summaryrefslogtreecommitdiff
path: root/spec/stress/win32
diff options
context:
space:
mode:
Diffstat (limited to 'spec/stress/win32')
-rw-r--r--spec/stress/win32/file_spec.rb37
-rw-r--r--spec/stress/win32/memory_spec.rb22
-rw-r--r--spec/stress/win32/security_spec.rb69
3 files changed, 128 insertions, 0 deletions
diff --git a/spec/stress/win32/file_spec.rb b/spec/stress/win32/file_spec.rb
new file mode 100644
index 0000000000..ef01aa632c
--- /dev/null
+++ b/spec/stress/win32/file_spec.rb
@@ -0,0 +1,37 @@
+#
+# Author:: Seth Chisamore (<schisamo@opscode.com>)
+# Copyright:: Copyright (c) 2011 Opscode, Inc.
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require 'spec_helper'
+require 'chef/win32/file' if windows?
+
+describe 'Chef::ReservedNames::Win32::File', :windows_only do
+ before(:each) do
+ @path = File.expand_path(File.join(File.dirname(__FILE__), "..", "..", "data", "old_home_dir", "my-dot-emacs"))
+ end
+
+ it "should not leak memory" do
+ test = lambda { Chef::ReservedNames::Win32::File.symlink?(@path) }
+ test.should_not leak_memory(:warmup => 50, :iterations => 100)
+ end
+
+ it "should not leak handles" do
+ test = lambda { Chef::ReservedNames::Win32::File.symlink?(@path) }
+ test.should_not leak_handles(:warmup => 50, :iterations => 100)
+ end
+
+end
diff --git a/spec/stress/win32/memory_spec.rb b/spec/stress/win32/memory_spec.rb
new file mode 100644
index 0000000000..ed3ad306d0
--- /dev/null
+++ b/spec/stress/win32/memory_spec.rb
@@ -0,0 +1,22 @@
+#
+# Author:: Seth Chisamore (<schisamo@opscode.com>)
+# Copyright:: Copyright (c) 2011 Opscode, Inc.
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require 'spec_helper'
+
+describe 'Chef::ReservedNames::Win32::Memory', :windows_only do
+end
diff --git a/spec/stress/win32/security_spec.rb b/spec/stress/win32/security_spec.rb
new file mode 100644
index 0000000000..e506b71be1
--- /dev/null
+++ b/spec/stress/win32/security_spec.rb
@@ -0,0 +1,69 @@
+#
+# Author:: Seth Chisamore (<schisamo@opscode.com>)
+# Copyright:: Copyright (c) 2011 Opscode, Inc.
+# License:: Apache License, Version 2.0
+#
+# Licensed under the Apache License, Version 2.0 (the "License");
+# you may not use this file except in compliance with the License.
+# You may obtain a copy of the License at
+#
+# http://www.apache.org/licenses/LICENSE-2.0
+#
+# Unless required by applicable law or agreed to in writing, software
+# distributed under the License is distributed on an "AS IS" BASIS,
+# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+# See the License for the specific language governing permissions and
+# limitations under the License.
+#
+
+require 'spec_helper'
+
+if windows?
+ require 'chef/win32/security'
+ require 'tmpdir'
+ require 'fileutils'
+end
+
+describe 'Chef::ReservedNames::Win32::Security', :windows_only do
+
+ def monkeyfoo
+ File.join(CHEF_SPEC_DATA, "monkeyfoo").gsub("/", "\\")
+ end
+
+ before :all do
+ @test_tempdir = File.join(Dir::tmpdir, "cheftests", "chef_win32_security")
+ FileUtils.mkdir_p(@test_tempdir)
+ @monkeyfoo = File.join(@test_tempdir, "monkeyfoo.txt")
+ end
+
+ before :each do
+ File.delete(@monkeyfoo) if File.exist?(@monkeyfoo)
+ # Make a file.
+ File.open(@monkeyfoo, "w") do |file|
+ file.write("hi")
+ end
+ end
+
+ after :all do
+ FileUtils.rm_rf(@test_tempdir)
+ end
+
+ it "should not leak when retrieving and reading the ACE from a file", :volatile do
+ lambda {
+ sids = Chef::ReservedNames::Win32::Security::SecurableObject.new(@monkeyfoo).security_descriptor.dacl.select { |ace| ace.sid }
+ GC.start
+ }.should_not leak_memory(:warmup => 50, :iterations => 100)
+ end
+
+ it "should not leak when creating a new ACL and setting it on a file", :volatile do
+ securable_object = Security::SecurableObject.new(@monkeyfoo)
+ lambda {
+ securable_object.dacl = Chef::ReservedNames::Win32::Security::ACL.create([
+ Chef::ReservedNames::Win32::Security::ACE.access_allowed(Chef::ReservedNames::Win32::Security::SID.Everyone, Chef::ReservedNames::Win32::API::Security::GENERIC_READ),
+ Chef::ReservedNames::Win32::Security::ACE.access_denied(Chef::ReservedNames::Win32::Security::SID.from_account("Users"), Chef::ReservedNames::Win32::API::Security::GENERIC_ALL)
+ ])
+ GC.start
+ }.should_not leak_memory(:warmup => 50, :iterations => 100)
+ end
+
+end