diff options
author | John McCrae <john.mccrae@progress.com> | 2021-06-03 16:54:46 -0700 |
---|---|---|
committer | John McCrae <john.mccrae@progress.com> | 2021-06-03 17:22:33 -0700 |
commit | 55c086cbdc0f155b7f6caa44ef31de57fc98e61b (patch) | |
tree | e6e21717c1758475047b85736321d39cde073c89 /spec | |
parent | 552ec721f16c4e085010a067e6806d89d1f6f8a4 (diff) | |
download | chef-55c086cbdc0f155b7f6caa44ef31de57fc98e61b.tar.gz |
Updated the firewall rule resource to allow for multiple remote addresses, updated the spec file to account for the change in data types
Signed-off-by: John McCrae <john.mccrae@progress.com>
Diffstat (limited to 'spec')
-rw-r--r-- | spec/unit/resource/windows_firewall_rule_spec.rb | 17 |
1 files changed, 11 insertions, 6 deletions
diff --git a/spec/unit/resource/windows_firewall_rule_spec.rb b/spec/unit/resource/windows_firewall_rule_spec.rb index f4dfea1e0a..85ebccecc6 100644 --- a/spec/unit/resource/windows_firewall_rule_spec.rb +++ b/spec/unit/resource/windows_firewall_rule_spec.rb @@ -88,6 +88,11 @@ describe Chef::Resource::WindowsFirewallRule do expect(resource.remote_address).to eql("8.8.4.4") end + it "the remote_address property accepts comma separated lists" do + resource.remote_address(['10.17.3.101', '172.7.7.53']) + expect(resource.remote_address).to eql(%w{10.17.3.101 172.7.7.53}) + end + it "the remote_port property accepts strings" do resource.remote_port("8081") expect(resource.remote_port).to eql(["8081"]) @@ -223,8 +228,8 @@ describe Chef::Resource::WindowsFirewallRule do end it "aliases :remoteip to :remote_address" do - resource.remoteip("8.8.8.8") - expect(resource.remote_address).to eql("8.8.8.8") + resource.remoteip(["8.8.8.8"]) + expect(resource.remote_address).to eql(["8.8.8.8"]) end it "aliases :localport to :local_port" do @@ -288,7 +293,7 @@ describe Chef::Resource::WindowsFirewallRule do end it "sets RemoteAddress" do - resource.remote_address("8.8.8.8") + resource.remote_address(["8.8.8.8"]) expect(provider.firewall_command("New")).to eql("New-NetFirewallRule -Name 'test_rule' -DisplayName 'test_rule' -RemoteAddress '8.8.8.8' -Direction 'inbound' -Protocol 'TCP' -IcmpType 'Any' -Action 'allow' -Profile 'any' -InterfaceType 'any' -Enabled 'true'") end @@ -365,7 +370,7 @@ describe Chef::Resource::WindowsFirewallRule do resource.group("new group") resource.local_address("192.168.40.40") resource.local_port("80") - resource.remote_address("8.8.4.4") + resource.remote_address(["8.8.4.4"]) resource.remote_port("8081") resource.direction(:outbound) resource.protocol("UDP") @@ -416,7 +421,7 @@ describe Chef::Resource::WindowsFirewallRule do end it "sets RemoteAddress" do - resource.remote_address("8.8.8.8") + resource.remote_address(["8.8.8.8"]) expect(provider.firewall_command("Set")).to eql("Set-NetFirewallRule -Name 'test_rule' -NewDisplayName 'test_rule' -RemoteAddress '8.8.8.8' -Direction 'inbound' -Protocol 'TCP' -IcmpType 'Any' -Action 'allow' -Profile 'any' -InterfaceType 'any' -Enabled 'true'") end @@ -487,7 +492,7 @@ describe Chef::Resource::WindowsFirewallRule do resource.displayname("some cool display name") resource.local_address("192.168.40.40") resource.local_port("80") - resource.remote_address("8.8.4.4") + resource.remote_address(["8.8.4.4"]) resource.remote_port("8081") resource.direction(:outbound) resource.protocol("UDP") |