecretFetcher.for_service(:example, { "key1" => "value1" })
+ Chef::SecretFetcher.for_service(:example, { "key1" => "value1" }, nil)
}
it "fetches from the underlying service when secret name is provided " do