summaryrefslogtreecommitdiff
path: root/spec
diff options
context:
space:
mode:
authorSteven Danna <steve@opscode.com>2014-12-09 13:27:21 +0000
committerBryan McLellan <btm@opscode.com>2015-02-17 08:46:37 -0500
commit9b6f1129364ab39dd272ccffd14bbc82f4c32ace (patch)
treeedf4a8534cef7b646ffc30783c0f3ae08ed6f092 /spec
parentcd7bac6dc131c958c8f6ccac6e50f2dca655dfd9 (diff)
downloadchef-9b6f1129364ab39dd272ccffd14bbc82f4c32ace.tar.gz
Implement RFC 027 File Verification
This implements usable-suppliable file content verification per RFC 027. Users can supplie a block, string, or symbol to the `verify` resource attribute. Blocks will be called, string will be executed as shell commands (respecing the same options as not_if and only_if), and symbols can be used to access built-in registered validations.
Diffstat (limited to 'spec')
-rw-r--r--spec/support/shared/unit/provider/file.rb30
-rw-r--r--spec/unit/resource/conditional_spec.rb1
-rw-r--r--spec/unit/resource/file/verification_spec.rb107
-rw-r--r--spec/unit/resource/file_spec.rb14
4 files changed, 151 insertions, 1 deletions
diff --git a/spec/support/shared/unit/provider/file.rb b/spec/support/shared/unit/provider/file.rb
index 25c2b52b1b..86f32c9e89 100644
--- a/spec/support/shared/unit/provider/file.rb
+++ b/spec/support/shared/unit/provider/file.rb
@@ -456,6 +456,36 @@ shared_examples_for Chef::Provider::File do
provider.run_action(:create)
end
+ context "do_validate_content" do
+ before { setup_normal_file }
+
+ let(:tempfile) {
+ t = double('Tempfile', :path => "/tmp/foo-bar-baz", :closed? => true)
+ allow(content).to receive(:tempfile).and_return(t)
+ t
+ }
+
+ let(:verification) { double("Verification") }
+
+ context "with user-supplied verifications" do
+ it "calls #verify on each verification with tempfile path" do
+ allow(Chef::Resource::File::Verification).to receive(:new).and_return(verification)
+ provider.new_resource.verify "true"
+ provider.new_resource.verify "true"
+ expect(verification).to receive(:verify).with(tempfile.path).twice.and_return(true)
+ provider.send(:do_validate_content)
+ end
+
+ it "raises an exception if any verification fails" do
+ provider.new_resource.verify "true"
+ provider.new_resource.verify "false"
+ allow(verification).to receive(:verify).with("true").and_return(true)
+ allow(verification).to receive(:verify).with("false").and_return(false)
+ expect{provider.send(:do_validate_content)}.to raise_error(Chef::Exceptions::ValidationFailed)
+ end
+ end
+ end
+
context "do_create_file" do
context "when the file exists" do
before { setup_normal_file }
diff --git a/spec/unit/resource/conditional_spec.rb b/spec/unit/resource/conditional_spec.rb
index 49240edfdf..489c1136b1 100644
--- a/spec/unit/resource/conditional_spec.rb
+++ b/spec/unit/resource/conditional_spec.rb
@@ -205,5 +205,4 @@ describe Chef::Resource::Conditional do
end
end
end
-
end
diff --git a/spec/unit/resource/file/verification_spec.rb b/spec/unit/resource/file/verification_spec.rb
new file mode 100644
index 0000000000..60e51ddb93
--- /dev/null
+++ b/spec/unit/resource/file/verification_spec.rb
@@ -0,0 +1,107 @@
+#
+# Author:: Steven Danna (<steve@chef.io>)
+# Copyright:: Copyright (c) 2014 Chef Software, Inc
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require 'spec_helper'
+
+describe Chef::Resource::File::Verification do
+ let(:t_block) { Proc.new { true } }
+ let(:f_block) { Proc.new { false } }
+ let(:path_block) { Proc.new { |path| path }}
+ let(:temp_path) { "/tmp/foobar" }
+
+ describe "verification registration" do
+ it "registers a verification for later use" do
+ class Chef::Resource::File::Verification::Wombat < Chef::Resource::File::Verification
+ register :tabmow
+ end
+ expect(Chef::Resource::File::Verification.lookup(:tabmow)).to eq(Chef::Resource::File::Verification::Wombat)
+ end
+
+ it "raises an error if a verificationc can't be found" do
+ expect{Chef::Resource::File::Verification.lookup(:dne)}.to raise_error(Chef::Exceptions::VerificationNotFound)
+ end
+ end
+
+ describe "#verify" do
+ let(:parent_resource) { Chef::Resource.new("llama") }
+
+ it "expects a string argument" do
+ v = Chef::Resource::File::Verification.new(parent_resource, nil, {}) {}
+ expect{ v.verify("/foo/bar") }.to_not raise_error
+ expect{ v.verify }.to raise_error
+ end
+
+ it "accepts an options hash" do
+ v = Chef::Resource::File::Verification.new(parent_resource, nil, {}) {}
+ expect{ v.verify("/foo/bar", {:future => true}) }.to_not raise_error
+ end
+
+ context "with a verification block" do
+ it "passes a file path to the block" do
+ v = Chef::Resource::File::Verification.new(parent_resource, nil, {}, &path_block)
+ expect(v.verify(temp_path)).to eq(temp_path)
+ end
+
+ it "returns true if the block returned true" do
+ v = Chef::Resource::File::Verification.new(parent_resource, nil, {}, &t_block)
+ expect(v.verify(temp_path)).to eq(true)
+ end
+
+ it "returns false if the block returned false" do
+ v = Chef::Resource::File::Verification.new(parent_resource, nil, {}, &f_block)
+ expect(v.verify(temp_path)).to eq(false)
+ end
+ end
+
+ context "with a verification command(String)" do
+ it "substitutes \%{file} with the path" do
+ test_command = "test #{temp_path} = %{file}"
+ v = Chef::Resource::File::Verification.new(parent_resource, test_command, {})
+ expect(v.verify(temp_path)).to eq(true)
+ end
+
+ it "returns false if the command fails" do
+ v = Chef::Resource::File::Verification.new(parent_resource, "false", {})
+ expect(v.verify(temp_path)).to eq(false)
+ end
+
+ it "returns true if the command succeeds" do
+ v = Chef::Resource::File::Verification.new(parent_resource, "true", {})
+ expect(v.verify(temp_path)).to eq(true)
+ end
+ end
+
+ context "with a named verification(Symbol)" do
+ before(:each) do
+ class Chef::Resource::File::Verification::Turtle < Chef::Resource::File::Verification
+ register :cats
+ def verify(path, opts)
+ end
+ end
+ end
+
+ it "delegates to the registered verification" do
+ registered_verification = double()
+ allow(Chef::Resource::File::Verification::Turtle).to receive(:new).and_return(registered_verification)
+ v = Chef::Resource::File::Verification.new(parent_resource, :cats, {})
+ expect(registered_verification).to receive(:verify).with(temp_path, {})
+ v.verify(temp_path, {})
+ end
+ end
+ end
+end
diff --git a/spec/unit/resource/file_spec.rb b/spec/unit/resource/file_spec.rb
index cfa7511673..db52e35004 100644
--- a/spec/unit/resource/file_spec.rb
+++ b/spec/unit/resource/file_spec.rb
@@ -66,6 +66,20 @@ describe Chef::Resource::File do
expect { @resource.action :blues }.to raise_error(ArgumentError)
end
+ it "should accept a block, symbol, or string for verify" do
+ expect {@resource.verify {}}.not_to raise_error
+ expect {@resource.verify ""}.not_to raise_error
+ expect {@resource.verify :json}.not_to raise_error
+ expect {@resource.verify true}.to raise_error
+ expect {@resource.verify false}.to raise_error
+ end
+
+ it "should accept multiple verify statements" do
+ @resource.verify "foo"
+ @resource.verify "bar"
+ @resource.verify.length == 2
+ end
+
it "should use the object name as the path by default" do
expect(@resource.path).to eql("fakey_fakerton")
end