summaryrefslogtreecommitdiff
path: root/spec
diff options
context:
space:
mode:
authorJohn McCrae <john.mccrae@progress.com>2021-06-03 16:54:46 -0700
committerJohn McCrae <john.mccrae@progress.com>2021-06-03 17:22:33 -0700
commit55c086cbdc0f155b7f6caa44ef31de57fc98e61b (patch)
treee6e21717c1758475047b85736321d39cde073c89 /spec
parent552ec721f16c4e085010a067e6806d89d1f6f8a4 (diff)
downloadchef-55c086cbdc0f155b7f6caa44ef31de57fc98e61b.tar.gz
Updated the firewall rule resource to allow for multiple remote addresses, updated the spec file to account for the change in data types
Signed-off-by: John McCrae <john.mccrae@progress.com>
Diffstat (limited to 'spec')
-rw-r--r--spec/unit/resource/windows_firewall_rule_spec.rb17
1 files changed, 11 insertions, 6 deletions
diff --git a/spec/unit/resource/windows_firewall_rule_spec.rb b/spec/unit/resource/windows_firewall_rule_spec.rb
index f4dfea1e0a..85ebccecc6 100644
--- a/spec/unit/resource/windows_firewall_rule_spec.rb
+++ b/spec/unit/resource/windows_firewall_rule_spec.rb
@@ -88,6 +88,11 @@ describe Chef::Resource::WindowsFirewallRule do
expect(resource.remote_address).to eql("8.8.4.4")
end
+ it "the remote_address property accepts comma separated lists" do
+ resource.remote_address(['10.17.3.101', '172.7.7.53'])
+ expect(resource.remote_address).to eql(%w{10.17.3.101 172.7.7.53})
+ end
+
it "the remote_port property accepts strings" do
resource.remote_port("8081")
expect(resource.remote_port).to eql(["8081"])
@@ -223,8 +228,8 @@ describe Chef::Resource::WindowsFirewallRule do
end
it "aliases :remoteip to :remote_address" do
- resource.remoteip("8.8.8.8")
- expect(resource.remote_address).to eql("8.8.8.8")
+ resource.remoteip(["8.8.8.8"])
+ expect(resource.remote_address).to eql(["8.8.8.8"])
end
it "aliases :localport to :local_port" do
@@ -288,7 +293,7 @@ describe Chef::Resource::WindowsFirewallRule do
end
it "sets RemoteAddress" do
- resource.remote_address("8.8.8.8")
+ resource.remote_address(["8.8.8.8"])
expect(provider.firewall_command("New")).to eql("New-NetFirewallRule -Name 'test_rule' -DisplayName 'test_rule' -RemoteAddress '8.8.8.8' -Direction 'inbound' -Protocol 'TCP' -IcmpType 'Any' -Action 'allow' -Profile 'any' -InterfaceType 'any' -Enabled 'true'")
end
@@ -365,7 +370,7 @@ describe Chef::Resource::WindowsFirewallRule do
resource.group("new group")
resource.local_address("192.168.40.40")
resource.local_port("80")
- resource.remote_address("8.8.4.4")
+ resource.remote_address(["8.8.4.4"])
resource.remote_port("8081")
resource.direction(:outbound)
resource.protocol("UDP")
@@ -416,7 +421,7 @@ describe Chef::Resource::WindowsFirewallRule do
end
it "sets RemoteAddress" do
- resource.remote_address("8.8.8.8")
+ resource.remote_address(["8.8.8.8"])
expect(provider.firewall_command("Set")).to eql("Set-NetFirewallRule -Name 'test_rule' -NewDisplayName 'test_rule' -RemoteAddress '8.8.8.8' -Direction 'inbound' -Protocol 'TCP' -IcmpType 'Any' -Action 'allow' -Profile 'any' -InterfaceType 'any' -Enabled 'true'")
end
@@ -487,7 +492,7 @@ describe Chef::Resource::WindowsFirewallRule do
resource.displayname("some cool display name")
resource.local_address("192.168.40.40")
resource.local_port("80")
- resource.remote_address("8.8.4.4")
+ resource.remote_address(["8.8.4.4"])
resource.remote_port("8081")
resource.direction(:outbound)
resource.protocol("UDP")